Security in the Serverless Architecture: A Tectonic Shift in Responsibilities
Security in the Serverless Architecture: A Tectonic Shift in Responsibilities
RELEASE DATE
13-Jul-2018
13-Jul-2018
REGION
North America
North America
Research Code: 9B0F-00-5C-00-00
SKU: IT03726-NA-SF_22200
$3,000.00
In stock
SKU
IT03726-NA-SF_22200
Description
A fascinating aspect of the cloud era is the expanding options for organizations to move from being owners to renters of IT capabilities. From a security perspective, decreasing ownership also transfers blocks of responsibility from cloud customers to the cloud services provider. This, in essence, is the shifting attribute of the cloud shared responsibility model.
While transferring generic responsibilities to the cloud provider and accelerating application cycles appear highly appealing, are there potential security thorns amongst those roses? Yes there are, as we explain in this insight. Nevertheless, if the thorns are managed with care, the beauty of the rose can still shine through.
Table of Contents
Introduction
Does the Shared Responsibility Model Improve Security?
Serverless’ Extra Security Requirements
Multiple triggering vectors and protocols
Evolving attack types
Dynamic and growing resources and components
New security perimeters
Extra Serverless Requirements, What’s Next?
Stratecast - The Last Word
About Stratecast
About Frost & Sullivan
Related Research
Popular Topics
A fascinating aspect of the cloud era is the expanding options for organizations to move from being owners to renters of IT capabilities. From a security perspective, decreasing ownership also transfers blocks of responsibility from cloud customers to the cloud services provider. This, in essence, is the shifting attribute of the cloud shared responsibility model.
While transferring generic responsibilities to the cloud provider and accelerating application cycles appear highly appealing, are there potential security thorns amongst those roses? Yes there are, as we explain in this insight. Nevertheless, if the thorns are managed with care, the beauty of the rose can still shine through.
No Index | No |
---|---|
Podcast | No |
Author | Michael Suby |
Industries | Information Technology |
WIP Number | 9B0F-00-5C-00-00 |
Is Prebook | No |
GPS Codes | 3031,9455,9477,99E4-C1,D562 |