Download Publication
Who it's for:
- Application Developers
- Security Professionals
- CISOs
- System and Security
Administrators - Information System Security
Officers
How to Design a Secure Serverless Architecture
Release Date: 10/23/2023
Working Group: Enterprise Architecture
As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable developers to develop and deploy faster, allowing an easy way to move to cloud-native services without managing infrastructures like container clusters or virtual machines. However, like any solution, serverless computing brings with it a variety of cyber risks.
This publication provides best practices and recommendations for securing serverless architectures. It offers an extensive overview of the different threats, focusing on the application owner risks that serverless platforms are exposed to and suggesting the appropriate security controls. This 2023 version provides an update to the original document published in 2021. The update includes new recommendations to secure workloads utilizing a serverless solution.
Key Takeaways:
Key Takeaways:
- What is serverless
- The advantages and benefits of serverless architectures
- What is the shared responsibility model for serverless
- Secure serverless design considerations, controls, and best practices
- Kubernetes security best practices
- Compliance and governance best practices for serverless
Download this Resource
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
