Serverless Computing Security: Protecting Application Logic | IEEE Conference Publication | IEEE Xplore

Serverless Computing Security: Protecting Application Logic


Abstract:

Serverless computing enables organisations to avail of the inherent and unlimited flexibility and scalability that serverless provides, without having to consider the und...Show More

Abstract:

Serverless computing enables organisations to avail of the inherent and unlimited flexibility and scalability that serverless provides, without having to consider the underlying infrastructure. However, there are security considerations that are unique to serverless architectures, that if not included early in application design, can lead to vulnerabilities which could be exposed to common attack vectors. While cloud service providers manage the security of the underlying infrastructure, it is up to the consumer to ensure that serverless applications are fully protected. We go on to discuss common attack vectors, the risks associated with misconfiguration within security and application setup, how attackers target vulnerabilities within the workflow logic of serverless applications and their functions to focus their attacks, and how consumers can implement measures to protect their applications within a serverless architecture.
Date of Conference: 11-12 June 2020
Date Added to IEEE Xplore: 31 August 2020
ISBN Information:

ISSN Information:

Conference Location: Letterkenny, Ireland

Contact IEEE to Subscribe

References

References is not available for this document.