Request a Demo Contact Us
Attending Black Hat USA 2022? Come visit us to grab swag, hear talks, and see live demos!
Learn more

Serverless Top 10 Vulnerabilities

 

When adopting serverless technology, we eliminate the need to develop a server to manage our application and by doing so, we also pass some of the security threats to the infrastructure provider. However, serverless functions, even without provisioning or managing servers, still execute code. If this code is written in an insecure manner, it can still be vulnerable to traditional application-level attacks. The OWASP Serverless Top 10 project recently launched. In this talk, I will examine how the original Top 10 stack up for serverless apps. In particular, we’ll examine the differences in attack vectors, security weaknesses, and the business impact of successful attacks on applications in the serverless world, and, most importantly, how to prevent them. As we will see, attack vectors and prevention techniques are completely different from the traditional application world.

More resources

Datasheet

Attack Surface Management

Read More
Security Flash

How is Machine Learning and Data Science Transforming Cyber Security?

Watch Now
LevelUp

How to Use Zap + using Zap HUD in your browser

Learn More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.