Главная
Study mode:
on
1
Intro
2
Serverless encourages functions as deploy units, coupled with third party services that allow running end-to-end applications without worrying about system operation. New serverless patterns are just…
3
MISCONCEPTIONS
4
IT'S MARKETING (CLOUD REBRANDED)
5
SERVERLESS == CLOUD
6
Serverless was first used to describe applications that significantly or fully depend on 3rd party applications / services ('in the cloud') to manage server-side logic and state.
7
SERVERLESS IS (NO MANAGEMENT OF) SERVERS
8
OPINIONATED FRAMEWORK FOR COMPUTE
9
PRIVATE CLOUD
10
THEN, ALONG CAME CONTAINERS
11
CONTAINERS ARE TEH HAWTNESS
12
SCALING BUILT IN
13
PAY FOR WHAT YOU USE IN 100MS INCREMENTS
14
WITH SERVERLESS SYSTEM ADMINISTRATION IS (MOSTLY) LOWER
15
LEAN STARTUP FRIENDLY
16
GREAT, WHAT'S THE CATCH?
17
OPS BURDEN TO RATIONALIZE SERVERLESS MODEL (SPECIFICALLY DEPLOY)
18
STATELESS FOR REAL NO MEMORY PERSISTENCE ACROSS FUNCTION RUNS
19
RELIABILITY
20
SERVERLESS USE CASES
21
RUN A WEB APPLICATION
22
SECURITY IS THE SAME AND DIFFERENT
23
WHAT USED TO BE SYSTEM CALLS IS NOW DISTRIBUTED COMPUTING OVER THE NETWORK
24
SERVERLESS SHIFTS ATTACK SURFACE TO THIRD PARTIES
25
LETS TRY A SAMPLE APPLICATION IN AWS
26
SURFACE AREA REDUCTION!
27
SURFACE AREA EXPANSION!
28
USE A THIRD-PARTY SERVICE FOR CONFIG CHANGES
29
INTEGRATION TESTING
30
Application layer
31
TIMEOUTS AND EXECUTION RESTRICTIONS
32
Serverless encourages functions as deploy units, coupled with third party services that allow running end-to-end applications without worrying about system operation. • New serverless patterns are ju…
Description:
Explore the security implications of serverless computing in this 46-minute LASCON conference talk. Dive into the challenges and opportunities presented by serverless architectures, including AWS Lambda, Azure Functions, and Google Cloud Functions. Learn how traditional security approaches must adapt to this new paradigm where processes run for milliseconds before being destroyed. Discover practical security strategies focusing on four key areas: software supply chain, delivery pipeline, data flow, and attack detection. Gain insights into serverless adoption patterns and witness a live demo of building and securing a complete serverless application. Whether you're a C-level executive or a developer, acquire valuable knowledge about serverless security principles and practices applicable to your role.

Doing Security in 100 Milliseconds - The Speed of Serverless Computing

LASCON
Add to list
0:00 / 0:00