Learning Library

← Back to Library

Navigating Traditional, Cloud‑Native, and Serverless Risks

Key Points

  • The technology landscape can be divided into three buckets—traditional monolithic deployments, cloud‑native container‑based systems, and the newer serverless platforms—each carrying its own risk profile.
  • Traditional deployments relied on large WAR/EAR files, required weeks or months to release, and were fraught with manual effort and frustration.
  • Cloud‑native containers break applications into smaller, portable units, allowing code to be packaged once and run anywhere, with deployments now possible in minutes.
  • Serverless builds on containers but abstracts them into single‑function microservices, minimizing the code changes you manage while introducing a distinct set of operational and security risks.
  • To mitigate risks in cloud‑native adoption, organizations foster trust in engineers, enforce the “4‑I” (four‑eye) rule for incremental changes, and automate releases with bots, shifting control from manual gatekeepers to automated pipelines while adding new complexity.

Full Transcript

# Navigating Traditional, Cloud‑Native, and Serverless Risks **Source:** [https://www.youtube.com/watch?v=BYTgP6GmwcQ](https://www.youtube.com/watch?v=BYTgP6GmwcQ) **Duration:** 00:04:57 ## Summary - The technology landscape can be divided into three buckets—traditional monolithic deployments, cloud‑native container‑based systems, and the newer serverless platforms—each carrying its own risk profile. - Traditional deployments relied on large WAR/EAR files, required weeks or months to release, and were fraught with manual effort and frustration. - Cloud‑native containers break applications into smaller, portable units, allowing code to be packaged once and run anywhere, with deployments now possible in minutes. - Serverless builds on containers but abstracts them into single‑function microservices, minimizing the code changes you manage while introducing a distinct set of operational and security risks. - To mitigate risks in cloud‑native adoption, organizations foster trust in engineers, enforce the “4‑I” (four‑eye) rule for incremental changes, and automate releases with bots, shifting control from manual gatekeepers to automated pipelines while adding new complexity. ## Sections - [00:00:00](https://www.youtube.com/watch?v=BYTgP6GmwcQ&t=0s) **Three Modern Deployment Paradigms** - The speaker outlines the three main technology buckets—legacy WAR/EAR deployments, container‑based cloud‑native approaches, and the newer serverless platforms—explaining their characteristics, speed benefits, and associated risks. ## Full Transcript
0:00so let's talk about the three different 0:01buckets that exist with technology 0:03nowadays in the cloud native space or 0:05technology in general you have the 0:07traditional way of doing it now you have 0:09this new wave or Cloud native coming 0:11down the line and then also you have the 0:13serverless platform that is pretty new 0:16and still has a level of risk that you 0:18need to think about so let's dig into 0:20each one of these a little bit deeper we 0:22have our traditional ways of doing 0:23things we used to have this little war 0:25file or ear file or something like that 0:28to deploy our code to our servers 0:30then we'd have 0:32something that would sometimes take 0:34months or if not weeks to deploy and it 0:36costs so many frustrations what can we 0:39were moving past this and now we're 0:40moving to our new wave Frankly Speaking 0:42I'm calling it New Wave because I don't 0:43want to say cloud native over and over 0:45again but what is it it's our next step 0:47it's what we're moving past our 0:49traditional way of doing things 0:51we have these great things called 0:52containers now which allows us to be 0:54able to package up our code in smaller 0:57bits and be able to push things out 1:00in a fast efficient way and share code 1:03where it works on my laptop no longer 1:06means it just works on your laptop it 1:08works anywhere anywhere a container can 1:10run 1:11and another great thing about the new 1:13wave or the cloud native space 1:15is that it only takes minutes to deploy 1:17now you're probably wondering why am I 1:20talking about all this and I should be 1:21talking about risk we need to have some 1:23level set of understanding of all these 1:25different Technologies before we dig 1:27into the risk profiles of each of these 1:29and hopefully it'll open up some spaces 1:31for this 1:32serverless is still built off of 1:34containers just like our new wave or 1:36cognative space 1:37but the beauty of it is is it's so small 1:40it's just the changes you need to worry 1:42about it leverages true microservices 1:45where functions do all the work 1:48but that brings in an interesting risk 1:50profile when you start talking about 1:51these Technologies 1:53so let's actually take this next step 1:54and talk about what happens when you 1:57start worrying about these different 1:58systems for your risks 2:00so how are the companies actually 2:02mitigate risk when it comes to moving 2:04the cloud native 2:05first thing they do is they start to 2:07learn to trust their engineers 2:09but with that trust takes a little bit 2:10of time 2:12they'll cover something called the 4i 2:13rule and make small iterative changes 2:17with that comes at least four eyes 2:19looking at every Small Change 2:22to be able to be merged into the main 2:24main branch 2:26but when that gets merged what happens 2:28next 2:29they Leverage The Bots to do the work 2:31for you no longer do you have someone 2:33releasing some code at three in the 2:35morning 2:35instead when you merge it into the main 2:38branch the Bots take over and release 2:40the code for you 2:42this means you no longer have a Council 2:44of Elders of senior engineers and 2:46Executives discussing every single 2:48change 2:49now you let the Bots do the work for you 2:52but with that comes complexity we're 2:55going to talk about 2:56how to take care of some of that 2:57complexity 2:58however something called get UPS 3:00which believe it or not is pretty dang 3:03cool 3:04so what is get UPS 3:06simply said 3:08it's leveraging a git repository as your 3:10source of Truth for the deployment of 3:12your applications it can be production 3:14it can be development could be even Dev 3:16so how does get Ops actually make your 3:18life easier when it comes from from the 3:20angle of risk 3:22first thing first you can actually audit 3:24what any change you've ever made can you 3:27actually answer when the last time you 3:29deployed your application and who made 3:31what change 3:32the majority of people out there they 3:35can't whoever's in get UPS you actually 3:37have an audible system through the git 3:39history 3:40with that too that means you can also 3:42verify what the change has been made 3:44because it's cryptographically signed 3:46using the git hash algorithm this is 3:49important especially in regulated 3:50environments 3:52taking it a step farther if something 3:54horrible goes wrong you actually take 3:56that git Repository 3:58and recreate whatever you're trying to 4:00do in another environment 4:02this gives you the ability to 4:04make sure that it comes out exactly how 4:06you want every single time 4:09you have to leverage different 4:10Technologies though 4:12to enforce these get UPS principles like 4:14Argo CD or flux CD 4:16but that means you need to start 4:17trusting the Bots to do the work for you 4:20this is going to be a big problem for a 4:21lot of companies because no longer 4:24you're going to have humans do these 4:25changes 4:26you're now having the machines do the 4:28changes 4:29so you're going to have to spend some 4:31time with the operations team your SRE 4:33team your devops team 4:35to really be able to embrace this new 4:38mentality 4:39but you will reduce your risk in the 4:42long term because you'll be able to 4:44enforce things leveraging the get-offs 4:46principles 4:48thank you if you like this video and 4:50want to see more like it please like And 4:52subscribe if you have any questions 4:53please drop them in the comments below