This document discusses using serverless technologies for automating security response. It provides an overview of serverless computing benefits and design patterns. Examples of open source serverless platforms like Knative and Kubeless are described. The document also discusses using MLGuard, Falco, and security playbooks with serverless functions to detect anomalies and automate security response actions like killing offending pods.