Главная
Study mode:
on
1
Intro
2
Cloud Serverless Infrastructure
3
Puma Security: Serverless Prey
4
Establishing The Function Reverse Shell
5
Serverless Execution Environment
6
Default Function Execution Networking
7
Serverless Secrets Management Options
8
Serverless Secrets: Where is the Source Code?
9
GCP Function: Source Code Example
10
GCP Function: Configuration File Example
11
Azure Function: Environment Variable Example
12
Serverless Execution Role
13
Serverless Account Credential Storage
14
Azure Managed Service Identity Token
15
Function Credential Pivoting
16
Serverless Function Credential Lifetime
17
Function Malware Persistence Example
18
Serverless Function Persistence Lifetime
19
Function Credential Audit Logging
20
Function Network Integration Options
21
Function Network Integration Benefits
22
Function Network Integration Example
23
Function Network Access Control Rules
24
Function Network Flow Logs
25
Function Private Endpoints
Description:
Explore the challenges and solutions for defending serverless infrastructure in the cloud in this 52-minute technical session from the RSA Conference. Learn about real-world attacks on cloud workloads and discover effective security controls to protect your serverless environment. Gain insights into inventorying, scanning, and monitoring thousands of short-lived functions. Examine topics such as establishing function reverse shells, serverless execution environments, secrets management, credential pivoting, malware persistence, network integration options, and access control rules. Understand the importance of audit logging, flow logs, and private endpoints in securing serverless infrastructure. Requires a general understanding of cloud, serverless, and DevOps concepts, as well as familiarity with OWASP Serverless Top 10 and various cloud security services.

Defending Serverless Infrastructure in the Cloud

RSA Conference
Add to list