Главная
Study mode:
on
1
Introduction
2
Security
3
Service
4
Report
5
Code Injection
6
Permissions
7
Demo
8
Child process
9
Broken authentication
10
API Gateway
11
AWS
12
Risk
13
Excel
14
Command Injection
15
Crosssite scripting
16
Dependencies
17
Logging Monitoring
18
Architecture of Several
Description:
Explore the OWASP Serverless Top 10 project in this conference talk from OWASP Global AppSec Tel Aviv. Dive into the unique security challenges presented by serverless architectures and learn how they differ from traditional application development. Discover why serverless functions, despite shifting some security responsibilities to infrastructure providers, still require vigilant protection against application-level attacks. Examine each of the top 10 risks identified in the project, understanding their implications and how to effectively safeguard applications against them. Get introduced to OWASP DVSA, a deliberately vulnerable tool designed to enhance understanding of serverless security for both security professionals and developers. Gain insights from Tal Melamed, Head of Security Research at Protego Labs, as he shares his expertise in offensive and defensive security for serverless technology, drawing from over 15 years of experience in security research and vulnerability assessment. Read more

OWASP Serverless Top 10 - Security Risks and Protections

OWASP Foundation
Add to list