Serverless architecture is an appealing prospect to developers in that it reduces maintenance, cost, testing, and operational overhead. Much of the pomp and circumstance of managing the infrastructure shifts to the cloud provider so that organizations can focus on building their services rather than scaling them and keeping them running. But, as with all new or evolving technologies, there are security implications and considerations that can give security teams pause and serverless applications should be viewed differently from traditionally deployed or containerized services.
In this interactive session, Ryan Petrich, CTO at Capsule8, will define serverless as well as explore some of the key benefits of deploying this type of infrastructure with a focus on the impact to an organization’s attack surface. Ryan will dig into some of the key security challenges, including visibility and observability of serverless applications, as well practical tools and approaches to help overcome them and a live demonstration of example attacks to watch out for when choosing such an architecture.
Attendees of this webcast will learn:
- What a serverless architecture is and why security teams should care
- Key security challenges for serverless deployments
- Attack vectors and security threats unique to serverless architectures
- Practical solutions for overcoming serverless security challenges