Page 14 - Cyber Defense eMagazine - January 2018
P. 14
We can only guess that the idea for such a solution exists probably some time back –
because we are strongly aware that all brilliant ideas existing today as commercial
solutions would deal with their root coming many years before from a defense industry.
And, indeed – the main purpose of the serverless technology is to save the
programming code on the web and offer us the chance to execute it when we want to.
From that point of view – the serverless is so similar with the container’s technology, but
– on the other hand – the application containers would offer much more options for the
code storage. In addition, the serverless would cost us only if we use it and that’s really
the big advantage having in mind that this system would be quite cost-effective. Also,
it’s important to mention that the serverless computing is the way of cloud’s computing –
but, in this case we would deal with the Function-as-a-Service (FaaS) cloud’s
deployment model.
So, we would make a good talk about this very new paradigm, but we would not try to
explain why we use the term “serverless” for this concept. The first and logical question
here would be if there are any servers being applied in this case. The name “serverless”
would suggest us that we would not deal with servers, data centers or any services. The
fact is that there would be so many servers, data centers and services in the practice
like in any other cloud’s system, but we would use the very small functions being the
pieces of a code that would get stored without any limitations within the IT infrastructure.
In other words, this is not any revolutionarily new solution, but rather the way to save
your confidential code within the web environment.
Also, it’s important to know that there are some weaknesses regarding this new
technology. For instance, there would be so high risk for its data centers to get hacked
and as it would use an HTTP communication channel – we are quite concerned that so
many cyber criminals could take a big advantage over the vulnerabilities of this
communication line. Also, this very new paradigm would cope with some access control
concerns – but, let’s say that’s not that alarming as we would believe before. At this
moment – there are the quite encouraging moves being made on the marketplace that
would promise us that we should worry less about the access control.
On the other hand, we would get aware that the hackers would easily obtain someone’s
IP address and they could take a full advantage over some data center, IT infrastructure
or communication line. In such a case, it’s so significant to highlight that we should
always get prepared the good disaster recovery and business continuity strategies that
would provide us an opportunity to repair once breached system.
14 Cyber Defense eMagazine – January 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.