Serverless Computing Security: Protecting Application Logic

Wesley O'Meara, Ruth G. Lennon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Citations (Scopus)

Abstract

Serverless computing enables organisations to avail of the inherent and unlimited flexibility and scalability that serverless provides, without having to consider the underlying infrastructure. However, there are security considerations that are unique to serverless architectures, that if not included early in application design, can lead to vulnerabilities which could be exposed to common attack vectors. While cloud service providers manage the security of the underlying infrastructure, it is up to the consumer to ensure that serverless applications are fully protected. We go on to discuss common attack vectors, the risks associated with misconfiguration within security and application setup, how attackers target vulnerabilities within the workflow logic of serverless applications and their functions to focus their attacks, and how consumers can implement measures to protect their applications within a serverless architecture.

Original languageEnglish
Title of host publication2020 31st Irish Signals and Systems Conference, ISSC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728194189
DOIs
Publication statusPublished - Jun 2020
Event31st Irish Signals and Systems Conference, ISSC 2020 - Letterkenny, Ireland
Duration: 11 Jun 202012 Jun 2020

Publication series

Name2020 31st Irish Signals and Systems Conference, ISSC 2020

Conference

Conference31st Irish Signals and Systems Conference, ISSC 2020
Country/TerritoryIreland
CityLetterkenny
Period11/06/2012/06/20

Keywords

  • application security
  • cloud computing
  • cybersecurity
  • function as a service
  • serverless

Fingerprint

Dive into the research topics of 'Serverless Computing Security: Protecting Application Logic'. Together they form a unique fingerprint.

Cite this