From Containers to Serverless: Keys to Securing Cloud Native Workloads
As your environment expands from managing your own containers to include Containers as a Service (CaaS) and Serverless, what are the new risks of abstracting the underlying infrastructure? What are the best practices for ensuring consistent policies and compliance across hybrid environments combining serverless and containers?
Explore the impact of CaaS and Serverless deployments on the enterprise security landscape and how to best protect applications regardless of where they run.
- The attack vectors of serverless environments
- The common practices which can be used across the different platforms
- The unique steps to protect each workload type and environment
- Why legacy security tools are not sufficient for microservices landscape
You’ll walk away with a solid understanding of how to combat the inherent security challenges of Serverless architectures and microservices landscape.