Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 09_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 09_ocred.pdf
- Cloud Computing Course Book PDF
- AWS Certified Cloud Practitioner v3 PDF
- AWS Lambda Knowledge Check - Modules 7-13 PDF
- Security Implications of Different Architecture Models PDF
- Chapter 8. Serverless Processing Systems PDF
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing What is Serverless Computing? Q Serverless computing also known as se...
Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing What is Serverless Computing? Q Serverless computing also known as serverless architecture or Function-as-a-Service (Faa$), (FaaS), is a cloud-based application architecture where application infrastructure and supporting services are provided by the cloud vendor as they are needed QO Serverless computing simplifies the process of application deployment and eliminates the need for managing the server and hardware by the developers........ Content Delivery ~ Object Object Store with Static Content @ g — — ‘% ‘% oNS DNS Network % Routing 000 ".... 7?.......... > E Client Client i b Application L \— Application €|..... Es E (©: ©: & = -il Cloud Server APl APL e, Data Store Serverless aythentication Functions What is Serverless Computing? Serverless computing, also known as serverless architecture or FaaS, has a cloud-based application architecture, where application infrastructure and supporting services are provided by the cloud vendor as needed. Serverless computing simplifies the process of application deployment and eliminates the need for managing the server and hardware by the developers. Serverless applications are not purely serverless; servers are required but not physically exposed to the developers. In the serverless architecture, the application code runs on the cloud-hosted infrastructure managed by a third-party service provider. The cloud service provider is responsible for provisioning, scaling, load balancing, and securing the serverless infrastructure. Furthermore, the cloud service provider is also responsible for patch management of the operating systems and underlying software and services. Advantages: = High scalability and flexibility = Faster deployment and updating = Reduced infrastructure cost * No server management * Pay-per-use = Reduced latency and scaling cost = Quicker provisioning of resources = Low risk of failure * No system administration Module 10 Page 1285 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Disadvantages: = Increased security vulnerability |ncreased = Vendor-lock-in = Difficulty in managing statelessness = Complex end-to-end application testing J€S = Unsuitability of long-running processes for serverless computing * L)Ll.+*"".**" Content Delivery Object Store with @ Sl o’ Network Static Content W % DNs. Routing — ~ 2 Routing..,.. F. [ OUuy '-.,...,....i D= Client CI!ent. Application., ‘e, >™ ) — Al A , Jo** Session Store = PN = (o : II..I..I...."I> u]-...llll.l.)r N IIIIIII-l>v o o — A Cloud Server API APl ", Data Store Gateway _; (N T SERRnnnnn > Serverless aythentication Authentication Functions Figure 10.16: Serverless architecture Module 10 Page 1286 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Serverless Vs. Containers A * The developer is responsible for defining container * Thedeveloper only needs to develop and upload code to configuration files along with the operating system, support serverless computing; the entire provisioning software, libraries, storage, and networking process is taken care of by the cloud service provider * Once initiated, the container runs continuously until * Once completed running, the serverless function is the developer stops or destroys it automatically destroyed by the cloud environment * Acontainer needs server support even when the = Serverless deployment charges only for the resources container is not executing any programs consumed * There is no time restriction for the code running * Timeout is enabled on serverless functions inside the container * Containers support running on a cluster of host * Theunderlying host infrastructure is transparent to nodes developers * Containers store data in temporary storage or * Serverless functions do not support temporary storage; mapped storage volumes instead, data is stored in the object storage medium * Containers support both complex applications and * Serverless functions are suitable only for microservices lightweight microservices applications * Developers can select their choice of language and * Language selection for serverless functions is restricted by runtime for applications running in a container the cloud service provider Copyright © by | L All Rights Reserved. Reproduction is Strictly Prohibited Serverless Vs. Containers The table below summarizes the differences between serverless computing and containers. Containers Serverless Computing = The developer is responsible for defining the container configuration files along with the = The developer only needs to develop and operating system, software, libraries, upload the code to support serverless storage, and networking. computing; the entire provisioning process is = Developer then creates an image from that taken care of by the cloud service provider. file, pushes the image to a registry, and runs a container from that image. = Once initiated, the container runs = After it completes execution, the serverless continuously until the developer stops or function is automatically destroyed by the destroys it. cloud environment. = A container needs server support even when | = Serverless deployment charges only for the the container is not executing any programs. resources consumed. = There is no time restriction for the code S : = Timeout is enabled on serverless functions. running inside the container. = Containers support running on a cluster of = The underlying host infrastructure is host nodes. transparent to developers. = Serverless functions do not support = Containers store data in temporary storage temporary storage; instead, data is stored in or mapped storage volumes. the object storage medium. Module 10 Page 1287 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing = (Containers Containers support both complex = Serverless functions are suitable only for applications and lightweight microservices. microservices applications. = Developers can select the language and = Language selection for serverless functions is runtime for applications running in a restricted by the cloud service provider. container. Table 10.2: Serverless Vs. Containers Module Module 10 Page Page 1288 1288 Certified Certified Cybersecurity Technician Technician Copyright Copyright ©© by EG-Council EG-Gomnell All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Serverless Computing Frameworks : AWS La bd QO Microsoft Azure Functions is a serverless computing platform that allows I @ Mut//mr:mmauan users to run code without provisioning and managing servers :. func-green - Application map P X W Dinins v] Busese Oote : Google Cloud Functions e. ! https://cloud.google.com 1BM Cloud Functions ‘.\ v/ \ ! https://www.ibm.com Sun Q l ‘ 17K calls 35k calls 17K colls B Workbooks 3ecale appmap&e?'a.:bmnnet appmaplega.. bsites net — NTTP Usage func- func-orange Usage -. *ie Figure 10.17: Screenshot of Microsoft Azure Functions * AWS Lambda (https://aws.amazon.com) * Google Cloud Functions (https://cloud.google.com) (https.//cloud.google.com) = |BM Cloud Functions (https://www.ibm.com) = AWS Fargate (https://aws.amazon.com) = Alibaba Cloud Function Compute (https.//www.alibabacloud.com) (https://www.alibabacloud.com) Module 10 Page 1290 Certified Cybersecurity Technician Copyright © by EG-ouncil EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.