Serverless security protect functions using the CLAD security model
Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report exp...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media, Inc
2019.
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630608306719 |
Sumario: | Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You’ll also learn a platform-agnostic security model known as CLAD that will help you address C ode vulnerabilities, L ibrary vulnerabilities, A ccess and permissions, and D ata security. This report helps you: Understand what serverless is and how this model evolved from cloud native processes Explore the three primary areas where serverless improves security Learn how the CLAD model provides four categories to help you home in on specific security issues Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications |
---|---|
Descripción Física: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781492082538 9781492082521 |