IT leaders say that Function-as-a-Service is a positive result of years of data
CIOs are increasingly considering the implementation of the Function-as-a-Service platform to realize its benefits and power. IT leaders acknowledge that FaaS will not completely displace the enterprise’s IT functionalities based on cloud platforms, but the service will help organizations to figure out the economic scale and ROI based on the public cloud implementation.
CIOs propose using enterprise management services fueled by secure enclaves as an effective measure to securely implement business logic and programs. FaaS platform enables protected execution, and attain safe attributes via confidential computing. Secure enclaves help to secure data during runtime and safeguard the devices if they are compromised while enabling enterprise key management services. This helps firms to utilize the advantages of public cloud platforms, but not disclose the cloud security public.
IT leaders agree that an effective enterprise key management service should be scalable, disaster recovery support, and built-in high availability. Organizations should also consider the following features like multi-tenancy, HSM functionality, cloud-like scalability, enterprise key management, secret management, FIPS 140-2 Level 3 certificates, tokenization, data masking, and application encryption, to fully realize the advantages of a secure FaaS platform.
IT leaders imply that confidential computing is a key factor in enterprise key management services. It boosts an organization’s decentralization efforts and helps implement the confidential business logic, securely.
Storing data and credit history in Amazon Web Services
Financial organizations have uploaded the history and private data of their customers in platforms using enterprise key management service and client-side encryption. IT leaders state that this method can use customers’ historical data to predict the confidential credit data.
Execution of financial transactions via public clouds
IT leaders state that financial organizations implement both Azure and AWS, and attend to
customers by distributing workloads across geographical locations. For instance, the applications implemented in Azure and AWS, communicate via TLS. For transactions that require PIN transfer between AWS and Azure, the key is tokenized and encrypted with an AES key before being passed on to customers via an Azure application.
Storing records on the Google Cloud Platform
IT leaders in a health organization feel that customers’ data can be stored in enterprise key
management service, encrypted with BigQuery. They state that customer’s records are verified via a fraud detection application to compare SSNs to ensure it hasn’t been compromised. Breached SSNs data is obtained by third-party vendors. CIOs state that without confidential computing such a public cloud computation at this scale is not possible.
CIOs assert that with enterprise key management services confidential data is secure even in public clouds and stays private even if the hardware is breached.