Security in the Serverless Architecture: A Tectonic Shift in Responsibilities

Security in the Serverless Architecture: A Tectonic Shift in Responsibilities

RELEASE DATE
13-Jul-2018
REGION
North America
Research Code: 9B0F-00-5C-00-00
SKU: IT03726-NA-SF_22200

$3,000.00

Special Price $2,250.00 save 25 %

In stock
SKU
IT03726-NA-SF_22200

$3,000.00

$2,250.00 save 25 %

DownloadLink

Pay by invoice

ENQUIRE NOW

Description

A fascinating aspect of the cloud era is the expanding options for organizations to move from being owners to renters of IT capabilities. From a security perspective, decreasing ownership also transfers blocks of responsibility from cloud customers to the cloud services provider. This, in essence, is the shifting attribute of the cloud shared responsibility model.

While transferring generic responsibilities to the cloud provider and accelerating application cycles appear highly appealing, are there potential security thorns amongst those roses? Yes there are, as we explain in this insight. Nevertheless, if the thorns are managed with care, the beauty of the rose can still shine through.

Table of Contents

Introduction

Does the Shared Responsibility Model Improve Security?

Serverless’ Extra Security Requirements

Multiple triggering vectors and protocols

Evolving attack types

Dynamic and growing resources and components

New security perimeters

Extra Serverless Requirements, What’s Next?

Stratecast - The Last Word

About Stratecast

About Frost & Sullivan

Related Research
A fascinating aspect of the cloud era is the expanding options for organizations to move from being owners to renters of IT capabilities. From a security perspective, decreasing ownership also transfers blocks of responsibility from cloud customers to the cloud services provider. This, in essence, is the shifting attribute of the cloud shared responsibility model. While transferring generic responsibilities to the cloud provider and accelerating application cycles appear highly appealing, are there potential security thorns amongst those roses? Yes there are, as we explain in this insight. Nevertheless, if the thorns are managed with care, the beauty of the rose can still shine through.
More Information
No Index No
Podcast No
Author Michael Suby
Industries Information Technology
WIP Number 9B0F-00-5C-00-00
Is Prebook No
GPS Codes 3031,9455,9477,99E4-C1,D562