Advances, Systems and Applications
 | Monoliths | Microservices | Serverless |
---|---|---|---|
Feasibility of long-lasting attacks | High | High | Low |
Main responsible for security | Mostly app owners | Mostly app owners | Shared responsibility |
Entry points for adversaries | Few | Medium | Many |
Resistance to Denial-of-Service attacks | Low | Medium | High |
Resistance to Denial-of-Wallet attacks [25] | High | Medium | Low |
Communication with other components | None | Medium | High |
Visibility of underlying infrastructure | High | High | Low |