Главная
Study mode:
on
1
Intro
2
The Evolution of the Cloud
3
Is it here to stay?
4
Serverless Providers
5
Event Injection
6
Broken Authentication
7
XML External Entity
8
Broken Access Control
9
Security Misconfiguration
10
Cross-Site Scripting
11
Insecure Deserialization
12
Insufficient Logging & Monit A
13
How can we learn more
14
DVSA eXpliter
Description:
Explore the top 10 vulnerabilities in serverless architectures in this 52-minute conference talk by Tal Melamed from Bugcrowd. Dive into the OWASP Serverless Top 10 project, examining how traditional security threats apply to serverless applications. Discover the unique attack vectors, security weaknesses, and business impacts specific to the serverless world. Learn about crucial differences in prevention techniques compared to traditional applications. Gain insights into topics such as event injection, broken authentication, XML external entity attacks, access control issues, security misconfigurations, cross-site scripting, insecure deserialization, and insufficient logging and monitoring. Understand the evolution of cloud computing, serverless providers, and the importance of adapting security practices for this emerging technology. Conclude with resources for further learning, including the DVSA eXpliter tool.

Serverless Top 10 Vulnerabilities by Tal Melamed

Bugcrowd
Add to list
0:00 / 0:00