Download Publication

The 12 Most Critical Risks for Serverless Applications
Release Date: 02/11/2019
Working Group: Serverless
The 12 Most Critical Risks for Serverless Applications 2019 document is meant to serve as a security awareness and education guide. This report was curated and maintained by top industry practitioners and security researchers with vast experience in application security, cloud, and serverless architectures.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Sean Heide
Sean Heide
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel
Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK, CCSP and CCAK certification and participate in various initiative promoting responsible cloud adoption.

Izak Mutlu
Izak Mutlu

Daniel Hiestand
Daniel Hiestand

Ory Segal
Ory Segal

Shaked Zin
Shaked Zin

Avi Shulman
Avi Shulman

Yuri Shapira
Yuri Shapira

Alex Casalboni
Alex Casalboni

Andreas Nauerz
Andreas Nauerz

Ben Kehoe
Ben Kehoe

Benny Bauer
Benny Bauer

Dan Cornell
Dan Cornell

David Melamed
David Melamed

Erik Erikson
Erik Erikson

Jabez Abraham
Jabez Abraham

Mike Davies
Mike Davies

Nir Mashkowski
Nir Mashkowski

Ohad Bobrov
Ohad Bobrov

Orr Weinstein
Orr Weinstein

Peter Sbarski
Peter Sbarski

James Robinson
James Robinson

Marina Segal
Marina Segal

Mike McDonald
Mike McDonald

Jared Short
Jared Short

Jeremy Daly
Jeremy Daly

Yan Cui
Yan Cui
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more