- Embedding sensitive data in the function code
- Granting the function unnecessary permissions
- Using an execution role with the principle of least privilege
- Disabling encryption for improved performance