{"id":6621,"date":"2017-02-14T07:00:51","date_gmt":"2017-02-14T15:00:51","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/14\/news-440\/"},"modified":"2017-02-14T07:00:51","modified_gmt":"2017-02-14T15:00:51","slug":"news-440","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/14\/news-440\/","title":{"rendered":"Moving To Serverless Cloud Apps"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 14 Feb 2017 14:31:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>One of the key benefits of the cloud is focus. Spinning up a virtual server in the cloud lets you focus on the operations and security of the operating system, you applications, and your data. Similarly migrating to a SaaS productivity suite lets you focus on your data and getting work done.<\/p>\n<p>This is the beauty of the <a href=\"http:\/\/blog.trendmicro.com\/cloud-security-shared-responsibility-action\/\">shared responsibility model<\/a> .<\/p>\n<p>Applied equally to operations and security, the model provides a simple guide to understanding where you need to focus your energies and where your cloud service provider will focus theirs.<\/p>\n<p>This leads to a simple approach to building in the cloud&#8230;&#8221;Use SaaS services where ever possible, only paying the cost of the PaaS and IaaS dynamic when absolutely necessary&#8221;.<\/p>\n<p>This above all else has led us to serverless designs.<\/p>\n<h2>Serverless?<\/h2>\n<p>The <a href=\"https:\/\/serverless.zone\/serverless-is-just-a-name-we-could-have-called-it-jeff-1958dd4c63d7#.bhc15cpo1\">name is a bit controversial<\/a> but it is a handy way to describe a cloud application where your custom code (running as functions in the cloud) uses a number of services and APIs to solve a specific problem.<\/p>\n<p>With serverless apps, you&#8217;re taking the building blocks offered by various services and glueing them together in <a href=\"https:\/\/aws.amazon.com\/lambda\">AWS Lambda<\/a> , <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/functions\/\">Microsoft Azure Functions<\/a> , <a href=\"https:\/\/cloud.google.com\/functions\/\">Google Cloud Functions<\/a> , <a href=\"https:\/\/developer.ibm.com\/openwhisk\/\">IBM OpenWhisk<\/a> , or something similar.<\/p>\n<p>It&#8217;s a fast, cost effective way to get a highly scalable, highly available application in the hands of your users.<\/p>\n<p>In addition to the benefits, it raises a lot of questions around operations and security.<\/p>\n<h2>NoOps?<\/h2>\n<p>When serverless applications first started to gain popularity, there was a push for a term called &#8220;NoOps&#8221;. The idea being that in these designs all operational&#8211;and thus security&#8211;tasks had been delegated to the cloud service provider.<\/p>\n<p>That&#8217;s a dangerous way of thinking.<\/p>\n<p>While serverless designs do significantly reduce the operational and security impact on your team, it does not eliminate them.<\/p>\n<p><a href=\"https:\/\/mobile.twitter.com\/mipsytipsy\">Charity Majors<\/a> gave <a href=\"https:\/\/charity.wtf\/2016\/05\/31\/operational-best-practices-serverless\/\">a fantastic talk<\/a> at the first <a href=\"http:\/\/serverlessconf.io\">Serverless.conf<\/a> on this very issue. Looking at the security angle, we know from the shared responsibility model that <b>our data is always our responsibility<\/b>.<\/p>\n<p>How do we make sure that we are fulfilling our responsibility in a serverless design?<\/p>\n<h2>Areas of Focus<\/h2>\n<p>There are 4 critical areas of focus for serverless security;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ol>\n<li>The flow of data across services in your application<\/li>\n<li>Code quality &amp; service configuration<\/li>\n<li>3rd party trust<\/li>\n<li>Monitoring<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>I&#8217;ve <a href=\"https:\/\/medium.com\/@marknca\/4-steps-to-secure-serverless-applications-1274f0f5d321#.j7wmliaok\">written about these areas before<\/a> and will be speaking to them at <a href=\"https:\/\/www.rsaconference.com\/videos\/quick-look-securing-serverless-applications-in-the-cloud\">RSA 2017<\/a>. These areas shouldn&#8217;t be new to anyone building a modern application, the difference here is these are the <b>only<\/b> areas where you can make an impact on the security of your application.<br \/> Because a serverless application is made of SaaS level services, you don&#8217;t have the ability to apply controls to the operating system or the application layer.<\/p>\n<p>You can&#8217;t adjust the configuration of <a href=\"https:\/\/httpd.apache.org\">httpd<\/a> or <a href=\"https:\/\/www.mongodb.com\">MongoDB<\/a> or any other foundational tools in your application because they have been abstracted away as services provided by a 3rd party.<br \/> That&#8217;s a win operationally but a major shift for security.<br \/> Security in serverless designs is far more about making sure that the services you use have adequate security controls built in and that you&#8217;ve configured those controls correctly. This stands in stark contrast to traditional applications where you can simply add more security controls as need.<br \/> In addition to trust, provider choice, and configuration, monitoring plays a critical role in serverless security. Once you understand a design, monitoring ensures that your operational and security controls continue to work in production as you expect&#8230;and only as your expect.<br \/> As you can see, there is still security and operational overhead in serverless designs but the nature of the work has changed.<\/p>\n<h2>Next Steps<\/h2>\n<p>Serverless designs are maturing and becoming more commonplace. As a part of that process, the community is gaining a better understanding of the security and operational consequences alongside the business benefits.<\/p>\n<p>There is a lot going for these designs and&#8211;I believe&#8211;they will quickly become the design pattern of choice for most applications.<\/p>\n<p>What do you think about serverless designs and security? Let&#8217;s chat on Twitter where I&#8217;m <a href=\"https:\/\/twitter.com\/marknca\">@marknca<\/a>. I&#8217;m always happy to discuss cloud, security, and other technologies.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/moving-serverless-cloud-apps\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 14 Feb 2017 14:31:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/trend-micro-blog-no-servers.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>One of the key benefits of the cloud is focus. Spinning up a virtual server in the cloud lets you focus on the operations and security of the operating system, you applications, and your data. Similarly migrating to a SaaS productivity suite lets you focus on your data and getting work done. This is the&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11064,11146,11331],"class_list":["post-6621","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cloud-computing","tag-cloud-security","tag-serverless"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6621"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6621\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6621"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}