Serverless Users Not Adopting Application Security Best Practices
June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec.

35% of companies that responded to the survey told PureSec they had no security guidelines or tools for securing their serverless code, potentially exposing the functions to a variety of application-level attacks.

Those companies who do use tools or security best practices to help secure their serverless often used multiple solutions including static code analysis (77%) and manual penetration testing (72%) to detect vulnerabilities, but mostly don't employ any kind of runtime protection that could prevent attacks in real time.

The survey revealed a mixed picture when it comes to security posture for companies using cutting-edge serverless platforms like AWS Lambda, Microsoft Azure Functions and Google Cloud Functions. On the one hand, almost half of the responses to the survey (48%) said they want more security visibility into their serverless apps. Companies with only a few serverless functions were more likely to be satisfied with security visibility, while those with more functions were much less comfortable. At present, there is limited visibility into serverless functions across the board, which is a consequence of abstracting away the environment and the lack of real-time application-layer security monitoring solutions.

Despite this, though, companies are largely confident in the security of their serverless apps. 76% say they are confident or very confident in the "resilience of their serverless applications to cyber attacks". Security confidence was correlated with security testing; companies that test more were more likely to be confident in their security.

There was significant confusion over who in a company should "own" serverless application security, with answers roughly evenly choosing developers, DevSecOps, DevOps, AppSec and Security Engineers. In part, this could reflect different companies' broader internal security practices, but it does suggest a lack of clarity on who should be in charge of security of pure code when there's no clear infrastructure to secure or to deploy application security solutions on.

However, no respondents said that application security was the responsibility of the cloud provider, reflecting an awareness that serverless application security is ultimately the responsibility of the application owner rather than the cloud provider as part of the "shared responsibility model."

Companies are using serverless computing for varied purposes. Almost two-thirds (65%) of companies said they used serverless for cloud automation tasks that might previously have been handled by scripts, while 45% said they deployed serverless as the back-end for running web sites. Other popular uses included data processing (38%) and as providing back-end services for mobile applications (35%).

"Many software companies quickly switched to serverless computing and are using it in diverse and creative ways, from websites to chatbots to the Internet of Things," commented PureSec CEO and co-founder Shaked Zin. "Serverless is so versatile it's easy to quickly create and deploy functions without fully thinking about the security implications."

"The security paradigm is different for serverless applications," added PureSec CTO and co-founder Ory Segal. "Serverless functions exist in the cloud, outside of a company's "wall" of traditional security solutions. Cloud providers do an excellent job of securing the underlying infrastructure, but companies still have responsibility for the code itself."

About the Survey: The online survey conducted in April and May questioned 304 technology professionals to get an understanding of a fast-emerging market.

The Latest

September 20, 2018

The latest Accelerate State of DevOps Report from DORA focuses on the importance of the database and shows that integrating it into DevOps avoids time-consuming, unprofitable delays that can derail the benefits DevOps otherwise brings. It highlights four key practices that are essential to successful database DevOps ...

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 13, 2018

"Our research provides compelling evidence that smart investments in technology, process, and culture drive profit, quality, and customer outcomes that are important for organizations to stay competitive and relevant -- both today and as we look to the future," said Dr. Nicole Forsgren, co-founder and CEO of DevOps Research and Assessment (DORA), referring to the organization's latest report Accelerate: State of DevOps 2018: Strategies for a New Economy ...

September 12, 2018

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 06, 2018

In evaluating 316 million incidents, it is clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major threat to business, according to Security Report for Web Applications (Q2 2018) from tCell ...

September 04, 2018

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 29, 2018

While everyone is convinced about the benefits of containers, to really know if you're making progress, you need to measure container performance using KPIs.These KPIs should shed light on how a DevOps team is faring in terms of important parameters like speed, quality, availability, and efficiency. Let's look at the specific KPIs to track for each of these broad categories ...

August 27, 2018

Protego Labs recently discovered that 98 percent of functions in serverless applications are at risk, with 16 percent considered "serious" ...

Share this