Affiliation:
1. Chaitanya Bharathi Institute of Technology, Hyderabad, India
2. Sreenidhi Institute of Science and Technology, India
Abstract
Recently, serverless computing has become a newfound computing platform for the cloud-based deployment of applications and it took over all other contemporary computing platforms. It has two significant advantages over its contemporary computing platforms. First off, it enables software developers to delegate to cloud service providers all infrastructure maintenance and operational chores, allowing them to concentrate solely on the business logic of their applications. The second is that it has a strict pay-per-use business model, where customers are only charged for the resources, they utilize. Despite its advantages, researchers have been deeply examining the actual security guarantees offered by the current defences employed to safeguard container-based infrastructures over the past few years. This led to the discovery of significant flaws in the security controls employed for network security and process isolation. In this chapter, the authors highlight the security attacks/issues with the investigated serverless architecture platforms and suggest potential countermeasures.