Главная
Study mode:
on
1
Introduction
2
Mistakes Happen
3
What is Serverless
4
Service Architectures
5
Under the Hood
6
Trust the Cloud Provider
7
What to worry about
8
Misconfigurations
9
Software
10
OS Top 10
11
Injection Attack
12
Error Message
13
Cross Site Scripting
14
Swagger
15
Swagger UI
16
US Top 10
17
Cloud
18
Persistence
19
Server List
20
Lambda Functions
21
Encryption
22
Networking
23
Server list frameworks
24
API gateways
25
CDN
26
Lambda at Edge
27
Amazon Cognito
28
Databases
29
Subdomain Takeover
30
Deployment Systems
31
Service Monitoring
32
Threat Modeling
33
Demo
34
Querying
Description:
Explore serverless attack vectors in this 48-minute RSA Conference talk by Teri Radichel, CEO of 2nd Sight Lab. Gain insights into the security landscape of serverless architectures and learn about potential attack methods in this emerging environment. Discover how to attack and defend serverless infrastructure and applications, covering topics such as misconfigurations, software vulnerabilities, injection attacks, cross-site scripting, and subdomain takeovers. Examine service architectures, cloud provider trust, OS and US Top 10 security issues, encryption, networking, API gateways, and deployment systems. Witness a demo on querying and understand the importance of threat modeling in serverless computing. Suitable for those with a general understanding of breaches and basic awareness of simple code concepts.

Serverless Attack Vectors

RSA Conference
Add to list
0:00 / 0:00