Serverless: applications only when you need them – no more, no less

The sharing economy has delivered dominant business models that have swept through a number of industries, such as taxi services and hotel accommodations, providing these items on a short-term, temporary basis. It’s fitting, then, that IT services also are seeing their own version of a “sharing economy” business model, with applications and systems also delivered on a short-term, temporary basis — the essence of serverless computing. 

clouds-over-lake-galena-dam-bucks-county-pa-by-joe-mckendrick.jpg
Photo: Joe McKendrick

To better understand the implications of serverless computing for today’s enterprise architecture, we heard from Marc Feghali, co-founder and VP of product management for Attivo Networks.

Q: How does a serverless architecture differ from a traditional IT architecture — whether on-premises or already cloud-based?

Feghali: Traditional IT architectures use a server infrastructure, whether on-premises or cloud-based, that requires managing the systems and services required for an application to function. The application must always be running, and the organization must spin up other instances of the application to handle more load which tends to be resource-intensive. Serverless architecture focuses instead on having the infrastructure provided by a third party, with the organization only providing the code for the applications broken down into functions that are hosted by the third party. This allows the application to scale based on function usage and is more cost-effective since the third-party charges for how often the application uses the function, instead of having the application running all the time. 

Coinbase 2

Q: How should the existing or legacy architecture be phased out? Is it an instant cut over, or do you recommend a more gradual migration?

There are specific use cases that will still require existing legacy architecture, but where practical a serverless infrastructure can provide capabilities for those that don’t. Serverless computing is constrained by performance requirements, resource limits, and security concerns, but excels at reducing costs for compute. That being said, where feasible, one should gradually migrate over to serverless infrastructure to make sure it can handle the application requirements before phasing out the legacy infrastructure. 

Q: What kinds of services and solutions should managers and professionals turn to build and support their serverless architecture?

There are many solutions that are available to offer dynamic provisioning and on demand service to applications. The one however that every organization must factor in is security. With the new service or solution, security frameworks need to be evaluated to see what new gaps and risks will present themselves. They will then need to reassess their controls and processes to refine them to address these new risk models.

Q: How do security protocols and processes differ in a serverless environment?

Application owners focus on securing the application layer, code, dependencies, configurations and any cloud resources their application requires to run properly. However, their attack surface is much larger as attackers can leverage every component of the application as an entry point. There is no OS to worry about securing, but there is no way to install endpoint- or network-level detection solutions such as AV or IDS/IPS. This lack of visibility allows attackers to remain undetected as they leverage vulnerable functions for their attacks, whether to steal data or compromise certificates, keys, and credentials to access the organization. This lack of visibility and control has steered organizations adopting this technology towards also adopting deception technologies as a way understand when security controls are not working as they should, detect attacks that have by-passed them, and for notification of policy violations by insiders, suppliers, or external threat actors. 

Serverless: applications only when you need them - no more, no less 1
About the author

E-Crypto News was developed to assist all cryptocurrency investors in developing profitable cryptocurrency portfolios through the provision of timely and much-needed information. Investments in cryptocurrency require a level of detail, sensitivity, and accuracy that isn’t required in any other market and as such, we’ve developed our databases to help fill in information gaps.

Related Posts

Leave a Reply

E-Crypto News Executive Interviews



bitcoin
Bitcoin (BTC) $ 33,671.00
ethereum
Ethereum (ETH) $ 1,970.06
tether
Tether (USDT) $ 1.00
binance-coin
Binance Coin (BNB) $ 297.82
cardano
Cardano (ADA) $ 1.25
dogecoin
Dogecoin (DOGE) $ 0.236253
xrp
XRP (XRP) $ 0.648297
usd-coin
USD Coin (USDC) $ 1.00
polkadot
Polkadot (DOT) $ 15.84
binance-usd
Binance USD (BUSD) $ 1.00
USD
EUR
GBP
bitcoinBitcoin (BTC)
$ 33,671.00
ethereumEthereum (ETH)
$ 1,970.06
tetherTether (USDT)
$ 1.00
bitcoin-cashBitcoin Cash (BCH)
$ 474.15
litecoinLitecoin (LTC)
$ 129.00
bitcoinBitcoin (BTC)
28.288,86
ethereumEthereum (ETH)
1.655,16
tetherTether (USDT)
0,840155
bitcoin-cashBitcoin Cash (BCH)
398,36
litecoinLitecoin (LTC)
108,38
bitcoinBitcoin (BTC)
24,210.96
ethereumEthereum (ETH)
1,416.56
tetherTether (USDT)
0.719045
bitcoin-cashBitcoin Cash (BCH)
340.94
litecoinLitecoin (LTC)
92.76

Automated trading with HaasBot Crypto Trading Bots

Crypto Scams

What Role Do Cryptocurrencies Play In The Era Of Ransomware Attacks?
June 9, 2021
Crypto Scams On The Rise As Market Enters Bull Cycle
Crypto Scams On The Rise As Market Enters Bull Cycle
December 22, 2020
Harpreet Singh Sahni perpetrated the Plus Gold Union Coin (PGUC) scam
Sydney Concert Promoter Harpreet Sahni Involved In $50M Crypto PGUC Scam
November 2, 2020
KuCoin hackers steal $150 million
KuCoin Exchange Hacked But Insurance Will Cover The Stolen $150M
September 29, 2020
Mining City insists that it is legit
Mining City Refutes Claims By Philippines SEC Of Being A Scam
September 23, 2020

Blockchain/Cryptocurrency Questions and Answers

What Is Plethori Platform And How Does It Work?
June 12, 2021
What Is The Fudge Token?
What Is The Fudge Token?
June 5, 2021
What Is Shiba Inu (SHIB) Cryptocurrency And How Does It Work?
What Is Shiba Inu (SHIB) Cryptocurrency And How Does It Work?
May 31, 2021
What Is PancakeSwap And How Does It Work?
What Is PancakeSwap And How Does It Work?
May 27, 2021
How Has Internet Computer (ICP) Become A Top-10 Crypto?
How did “Internet Computer Coin”(ICP) Become A Top-5 Crypto?
May 19, 2021


CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin33,617 0.69 % 3.10 % 12.28 %
Ethereum1,966.9 0.24 % 3.52 % 16.87 %
Tether1.000 0.12 % 5.35 % 0.31 %
Binance Coin297.07 0.08 % 14.03 % 14.25 %
Cardano1.250 0.49 % 8.98 % 15.21 %
Dogecoin0.2377 0.51 % 27.11 % 22.63 %
XRP0.6518 1.80 % 19.77 % 22.02 %
USD Coin1.000 0.53 % 0.50 % 0.00 %
Polkadot15.85 0.25 % 8.21 % 30.58 %
Binance USD0.9999 0.50 % 0.09 % 0.06 %

bitcoin
Bitcoin (BTC) $ 33,671.00
ethereum
Ethereum (ETH) $ 1,970.06
tether
Tether (USDT) $ 1.00
binance-coin
Binance Coin (BNB) $ 297.82
cardano
Cardano (ADA) $ 1.25
dogecoin
Dogecoin (DOGE) $ 0.236253
xrp
XRP (XRP) $ 0.648297
usd-coin
USD Coin (USDC) $ 1.00
polkadot
Polkadot (DOT) $ 15.84
binance-usd
Binance USD (BUSD) $ 1.00