Downloads: 1 | Views: 125 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science and Information Technology | United States of America | Volume 13 Issue 7, July 2024 | Popularity: 4.8 / 10
Serverless Security: Best Practices for Protecting Functions-as-a-Service
Yamini Kannan
Abstract: This paper explores the unique security challenges and best practices associated with serverless computing, particularly Functions-as-a-Service (FaaS) architectures. It examines the ephemeral nature of serverless functions, the shared responsibility model, and the expanded attack surface that characterize these environments. The study delves into common security threats specific to serverless applications, including function event data injection, insecure deployment configurations, broken authentication and authorization, and sensitive data exposure. A comprehensive set of best practices for securing serverless functions is presented, focusing on implementing least privilege access, secure coding practices, data encryption, effective monitoring and logging strategies, and regular security audits. The paper also discusses future trends in serverless security, emphasizing the need for automated tools, advanced isolation techniques, and industry-wide security standards. Through case studies and expert insights, this research provides actionable recommendations for organizations adopting serverless architectures, aiming to balance the benefits of serverless computing with robust security measures.
Keywords: Serverless computing, Functions-as-a-Service (FaaS), Cloud security, Ephemeral functions, Shared responsibility model, Event-driven security, Least privilege access, Serverless deployment, Function isolation, Compliance in serverless environments
Edition: Volume 13 Issue 7, July 2024
Pages: 1190 - 1194
DOI: https://www.doi.org/10.21275/SR24723103837
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019
Pages: 2454 - 2456Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools
Satheesh Reddy Gopireddy
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 4, April 2023
Pages: 1915 - 1920Cybersecurity and Cyber Attacks in Cloud Infrastructure
Naga Satya Praveen Kumar Yadati
Downloads: 5
Research Paper, Computer Science and Information Technology, India, Volume 10 Issue 7, July 2021
Pages: 43 - 46An Analysis of Cloud Computing Risk and Challenges
Shivam Dhoot, Himanshu Gupta
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024
Pages: 1472 - 1481Secure and Scalable Service-to-Service Interaction in Serverless Microservices Environments
Roshan Mahant, Sumit Bhatnagar, Vikas Mendhe
Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 65 - 72An Appraisal of a Keylogging and Cryptography-Based Real-Time Keystroke Monitoring System for Enhancing Cloud Security
Rohit Mourya, Kunika Patil, Srivaramangai R