Stronger Cloud Security in Azure Function Using Custom Cloud Container

Stronger Cloud Security in Azure Function Using Custom Cloud Container


In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security gaps in Azure Functions.

By: David Fiser, Alfredo Oliveira September 29, 2022 Read time:  ( words)

We have written extensively on the security gaps in Azure Functions and Azure App Services, including their consequences. One way developers can enhance cloud security and minimize these gaps is to create custom container image and use the Distroless approach. In this entry, we veer the conversation toward what skilled developers can do to minimize the impact of these security gaps, specifically in Azure Function.

Azure Functions

Azure Functions is a serverless solution aimed at simplifying the deployment and maintenance of applications for developers.

At its surface, we have the App Service plan, which guarantees physical hardware allocation and which we could imagine as a virtual machine. Inside that, we can find a Docker container engine installed. This engine executes a container image that is built with Azure-function-host runtime. Azure-function-host, by its name, effectively manages the Azure Function Runtime, making it responsible for communication with Azure back ends.

This architecture executes azure-functions-worker when serverless function execution is triggered, which in turn executes the actual serverless application with the provided function code.

Read more

Explore the site

More from the blog

Latest News