Defending Serverless Infrastructure in the Cloud
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Cloud Serverless Infrastructure
Puma Security: Serverless Prey
Establishing The Function Reverse Shell
Serverless Execution Environment
Default Function Execution Networking
Serverless Secrets Management Options
Serverless Secrets: Where is the Source Code?
GCP Function: Source Code Example
GCP Function: Configuration File Example
Azure Function: Environment Variable Example
Serverless Execution Role
Serverless Account Credential Storage
Azure Managed Service Identity Token
Function Credential Pivoting
Serverless Function Credential Lifetime
Function Malware Persistence Example
Serverless Function Persistence Lifetime
Function Credential Audit Logging
Function Network Integration Options
Function Network Integration Benefits
Function Network Integration Example
Function Network Access Control Rules
Function Network Flow Logs
Function Private Endpoints
Taught by
RSA Conference
Related Courses
Microsoft Azure for Node.js Developers - Building Secure Services and ApplicationsPluralsight Configuring and Managing Microsoft Azure Key Vault
Pluralsight Threat Modeling: Information Disclosure in Depth
LinkedIn Learning Getting Started with HashiCorp Vault
Pluralsight Installing and Configuring HashiCorp Vault
Pluralsight