Shadow APIs and Serverless Apps
Serverless computing is gaining momentum among developers. Software engineers are now able to build applications that deliver scale and business value without consideration for the complexity of operations and security.
However, to believe there are fewer security problems with serverless applications would be an unwise assumption. Security problems still exist with serverless, but our focus needs to shift particularly to the world of application programming interfaces (APIs) where sensitive data is prominently transferred in these modern application designs.
Read this report to learn about:
- Data leaks through Shadow APIs
- API gateway security limitations
- API security needs for serverless apps