ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Design patterns for secure serverless applications

Journal: Science Journal "NovaInfo" (Vol.132, No. 1)

Publication Date:

Authors : ;

Page : 24-25

Keywords : DATA; SERVERLESS; PATTERTN; COMPUTING; MACHINE; FUNCTION; LAMBDA; AWS;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud providers offer a shared responsibility model when it comes to cloud security. In this model, the cloud provider manages infrastructure and hypervisor security, while customers are responsible for securing resources, workloads, and data. Developing security solutions using virtual machines or containers creates additional challenges because these resources also need to be secured. Security must be considered at the design stage, using the necessary proven patterns. This article discusses several secure design patterns for serverless applications. Key benefits are described for each design pattern. Examples of applications and services using this template are given. In conclusion, it is concluded that there is no one-size-fits-all solution to solve all the security problems of serverless applications, and in order to design a secure application, you need to know several patterns in order to choose the right one at the right time.

Last modified: 2022-06-19 22:48:22