YoVDO

Serverless Infections - Malware Just Found a New Home

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cloud Computing Courses Serverless Computing Courses Code Injection Courses

Course Description

Overview

Explore the security implications of serverless computing in this AppSecUSA 2018 conference talk. Discover how malware can infiltrate serverless environments as Erez Yalon presents the first-ever Remote Code Execution (RCE) attack in a serverless setting. Learn about the architecture and advantages of serverless computing, understand the associated security challenges, and witness a live demonstration of data infiltration, infection, and exfiltration. Gain insights into self-duplicating attacks that persist within the code and observe their execution across various serverless platforms. Delve into topics such as code injection, AWS SDK exploitation, Lambda security parameters, and Virtual Private Cloud considerations. Walk away with best practices and tips for maintaining security in serverless environments, equipping yourself to address critical questions organizations face when transitioning to this technology.

Syllabus

Intro
Evolution
Life cycle
Benefits and downsides
Common Use Cases
Serverless Security
Challenge Accepted
Code Injection
Checkmarks
payload
AWS SDK
Persistence
Onetime infection
Cross contamination
Lambda security
Lambda security parameters
Execution roll
Documentation
Virtual Private Cloud
Summary


Taught by

OWASP Foundation

Related Courses

Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Cloud Computing
Indian Institute of Technology, Kharagpur via Swayam
Elastic Cloud Infrastructure: Containers and Services en Español
Google Cloud via Coursera
Kyma – A Flexible Way to Connect and Extend Applications
SAP Learning
Modernize Infrastructure and Applications with Google Cloud
Google Cloud via Coursera