Book description
Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process.
Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You’ll also learn a platform-agnostic security model known as CLAD that will help you address Code vulnerabilities, Library vulnerabilities, Access and permissions, and Data security.
This report helps you:
- Understand what serverless is and how this model evolved from cloud native processes
- Explore the three primary areas where serverless improves security
- Learn how the CLAD model provides four categories to help you home in on specific security issues
- Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications
Table of contents
- 1. Introduction to Serverless and Cloud Native
- 2. Introduction to Serverless Security
-
3. CLAD Model for Serverless Security
- Code Vulnerabilities
-
Library Vulnerabilities
- What’s a Known Vulnerability?
- The Hidden Burden of Using Third-Party Libraries
- Securing Vulnerable Libraries at Scale
- Proactively Apply Security Fixes
- Know Your Inventory
- Eliminate Vulnerabilities Before Functions Are Deployed
- Don’t Let Deployed Functions Lag Behind
- Controls to Minimize Library Vulnerabilities
- Summary of Library Vulnerabilities
- Access and Permissions
- Data Security
- 4. Securing a Sample Application
- 5. Summary
Product information
- Title: Serverless Security
- Author(s):
- Release date: November 2019
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492082521
You might also like
book
Kubernetes Security
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as …
book
Securing DevOps
Securing DevOps explores how the techniques of DevOps and security should be applied together to make …
book
Kubernetes Security and Observability
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of …
book
AWS Security Cookbook
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along …