Serverless Computing Security: Protecting Application Logic: June 2020
Serverless Computing Security: Protecting Application Logic: June 2020
net/publication/344000589
CITATIONS READS
14 400
2 authors, including:
Ruth G. Lennon
Atlantic Technoloical University (ATU) Donegal
36 PUBLICATIONS 162 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ruth G. Lennon on 15 July 2022.
Abstract— Serverless computing enables organisations to architecture of serverless applications, development and
avail of the inherent and unlimited flexibility and scalability support teams can incur additional complexity as the design
that serverless provides, without having to consider the of serverless applications include creating application
underlying infrastructure. However, there are security workflows by combining multiple cloud services, functions,
considerations that are unique to serverless architectures, that triggers and events. Configuration and security
if not included early in application design, can lead to administration of these components is implemented at the
vulnerabilities which could be exposed to common attack individual component level and as the architecture is event
vectors. While cloud service providers manage the security driven, each component can be triggered from a range of
of the underlying infrastructure, it is up to the consumer to sources [6] such as e.g. user input, database updates or
ensure that serverless applications are fully protected. We go storage events. Another factor is that security scanning and
on to discuss common attack vectors, the risks associated testing tools, used within traditional software development,
with misconfiguration within security and application setup, have not been able to adapt [7] to the stateless architectural
how attackers target vulnerabilities within the workflow logic nature of serverless. Consumers need to ensure that they
of serverless applications and their functions to focus their implement a strong and thorough security strategy for the
attacks, and how consumers can implement measures to application design and security implementation or potentially
protect their applications within a serverless architecture. they could leave their serverless architecture vulnerable to
cyber-attack.
Keywords—serverless, function as a service, cybersecurity,
Cybercriminals target the applications that consumers host on
application security, cloud computing.
cloud services, with the intention of profiting from illegally
I. INTRODUCTION accessing sensitive data, denying services to the consumer or
utilizing the cloud resources for their own purposes. One
As serverless computing becomes increasingly prevalent aspect that affects their ability to gain unauthorized access to
across the industry, expenditure on Serverless technologies is
a consumers’ cloud resources, is whether they can visualize
projected to have an annual growth rate of 33% [1],
and map the internal business logic and application
increasing from $1.9 billion in 2016, to a projected $7.7
workflow, by gaining access to execution timings and
billion by 2021. IT departments are examining this new
patterns of functions and other cloud services, that drives a
service offering with a view to enabling their business consumers serverless hosted application. Gaining an
partners gain value from adopting serverless and transitioning understanding of an applications workflow can enable an
their infrastructure and services to the cloud.
attacker to focus on weaknesses, such as vulnerabilities
within the flow of functions [7], within the application
As a cloud computing service model, serverless offers
architecture and utilize multiple attack vectors to try
consumers the ability to build and host event-driven
circumvent security measures or input validation processes,
applications on pooled resources [2]. The workflow of these and allow them to attack critical services directly.
applications consists of a series of (functions), that execute
upon predefined events (triggers) [3]. All of which is
To fully realise the benefits of serverless while protecting the
supported by a serverless service model that will dynamically
integrity of their applications and sensitive data, consumers
allocate resources in response to demand. The benefits for
need to consider these types of attacks when designing and
consumers, from building out their applications with the
implementing their security strategies and application
serverless model, is that there is infinite elasticity with the architectures, and gain an understanding of what aspects of
underlying infrastructure, minimal costs [4] within the pay- the architecture are vulnerable to malicious attack.
as-you-go model for the service usage, easy to use interface
and configuration [5], and no requirement for consumers to II. BACKGROUND
understand or visualize the underlying infrastructure.
Serverless, known as function-as-a-service (FaaS) [8] and
backend-as-a-service (BaaS), is a new service model being
However, as consumers adopt serverless, issues can arise
offered for public consumption, by cloud service providers
from the speed and complexity of this transition, coupled with
(CSP). Amongst the CSPs, Amazon was the first to launch a
the need to adhere to statutory and security requirements.
public serverless service, called Lambda, back in 2014 [9],
This can be challenging for organisations that may want
other CSPs quickly followed with Google, Microsoft and
quickly seize business opportunities but may be short of
IBM all devising and offering their serverless services to the
technical expertise and resources. Due to microservices
IV. METHODOLOGY
As outlined by OWASP [6], an attacker can exploit security
misconfiguration such as Broken Authentication or Broken
Access Control, to enable the attacker to remotely execute
code or access standard AWS commands, or sdks, to gather
pertinent information on the application workflow from
Amazons application and infrastructure monitoring service,
CloudWatch.
Figure 1 Attack points for workflow manipulation A simple list-metrics command, executed against
CloudWatch, will output the information sampled in Figure
Figure 1, illustrates the possible attack points within a sample 3, 4 and 5.
serverless application, illustrating a Publication component
of a Pub/Sub (Publication/Subscription) use case, workflow The output displayed in Figure 3 identifies an API Gateway
where vulnerabilities could be manipulated to divert the resource called Subscription which is configured as a
workflow: Production stage.
ensure that user and service accounts are only authorised [3] Glikson, A., Nastić, S., Dustdar, S., 2017. Deviceless edge computing:
extending serverless computing to the edge of the network.Publication:
to access the services that are required for their roles. SYSTOR '17: Proceedings of the 10th ACM International Systems and
Implement secure coding standards – secure coding can Storage Conference. ACM. p1
aide the prevention of security vulnerabilities within the [4] Kritikos, K., Skrzypek, P., 2018. A Review of Serverless Frameworks.
application code itself. Such practices can cover areas 2018 IEEE/ACM International Conference on Utility and Cloud
such as input validation, output encoding, session Computing Companion (UCC Companion). IEEE. p161.
management, error handling and logging. [5] Kim, J., Park, J., Lee, K., 2019. Network Resource Isolation in
Serverless Cloud Function Service. 2019 IEEE 4th International
Automate and secure deployment systems – remove Workshops on Foundations and Applications of Self* Systems
manual intervention by automating deployments where (FAS*W). IEEE. p183.
possible, implementing infrastructure as code and [6] Melamed, T., 2017. OWASP Top 10 (2017) Interpretation for
release artefact management for all infrastructure setup Serverless. https://www.owasp.org/images/5/5c/OWASP-Top-10-
Serverless-Interpretation-en.pdf.
and configuration. The introduction of DevOps and its
[7] Patnayakuni, R., Patnayakuni, N., 2018. Securing Serverless
utilisation of CI/CD practices, i.e. Continuous Computing. (SIGSEC). Association for Information Systems AIS
Integration/Continuous Delivery and Continuous Electronic WISP 2018 Proceedings Pre-ICIS Workshop on
Deployment, combined with a DevSecOps focus on Information Security and Privacy Library
Security, can ensure that deployment processes are built (AISeL).https://aisel.aisnet.org/wisp2018/15/.
with security in mind. Enforce governance of [8] Kanso, A., Youssef, A., 2017. Serverless: beyond the cloud. WoSC '17:
Proceedings of the 2nd International Workshop on Serverless
deployment infrastructure via segregation of duties, Computing. ACM. p6.
audits and security checks. [9] Asghar, T., Rasool, S., Iqbal, M., ul Qayyum, Z., Noor Mian, A.,
Continuous Monitoring - Ensure that consumers have Ubakanma, G. Feasibility of Serverless Cloud Services for Disaster
visibility of all cloud services and usage. Implement Management Information Systems. 2018 IEEE 20th International
Conference on High Performance Computing and Communications.
monitoring and metrics packages, create processes for IEEE
the handling of incidents, continually scan for [10] van Eyk, E., Toader, L., Talluri, S., Versluis, L., Uță, A., Iosup, A.
vulnerabilities within the architecture, categorise risk. (2018). Serverless is More: From PaaS to Present Cloud Computing.
Published in: IEEE Internet Computing (Volume: 22, Issue: 5,
VII. CONCLUSIONS Sep./Oct. 2018). IEEE. p9.
[11] Lee, H., Satyam, K., Fox, G., 2018. Evaluation of Production
This research has tried to analyse common attack patterns Serverless Computing Environments. In 2018 IEEE 11th International
within serverless and make recommendations on Conference on Cloud Computing (CLOUD). IEEE. p442.
counteracting these types of attacks. As the majority of attack [12] Saha, A., Jindal, S., (2018). EMARS: Efficient Management and
patterns are reliant on misconfiguration of serverless services Allocation of Resources in Serverless. Published in: 2018 IEEE 11th
International Conference on Cloud Computing (CLOUD). IEEE. p827
[21], it is imperative that consumers incorporate security
[13] Parres-Peredo, A., Piza-Davila, I., Cervantes, F., 2019. Building and
considerations early in their application lifecycle and put Evaluating User Network Profiles for Cybersecurity Using Serverless
practices in place to continually implement and enforce these Architecture. 2019 42nd International Conference on
practices throughout the lifespan of their applications. Telecommunications and Signal Processing (TSP). IEEE. p165.
[14] Mohanty, S., Premsankar, G., di Francesco, M., 2018. An Evaluation
We have included a discussion on serverless security of Open Source Serverless Computing Frameworks. 2018 IEEE
International Conference on Cloud Computing Technology and
vulnerabilities associated with the exploitation of function Science (CloudCom). IEEE. p115.
flow vulnerabilities, especially as the services and [15] Feng, L., Kudva, P., Da Silva, D., Hu, J., 2018. Exploring Serverless
capabilities provided by cloud service providers mature, so Computing for Neural Network Training. 2018 IEEE 11th International
do the attack vectors utilized by cybercriminals. This ensures Conference on Cloud Computing (CLOUD). IEEE. p334.
that security issues with serverless architectures remain [16] Lloyd, W., Ramesh, S., Chinthalapati, S., Ly, L., Pallickara, S., 2018.
Serverless Computing: An Investigation of Factors Influencing
relevant and should be an ongoing consideration for all Microservice Performance. 2018 IEEE International Conference on
serverless consumers. Cloud Engineering (IC2E). IEEE. p159.
[17] Sewak, M., Singh, S., 2018. Winning in the Era of Serverless
As long as these continue, further research is needed to Computing and Function as a Service. 2018 3rd International
counteract these attack vectors and ensure that consumers are Conference for Convergence in Technology (I2CT). IEEE. p1
protected. [18] Adzic, G., Chatley, R., 2017. Serverless computing: economic and
architectural impact. ESEC/FSE 2017: Proceedings of the 2017 11th
Joint Meeting on Foundations of Software Engineering. ACM.
ACKNOWLEDGMENT
[19] Thomas, I., 2018. Top 10 Security Risks In Serverless.
The authors would like to thank Letterkenny Institute of https://www.we45.com/blog/top-10-security-risks-in-serverless.
Technology for their funding of this research work. [20] Amazon, 2020. Security in AWS Security Hub.
https://docs.aws.amazon.com/securityhub/latest/userguide/security.ht
REFERENCES ml
[1] Taylor, H., 2019. 2020 CYBERSECURITY PREDICTIONS FOR [21] Radichel, T., 2020. Serverless Attack Vectors. RSA Conference 2020.
SOFTWARE DEVELOPMENT AND ENTERPRISE
ARCHITECTURE. ttps://journalofcyberpolicy.com/2019/12/21/2020-
cybersecurity-predictions-software-development-enterprise-
architecture/
[2] Lynn, T., Rosati, P., Lejeune, A., Emeakaroha, V., 2017. A Preliminary
Review of Enterprise Serverless Cloud Computing (Function-as-a-
Service) Platforms 2017 IEEE International Conference on Cloud
Computing Technology and Science (CloudCom). IEEE. p162.