Serverless Infections - Malware Just Found a New Home
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the security implications of serverless computing in this AppSecUSA 2018 conference talk. Discover how malware can infiltrate serverless environments as Erez Yalon presents the first-ever Remote Code Execution (RCE) attack in a serverless setting. Learn about the architecture and advantages of serverless computing, understand the associated security challenges, and witness a live demonstration of data infiltration, infection, and exfiltration. Gain insights into self-duplicating attacks that persist within the code and observe their execution across various serverless platforms. Delve into topics such as code injection, AWS SDK exploitation, Lambda security parameters, and Virtual Private Cloud considerations. Walk away with best practices and tips for maintaining security in serverless environments, equipping yourself to address critical questions organizations face when transitioning to this technology.
Syllabus
Intro
Evolution
Life cycle
Benefits and downsides
Common Use Cases
Serverless Security
Challenge Accepted
Code Injection
Checkmarks
payload
AWS SDK
Persistence
Onetime infection
Cross contamination
Lambda security
Lambda security parameters
Execution roll
Documentation
Virtual Private Cloud
Summary
Taught by
OWASP Foundation
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera