YoVDO

OWASP Serverless Top 10 - Security Risks and Protections

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Cloud Computing Courses Serverless Architectures Courses Vulnerability Assessment Courses OWASP Top 10 Courses Code Injection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP Serverless Top 10 project in this conference talk from OWASP Global AppSec Tel Aviv. Dive into the unique security challenges presented by serverless architectures and learn how they differ from traditional application development. Discover why serverless functions, despite shifting some security responsibilities to infrastructure providers, still require vigilant protection against application-level attacks. Examine each of the top 10 risks identified in the project, understanding their implications and how to effectively safeguard applications against them. Get introduced to OWASP DVSA, a deliberately vulnerable tool designed to enhance understanding of serverless security for both security professionals and developers. Gain insights from Tal Melamed, Head of Security Research at Protego Labs, as he shares his expertise in offensive and defensive security for serverless technology, drawing from over 15 years of experience in security research and vulnerability assessment.

Syllabus

Introduction
Security
Service
Report
Code Injection
Permissions
Demo
Child process
Broken authentication
API Gateway
AWS
Risk
Excel
Command Injection
Crosssite scripting
Dependencies
Logging Monitoring
Architecture of Several


Taught by

OWASP Foundation

Related Courses

AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru
AZ-500 Microsoft Azure Security Technologies
A Cloud Guru
CompTIA CySA+ Certification
A Cloud Guru
CompTIA PenTest+ Certification
A Cloud Guru
Google Certified Professional Cloud Developer
A Cloud Guru