YoVDO

OWASP Serverless Top 10 - Security Risks and Protections

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Cloud Computing Courses Serverless Architectures Courses Vulnerability Assessment Courses OWASP Top 10 Courses Code Injection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP Serverless Top 10 project in this conference talk from OWASP Global AppSec Tel Aviv. Dive into the unique security challenges presented by serverless architectures and learn how they differ from traditional application development. Discover why serverless functions, despite shifting some security responsibilities to infrastructure providers, still require vigilant protection against application-level attacks. Examine each of the top 10 risks identified in the project, understanding their implications and how to effectively safeguard applications against them. Get introduced to OWASP DVSA, a deliberately vulnerable tool designed to enhance understanding of serverless security for both security professionals and developers. Gain insights from Tal Melamed, Head of Security Research at Protego Labs, as he shares his expertise in offensive and defensive security for serverless technology, drawing from over 15 years of experience in security research and vulnerability assessment.

Syllabus

Introduction
Security
Service
Report
Code Injection
Permissions
Demo
Child process
Broken authentication
API Gateway
AWS
Risk
Excel
Command Injection
Crosssite scripting
Dependencies
Logging Monitoring
Architecture of Several


Taught by

OWASP Foundation

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam