Serverless Security

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Excerpt
hiddentrue

Adopting and integrating serverless architecture into a product eliminates many of the costs surrounding deploymentbut – it doesn’t eliminate security concerns, or the need for application security throughout the DevOps lifecycle. This page gathers resources about serverless security concerns and best practices.

Master wrapper
PageTypeTopic
Serverless Security
Trw section section
headh1
titlePerspectives on Serverless Security
List wrapper
List item
linkImagehttps://ww2.frost.com/files/3414/3202/8102/FS-Logo-Blue-600x315.jpg
L;aquasec.com;Serverless Adoption & Competitive Security Options are Expanding;https://info.aquasec.com/frost-sullivan-serverless-security?utm_source=wiki;NA;NA;;;This  Frost & Sullivan report covers the shared security responsibility model adapted to serverless architectures. You’ll learn how security practices clipped into developer workflows must be paired with automated and adaptive Protections, and about vendors that secure serverless architectures.
List item
linkImagehttps://i-cdn.embed.ly/1/display/crop?height=600&key=fd92ebbc52fc43fb98f69e50e7893c13&url=https%3A%2F%2Fgeekflare.com%2Fwp-content%2Fuploads%2F2019%2F03%2Fcyber-security.jpg&width=1000
recommendedtrue
L;geekflare.com;5 Best Serverless Security Platform for Your Applications;https://geekflare.com/serverless-application-security/;NA;NA;;;A serverless application requires slightly different security approach than a traditional one. It is more the securing functions. And, that’s why you need a specialized platform for comprehensive security protection. Explore the most popular serverless security platforms.
List item
recommendedtrue
L;radware.com;What Serverless Means for Security;https://blog.radware.com/security/2019/03/security-pros-and-perils-of-serverless-architecture/;NA;NA;;;Many assume that serverless is more secure than traditional architectures. This is partly true. As the name implies, serverless architecture does not require server provisioning. Deep under the hood, however, these REST API functions are still running on a server, which in turn runs on an operating system and uses different layers of code to parse the API requests. As a result, the total attack surface becomes significantly larger.
List item
L;blog.aquasec.com;Securing Serverless: Persistent Security for Ephemeral Environments;https://blog.aquasec.com/securing-serverless-persistent-security-for-ephemeral-environments;;;;
List item
L;infosecurity-magazine.com;Securing Containers and Serverless Architectures;https://www.infosecurity-magazine.com/opinions/shift-containers-serverless-1/;;;;
List item
L;secjuice.com;Introduction To Serverless Security;https://www.secjuice.com/serverless-security-dependencies/;;;;
List item
L;puresec.io;Skyline AI Gains Visibility Into Serverless Security Posture With PureSec;https://www.puresec.io/blog/skyline-ai-gains-visibility-into-serverless-security-posture-with-puresec;;;;
List item
L;brighttalk.com;Webinar: From Containers to Serverless - Keys to Securing Cloud-Native Workloads;https://www.brighttalk.com/webcast/15077/333585;;;;
List item
L;snyk.io;Serverless Security Implications From Infra to OWASP;https://snyk.io/blog/serverless-security-implications-from-infra-to-owasp/;NA;;;
List item
L;darkreading.com;Where to Find Security Holes in Serverless Architecture;https://www.darkreading.com/cloud/where-to-find-security-holes-in-serverless-architecture/d/d-id/1330842;NA;;;
List item
L;read.acloud.guru;Security and Serverless;https://read.acloud.guru/security-and-serverless-ec52817385c4;NA;;;
List item
L;infoq.com;Serverless Security: What's Left to Protect?;https://www.infoq.com/articles/serverless-security;NA;;;
List item
L;thenewstack.io;Security in Serverless: What Gets Better, What Gets Worse?;https://thenewstack.io/security-serverless-gets-better-gets-worse/;NA;;;
Trw section section
headh1
titleServerless Security Challenges and Risks
List wrapper
List item
L;resources.whitesourcesoftware.com;What Risks Does Serverless Computing Pose to Your Application Security?;https://resources.whitesourcesoftware.com/blog-whitesource/what-risks-does-serverless-computing-pose-to-your-application-security;NA;;;
List item
L;protego.io;Serverless Computing Security Risks & Challenges;https://www.protego.io/serverless-computing-security-risks-challenges/;;;;
List item
L;serverless.com;Fantastic Serverless Security Risks, and Where to Find Them;https://serverless.com/blog/fantastic-serverless-security-risks-and-where-to-find-them/;NA;;;
List item
L;zdnet.com;The Top 10 Security Challenges of Serverless Architectures ;https://www.zdnet.com/article/the-top-10-risks-for-apps-on-serverless-architectures/;NA;;;
List item
L;agileengine.com;Serverless Security Concerns and Best Practices;https://agileengine.com/serverless-security/;NA;;;
List item
L;openfaas.com;Serverless Security: Read-Only Functions with OpenFaaS;https://www.openfaas.com/blog/read-only-functions/;;;;
Trw section section
headh1
titleHow To
List wrapper
List item
L;microsoft.com;Simplifying security for serverless and web apps with Azure Functions and App Service;https://azure.microsoft.com/en-us/blog/simplifying-security-for-serverless-and-web-apps-with-azure-functions-and-app-service/;;;;
Trw section section
headh1
titleTools
List wrapper
List item
L;info.aquasec.com;Unified Security for Containers & Serverless Apps;https://info.aquasec.com/serverless;NA;;;
List item
L;vandium.io;Vandium - A Secure Layer for Serverless;https://vandium.io/;NA;;;

Anchor
further_reading
further_reading

Further Reading

Further reading

Children Display
pageServerless Computing
excerptTypesimple

Cta item
resourceID001


Cta item
resourceID004


Cta item
resourceID002


Cta item
resourceID003