Who it's for:
- application developers
- security professionals
- system and security administrators
- information system security officers
How to Design a Secure Serverless Architecture
Release Date: 09/14/2021
Working Group: Serverless
The document assumes that the readers have some knowledge of coding practices, security and networking expertise, and application containers, microservices, functions, and agile application development.
- What is Serverless
- Advantages and benefits of serverless architecture
- Shared responsibility model for serverless
- Security design, controls and best practices
- Kubernetes security best practices
- CI-CD pipelines, Function Code, Code scans and policy enforcement for Functions and Containers
- Compliance and governance for serverless
CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.
Provide feedback on this form
Aradhna Chetal is a Senior Director Executive - Cloud Security at TIAA. She has worked for a number of enterprises like JP Morgan Chase, HSBC, Merck, Boeing Company, T-Mobile and Microsoft where she was responsible for defining cloud security strategies, cloud security architecture, digital transformation and migration of applications to the cloud.
Aradhna is a Cloud Security Alliance Research Fellow and has been a key contributor...
This person does not have a biography listed with CSA.
Director - Global Security Engineering - Cigna
Cloud Security Engineering leader responsible for security engineering and security innovation. Enables new and untried technologies, runs proof of concepts, designs and engineers security configurations and enables the business to leverage new technology safely. Led the creation of Cigna’s security assurance framework which ensures that the security vision is consistently executed. Current research focuses on the domains of sec...
Senior advisor Security & Compliance at Akamai Technologies
Vani is an active contributor to several Cloud Security Alliance working groups, including Application Containers and Microservices, Serverless, Top threats, Cloud Control Matrix (CCMv4), SDP Expert Group (Advisory Group to the Office of the CTO), Cloud Key Management etc. Vani has co-authored publications such as "How to Design a Secure Serverless Architecture", "CCM v4.0 Implementation Guidelines", "Cloud Top Threats". She has...