Is security restricting your function as a service?

1 April 2019 Access Control & Identity Management, Integrated Solutions

You can’t deploy functions without the right security credentials. And they have a pretty massive identity access management (IAM) overhead when you consider that they’re very useful for throwing together a bunch of business applications. These can range from processing the data from mobile apps, to stream processing, batch processing, extraction, transformation, loading (ETL) and more. Chat bots can also benefit from FaaS, as can Web apps, business logic, and IoT sensor message systems.

Tallen Harmsen
Tallen Harmsen

All of that IAM in the background can lead to a lot of ‘Access Denied’ exceptions. The developers know this, of course, so they’re only too happy to circumvent the whole messy fuss by using IAM credentials that go ahead and give the functions full access to the APIs.

That’s great because the functions, and ultimately the services and applications, work perfectly in the development environment. But it’s a gaping hole in your security when it goes live and it’s the kind of thing that security audits, particularly in highly regulated environments, tend to go beyond just frowning upon.

Security can be a real bottleneck in the FaaS environment that’s supposed to ultimately make spawning prototypes, products and services on request for agile, nimble, business flexibility a fast and super slick process.

FaaS is supposed to make it easier to implement and consume the apps and services businesses need to be competitive. Many are customer facing so you can’t have them ruin your customer experience. Nor can you have them expose customers’ identities and other sensitive records to hackers.

Frictionless security based on smarter, machine learning algorithms can return the ease of use, and the painless speed of deployment and consumption to FaaS environments. And it can keep everything safe at the same time because you can trust that your security protocols will be implemented and maintained the way they should because they’re no longer a mandated evil – they’re just adopted.

Smarter, frictionless security uses machine learning algorithms to ensure optimal data accessibility, that people and systems are authenticated and validated, that their behaviour is within acceptable and defined parameters, and that the functions can operate seamlessly without interruption.

Frictionless security today is not the same as single sign on. It’s a lot more than sign me on once then forget about me. Frictionless today means you or the system signs on then you’re watched, your behaviour observed against learned and mandated procedures. That eliminates hackers being able to subvert systems to their nefarious will or having their own code replicate automatically and lock down systems in ransomware attacks, for example. Just as the attackers operate at the speed of automation so does frictionless security and it shuts the hackers’ code down before it can spread.

But, most importantly, it eliminates the gate-keeping security checks that have previously been a fine balancing act for the developers. Those who aren’t circumventing those roadblocks just so they can get the job done as they face pressures of their own.

Smart frictionless security today ensures you can deliver the application functions you need to serve the business functions that matter without impeding employees, partners and customers.

For more information contact IndigoCube, +27 11 759 5950, [email protected], www.indigocube.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...