SlideShare a Scribd company logo
1 of 55
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Dave Walker
Specialist Solutions Architect, Security and Compliance
23/06/16
Securing Serverless Architectures
With Thanks To:
Agenda
• Serverless Architectures: What they Are
• “Caveat Emptor”?
• Constraining Access and Permissions
• Wrapping AWS Lambda Functions
• Amazon API Gateway and AWS Service API Endpoints
• Generalising Across Serverless Functions
• Conclusions
Serverless Architectures:
What They Are
Serverless Architectures: What they Are
• “The shiny new thing”
• …though Amazon S3 has been around for 10 years, now
• “Object stores, object transmission and aggregation
pipelines, object format tranformers, standalone code
execution systems”
• Abstract (and sometimes, Container) Services
• AWS looks after the underlying OS, High Availability, Scaling,
often Application, transparently
• Often event-driven (Lambda triggers etc)
• “Customers only need to worry about their functionality”
Serverless Services
For Example…
Internet
Website
Activity
Indicator
Chat Service
Activity
Messages
Search
Service
Dynamo Streams
Elasticsearch
Service
Web Hosting
Twilio
Slack Chat
API Gateway
IoT
Backend Logic
“Caveat Emptor”?
“Everything Starts with a Threat Model”
• STRIDE, DREAD, others
• Identify:
• Actors
• Vectors
• “Bad stuff that could happen, when bad people get creative”
• Probabilities and consequences of bad stuff happening
• Apply technical and procedural mitigations
• …all the way up the OSI stack, from Network to Application
Attack Vectors
• Application-level and API-level attacks
• “If it takes input, it likely has an in-band attack vector”
• “If it has a control point, it likely has an out-of-band attack
vector”
• “Even if it doesn’t itself have a useful compromise, it might be
a useful propagation vector”
• A successful attack = disruption or corruption of service
output, or reduction in responsiveness to future service
calls, or being a conduit of “bad content” to vulnerable
consumers of the service.
• Consider the OWASP Top 10 and other application-level
attacks…
Control Points and Out-of-band Attacks
• (Almost) everything in our list has an API Endpoint.
• API Endpoints are exposed to the Internet over https, using
TLS 1.2 and unidirectional trust via s2n
• API Endpoints are scaled, rate-managed and connection-
monitored
• API Endpoint calls need Sigv4
• SHA256 HMAC with Secret Access Key (240-bit entropic) over
REST request
• REST calls are checked for formation correctness
• Looking pretty well-covered…
In-band Attacks
• There are more variables here – consider access
methods and content sizes:
Constraining Access and
Permissions
IAM is your First Port of Call
• Quickest and highly effective way to reduce risk of
serverless “misbehaviour” at sub-data level
• All API access should be Role-based
• Roles can be given to EC2 Instances and Lambda functions
• Roles use ephemeral STS tokens rather than static keys
• Reduces consequences of static key mishandling, no motivation
to hard-wire into code
• Cross-account access gets close to Mandatory Access
Control
• See video of presentation from UK Security Roadshow
(Coming Soon)
IAM is your First Port of Call
• API calls can be constrained in IAM by Source IP
address
• Get the AWS range from https://ip-
ranges.amazonaws.com/ip-ranges.json
• We could use this to ensure that only our wrapper functions
can call our main Lambda functions or the real API endpoints
• Recent development: verify when permissions were last
used
• See
https://blogs.aws.amazon.com/security/post/Tx280RX2WH6
WUD7/Remove-Unnecessary-Permissions-in-Your-IAM-
Policies-by-Using-Service-Last-Access
Wrapping Lambda Functions
Let’s start with Lambda…
• Why?
• It’s a great test case, as:
• It can take input from (almost) anywhere
• It can do (almost) anything with that input, given appropriate
permissions
• It can output (almost) anything to (almost) anywhere
• Customers have control over what happens between input and
output
• Risk: “you can write insecure code in any language (including
Node.js, Java, Python and anything you can call from them…)”
Let’s start with Lambda…
• Already good info on developing Lambda functions -
https://aws.amazon.com/blogs/compute/continuous-
integration-deployment-for-aws-lambda-functions-with-
jenkins-and-grunt-part-1/ ,
https://aws.amazon.com/blogs/compute/continuous-
integration-deployment-for-aws-lambda-functions-with-
jenkins-and-grunt-part-2/
• Lambda functions run in an IAM role
• Consider cross-account function calls (see
https://aws.amazon.com/blogs/compute/easy-authorization-
of-aws-lambda-functions/ )
• Now let’s add a front-end wrapper / filter and back-end / side
API checker…
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
“Back end”
“Front end”
Our original functionTrigger event source
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
1. Event triggers wrapper
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
1. Event triggers wrapper
2. Wrapper passes trigger data
to analyser
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
3. Analyser reads data
1. Event triggers wrapper
2. Wrapper passes trigger data
to analyser
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
3. Analyser reads data
1. Event triggers wrapper
2. Wrapper passes trigger data
to analyser
4. Wrapper invokes Function
API endpoint
Wrapping Lambda Functions
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
5. Function reads data and processes as normal
3. Analyser reads data
1. Event triggers wrapper
2. Wrapper passes trigger data
to analyser
4. Wrapper invokes Function
API endpoint
Wrapping Lambda Functions
• First function, configured to trigger on the Lambda event,
is a front-end wrapper
• Passes copy of trigger event input and context to analysis
engine (hello, Alert Logic  )
• Optionally, waits for “content OK” response from analysis
engine (in-band checking) to determine whether main
Lambda function should be invoked
• …or calls main Lambda function immediately, if performance
is more critical (out-of-band checking)
• Has the same IAM Read / Get permissions in its role as the
main Lambda function, plus what’s needed to send trigger
info and invoke the main Lambda function
Wrapping Lambda Functions
• Analysis Engine
• Needs IAM permissions to be able to read from the trigger
source
• Needs to be configurable to respond to the calling Lambda
function after checks are complete (in-band checking, IPS-
style) and / or raise alerts – eg via SNS – if “badness” is
found (out-of-band checking, IDS-style)
• In discussion with Alert Logic (co-inventors), but concept and
invocation mechanisms are non-exclusive
Wrapping Lambda Functions
• Second function, invoked by the first, is our main
Lambda function
• Modify the permission conditions in the IAM role so that this
function can only be called from IP addresses in the
AMAZON range in the same Region
• ie our wrapping Lambda function
• Consider passing and verifying a shared secret
• With the front-end wrapped, now let’s look at the back…
API Gateway and API
Endpoints
API Gateway and API Endpoints
bucket
AWS
Lambda
AWS
Lambda
AWS
Lambda
Amazon
API
Gateway
“Back end”
API endpoint
API Gateway and API Endpoints
• Consider API Gateway as a protective front-end onto the
main AWS API Endpoints
• Can rate-limit calling frequency
• Can have back-end Lambda functions on each of REST GET,
PUT, POST, PATCH, DELETE, HEAD, OPTIONS to check
call content
• Supports Sigv4 – and generates logs
• So, we have a back-end wrapper function 
• …But we need to make API Gateway the target(s) for
calls to API Endpoints, in our main Lambda function…
• Easy!
Endpoint mappings in boto and Java SDK:
{
"autoscaling": {
"ap-northeast-1": "autoscaling.ap-northeast-1.amazonaws.com",
"ap-northeast-2": "autoscaling.ap-northeast-2.amazonaws.com",
"ap-southeast-1": "autoscaling.ap-southeast-1.amazonaws.com",
"ap-southeast-2": "autoscaling.ap-southeast-2.amazonaws.com",
"cn-north-1": "autoscaling.cn-north-1.amazonaws.com.cn",
"eu-central-1": "autoscaling.eu-central-1.amazonaws.com",
"eu-west-1": "autoscaling.eu-west-1.amazonaws.com",
"sa-east-1": "autoscaling.sa-east-1.amazonaws.com",
"us-east-1": "autoscaling.us-east-1.amazonaws.com",
"us-gov-west-1": "autoscaling.us-gov-west-1.amazonaws.com",
"us-west-1": "autoscaling.us-west-1.amazonaws.com",
"us-west-2": "autoscaling.us-west-2.amazonaws.com"
},
• boto/boto/endpoints.json and aws-java-sdk-
core/src/main/resources/com/amazonaws/partitions/end
points.json
Wrapping Lambda Functions
• Hack the in-environment SDK for your own main
Lambda function!
• 2-stage function needed, in the execution context:
• 1. Verify that the endpoints as defined in the SDK are your
own API Gateway endpoints; set them if not
• 2. Invoke the actual “doing stuff” function
Generalising Across
Serverless Functions
Filtering API Calls
AWS
Lambda
Amazon API
Gateway
API endpoint
Filtering Kinesis (and some other) Streams
AWS
Lambda
Amazon
ElastiCache
Amazon
Kinesis
Amazon
Kinesis
Amazon
DynamoDB
Offloading Encryption in Transit
Amazon
API
Gateway
AWS
KMS
data
encryption key
AWS
Lambda
role
API Endpoints
Amazon
SQS
instance
Amazon
Kinesis
role
Services with Lambda Trigger Support
• Config
• CloudWatch
• S3
• DynamoDB
• Kinesis
• SNS
• SES
• Cognito
• CloudFormation
Conclusions
Threats and Mitigations
• IAM is your first port of call, for limiting API calls and their
scope
• Cross-account access can also be useful here
• API Endpoints are well-protected, but API Gateways can
add hooks for further protection at Layer 7 to any service
• …though they’re most applicable to serverless ones
• Lambda functions can provide useful tap / inspection /
filter hook points for queues and pipelines
• Lambda functions can themselves be used as wrap and
filter hook points on the input to Lambda functions
Further Food for Thought…?
• Using Serverless Capabilities to Add Security
Functionality to More Traditional Services
• Config Rules already does this
• GitHub repo at https://github.com/awslabs/aws-config-rules
• CI / CD: Add a final post-deploy Lambda step onto
CodePipeline, and API Gateway as a front-end to pentest
infrastructure, to automatically call a pentest down onto the
newly-deployed components
• Let’s discuss…
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
long-term security
credential
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
long-term security
credential
data encryptionkey
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
long-term security
credential
data encryptionkey
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
long-term security
credential
bucket
data encryptionkey
instance
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
long-term security
credential
bucket
data encryptionkey
instance VPC Private Endpoint
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
role
long-term security
credential
bucket
data encryptionkey
instance
role
VPC Private Endpoint
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
role
long-term security
credential
bucket
data encryptionkey
instance
role
ARN of encrypted
https key in S3 bucket
ARN of data
encryption key in KMS
Instance UserData
VPC Private Endpoint
Extra: “Serverless” Management of Arbitrary Secrets
instances
instance
AWS
KMS
dataencryptionkey
role
long-term security
credential
bucket
data encryptionkey
instance
role
ARN of encrypted
https key in S3 bucket
ARN of data
encryption key in KMS
Instance UserData
VPC Private Endpoint
Industry Best Practices for
Securing AWS Resources
CIS Amazon Web Services Foundations
Architecture agnostic set of security
configuration best practices
provides set-by-step implementation and
assessment procedures
Helpful Resources
Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/
Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and-
compliance/
Compliance Centre Website: https://aws.amazon.com/compliance
Security Centre: https://aws.amazon.com/security
Security Blog: https://blogs.aws.amazon.com/security/
AWS Audit Training: awsaudittraining@amazon.com
Helpful Resources: New Videos
The AWS Shared Security Responsibility Model in Practice: https://youtu.be/RwUSPklR24M
IAM Recommended Practices: https://youtu.be/R-PyVnhxx-U
Encryption Options on AWS: https://youtu.be/9bn7p2tdym0
Compliance, Logging, Analysis and Alerting: https://youtu.be/42-1xpT-s6U
Securing Serverless Architectures - AWS Serverless Web Day

More Related Content

What's hot

2016 - Serverless Microservices on AWS with API Gateway and Lambda
2016 - Serverless Microservices on AWS with API Gateway and Lambda2016 - Serverless Microservices on AWS with API Gateway and Lambda
2016 - Serverless Microservices on AWS with API Gateway and Lambdadevopsdaysaustin
 
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...Amazon Web Services
 
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017Amazon Web Services
 
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...Amazon Web Services
 
Rapid Application Development on AWS
Rapid Application Development on AWSRapid Application Development on AWS
Rapid Application Development on AWSAmazon Web Services
 
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...Amazon Web Services
 
Aws Technical Day 2015 - Amazon API Gateway
Aws Technical Day 2015 - Amazon API GatewayAws Technical Day 2015 - Amazon API Gateway
Aws Technical Day 2015 - Amazon API Gatewayaws-marketing-il
 
Build high performing mobile apps, faster with AWS
Build high performing mobile apps, faster with AWSBuild high performing mobile apps, faster with AWS
Build high performing mobile apps, faster with AWSShiva Narayanaswamy
 
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...Amazon Web Services
 
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake Scherrer
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake ScherrerAWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake Scherrer
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake ScherrerAWS Chicago
 
AWS Api Gateway by Łukasz Marchewka Scalacc
AWS Api Gateway by Łukasz Marchewka ScalaccAWS Api Gateway by Łukasz Marchewka Scalacc
AWS Api Gateway by Łukasz Marchewka ScalaccScalac
 
Serverless CQRS in Azure!
Serverless CQRS in Azure!Serverless CQRS in Azure!
Serverless CQRS in Azure!BizTalk360
 
開發語音控制的IoT應用服務
開發語音控制的IoT應用服務開發語音控制的IoT應用服務
開發語音控制的IoT應用服務Amazon Web Services
 
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Amazon Web Services
 
From Monolith to Microservices - Containerized Microservices on AWS - April 2...
From Monolith to Microservices - Containerized Microservices on AWS - April 2...From Monolith to Microservices - Containerized Microservices on AWS - April 2...
From Monolith to Microservices - Containerized Microservices on AWS - April 2...Amazon Web Services
 
Cloud Security-how to create serverless applications
Cloud Security-how to create serverless applicationsCloud Security-how to create serverless applications
Cloud Security-how to create serverless applicationsAmazon Web Services
 
善用分析與推播訊息增加及留住用戶
善用分析與推播訊息增加及留住用戶善用分析與推播訊息增加及留住用戶
善用分析與推播訊息增加及留住用戶Amazon Web Services
 

What's hot (20)

2016 - Serverless Microservices on AWS with API Gateway and Lambda
2016 - Serverless Microservices on AWS with API Gateway and Lambda2016 - Serverless Microservices on AWS with API Gateway and Lambda
2016 - Serverless Microservices on AWS with API Gateway and Lambda
 
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...
AWS January 2016 Webinar Series - Building Smart Applications with Amazon Mac...
 
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017
Implementing a Serverless IoT Architecture - Pop-up Loft TLV 2017
 
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...
AWS re:Invent 2016: Robots: The Fading Line Between Real and Virtual Worlds (...
 
Rapid Application Development on AWS
Rapid Application Development on AWSRapid Application Development on AWS
Rapid Application Development on AWS
 
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...
AWS re:Invent 2016: 1-Click Enterprise Innovation with the AWS IoT Button (IO...
 
Aws Technical Day 2015 - Amazon API Gateway
Aws Technical Day 2015 - Amazon API GatewayAws Technical Day 2015 - Amazon API Gateway
Aws Technical Day 2015 - Amazon API Gateway
 
Build high performing mobile apps, faster with AWS
Build high performing mobile apps, faster with AWSBuild high performing mobile apps, faster with AWS
Build high performing mobile apps, faster with AWS
 
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...
AWS re:Invent 2016: Deep Dive: Building and Delivering Mobile Apps for the En...
 
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake Scherrer
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake ScherrerAWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake Scherrer
AWS IoT Services Overview- IoT Core, Monitoring, Analytics by Jake Scherrer
 
AWS Api Gateway by Łukasz Marchewka Scalacc
AWS Api Gateway by Łukasz Marchewka ScalaccAWS Api Gateway by Łukasz Marchewka Scalacc
AWS Api Gateway by Łukasz Marchewka Scalacc
 
iNTRODUCTION TO AWS IOT
iNTRODUCTION TO AWS IOTiNTRODUCTION TO AWS IOT
iNTRODUCTION TO AWS IOT
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
Serverless CQRS in Azure!
Serverless CQRS in Azure!Serverless CQRS in Azure!
Serverless CQRS in Azure!
 
開發語音控制的IoT應用服務
開發語音控制的IoT應用服務開發語音控制的IoT應用服務
開發語音控制的IoT應用服務
 
Serverless
ServerlessServerless
Serverless
 
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
 
From Monolith to Microservices - Containerized Microservices on AWS - April 2...
From Monolith to Microservices - Containerized Microservices on AWS - April 2...From Monolith to Microservices - Containerized Microservices on AWS - April 2...
From Monolith to Microservices - Containerized Microservices on AWS - April 2...
 
Cloud Security-how to create serverless applications
Cloud Security-how to create serverless applicationsCloud Security-how to create serverless applications
Cloud Security-how to create serverless applications
 
善用分析與推播訊息增加及留住用戶
善用分析與推播訊息增加及留住用戶善用分析與推播訊息增加及留住用戶
善用分析與推播訊息增加及留住用戶
 

Viewers also liked

Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilitiesDefconRussia
 
Serverless Frameworks on AWS
Serverless Frameworks on AWSServerless Frameworks on AWS
Serverless Frameworks on AWSJulien SIMON
 
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...Amazon Web Services
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsAmazon Web Services
 
AWS re:Invent 2016: Operating Your Production API (SVR402)
AWS re:Invent 2016: Operating Your Production API (SVR402)AWS re:Invent 2016: Operating Your Production API (SVR402)
AWS re:Invent 2016: Operating Your Production API (SVR402)Amazon Web Services
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014Amazon Web Services
 
Building Serverless APIs on AWS
Building Serverless APIs on AWSBuilding Serverless APIs on AWS
Building Serverless APIs on AWSJulien SIMON
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyJason Suttie
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017kieranjacobsen
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...Amazon Web Services
 
Cloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriCloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriOWASP Delhi
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWSAmazon Web Services
 
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016Getting Started with Serverless Architectures | AWS Public Sector Summit 2016
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016Amazon Web Services
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 

Viewers also liked (20)

Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
 
Serverless Frameworks on AWS
Serverless Frameworks on AWSServerless Frameworks on AWS
Serverless Frameworks on AWS
 
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...
Serverless Patterns: “No server is easier to manage than no server” - AWS Sec...
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
AWS re:Invent 2016: Operating Your Production API (SVR402)
AWS re:Invent 2016: Operating Your Production API (SVR402)AWS re:Invent 2016: Operating Your Production API (SVR402)
AWS re:Invent 2016: Operating Your Production API (SVR402)
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
 
Building Serverless APIs on AWS
Building Serverless APIs on AWSBuilding Serverless APIs on AWS
Building Serverless APIs on AWS
 
AWS Serverless Workshop
AWS Serverless WorkshopAWS Serverless Workshop
AWS Serverless Workshop
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
 
Cloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriCloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit Giri
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016Getting Started with Serverless Architectures | AWS Public Sector Summit 2016
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 

Similar to Securing Serverless Architectures - AWS Serverless Web Day

Securing Serverless Architectures
Securing Serverless ArchitecturesSecuring Serverless Architectures
Securing Serverless ArchitecturesAmazon Web Services
 
Securing Serverless Architecture
Securing Serverless ArchitectureSecuring Serverless Architecture
Securing Serverless ArchitectureAmazon Web Services
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...Amazon Web Services
 
Webinar: Serverless Architectures with AWS Lambda and MongoDB Atlas
Webinar: Serverless Architectures with AWS Lambda and MongoDB AtlasWebinar: Serverless Architectures with AWS Lambda and MongoDB Atlas
Webinar: Serverless Architectures with AWS Lambda and MongoDB AtlasMongoDB
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 
Getting Started with AWS Lambda & Serverless Cloud
Getting Started with AWS Lambda & Serverless CloudGetting Started with AWS Lambda & Serverless Cloud
Getting Started with AWS Lambda & Serverless CloudIan Massingham
 
Deploying computer vision model as api using aws lambda and api gateway
Deploying computer vision model as api using aws lambda and api gatewayDeploying computer vision model as api using aws lambda and api gateway
Deploying computer vision model as api using aws lambda and api gatewayShirish Gupta
 
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...Amazon Web Services
 
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech TalksDeep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech TalksAmazon Web Services
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...Amazon Web Services
 
Managing the Continuous Delivery of Code to AWS Lambda
Managing the Continuous Delivery of Code to AWS LambdaManaging the Continuous Delivery of Code to AWS Lambda
Managing the Continuous Delivery of Code to AWS LambdaAmazon Web Services
 
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-end
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-endGOTO Stockholm - AWS Lambda - Logic in the cloud without a back-end
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-endIan Massingham
 
Aws Lambda Cart Microservice Server Less
Aws Lambda Cart Microservice Server LessAws Lambda Cart Microservice Server Less
Aws Lambda Cart Microservice Server LessDhanu Gupta
 
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech TalksBuilding Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech TalksAmazon Web Services
 
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications  - May 2017 AWS Online Tech TalksBuilding Serverless Web Applications  - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech TalksAmazon Web Services
 
Building Serverless Web Applications
Building Serverless Web Applications Building Serverless Web Applications
Building Serverless Web Applications Amazon Web Services
 

Similar to Securing Serverless Architectures - AWS Serverless Web Day (20)

Securing Serverless Architectures
Securing Serverless ArchitecturesSecuring Serverless Architectures
Securing Serverless Architectures
 
Securing Serverless Architecture
Securing Serverless ArchitectureSecuring Serverless Architecture
Securing Serverless Architecture
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
 
Webinar: Serverless Architectures with AWS Lambda and MongoDB Atlas
Webinar: Serverless Architectures with AWS Lambda and MongoDB AtlasWebinar: Serverless Architectures with AWS Lambda and MongoDB Atlas
Webinar: Serverless Architectures with AWS Lambda and MongoDB Atlas
 
Meetup callback
Meetup callbackMeetup callback
Meetup callback
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
Getting Started with AWS Lambda & Serverless Cloud
Getting Started with AWS Lambda & Serverless CloudGetting Started with AWS Lambda & Serverless Cloud
Getting Started with AWS Lambda & Serverless Cloud
 
Deploying computer vision model as api using aws lambda and api gateway
Deploying computer vision model as api using aws lambda and api gatewayDeploying computer vision model as api using aws lambda and api gateway
Deploying computer vision model as api using aws lambda and api gateway
 
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...
 
What's New with AWS Lambda
What's New with AWS LambdaWhat's New with AWS Lambda
What's New with AWS Lambda
 
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech TalksDeep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...
 
Managing the Continuous Delivery of Code to AWS Lambda
Managing the Continuous Delivery of Code to AWS LambdaManaging the Continuous Delivery of Code to AWS Lambda
Managing the Continuous Delivery of Code to AWS Lambda
 
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-end
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-endGOTO Stockholm - AWS Lambda - Logic in the cloud without a back-end
GOTO Stockholm - AWS Lambda - Logic in the cloud without a back-end
 
What's New with AWS Lambda
What's New with AWS LambdaWhat's New with AWS Lambda
What's New with AWS Lambda
 
Aws Lambda Cart Microservice Server Less
Aws Lambda Cart Microservice Server LessAws Lambda Cart Microservice Server Less
Aws Lambda Cart Microservice Server Less
 
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech TalksBuilding Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
 
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
Building Serverless Web Applications  - May 2017 AWS Online Tech TalksBuilding Serverless Web Applications  - May 2017 AWS Online Tech Talks
Building Serverless Web Applications - May 2017 AWS Online Tech Talks
 
Building Serverless Web Applications
Building Serverless Web Applications Building Serverless Web Applications
Building Serverless Web Applications
 

More from AWS Germany

Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the FieldAnalytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the FieldAWS Germany
 
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...AWS Germany
 
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...AWS Germany
 
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...AWS Germany
 
Modern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWSModern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWSAWS Germany
 
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with SpinnakerModern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with SpinnakerAWS Germany
 
Building Smart Home skills for Alexa
Building Smart Home skills for AlexaBuilding Smart Home skills for Alexa
Building Smart Home skills for AlexaAWS Germany
 
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructureHotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructureAWS Germany
 
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopWild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopAWS Germany
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWSAWS Germany
 
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS AWS Germany
 
AWS Programme für Nonprofits
AWS Programme für NonprofitsAWS Programme für Nonprofits
AWS Programme für NonprofitsAWS Germany
 
Microservices and Data Design
Microservices and Data DesignMicroservices and Data Design
Microservices and Data DesignAWS Germany
 
Serverless vs. Developers – the real crash
Serverless vs. Developers – the real crashServerless vs. Developers – the real crash
Serverless vs. Developers – the real crashAWS Germany
 
Query your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performanceQuery your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performanceAWS Germany
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultAWS Germany
 
Scale to Infinity with ECS
Scale to Infinity with ECSScale to Infinity with ECS
Scale to Infinity with ECSAWS Germany
 
Containers on AWS - State of the Union
Containers on AWS - State of the UnionContainers on AWS - State of the Union
Containers on AWS - State of the UnionAWS Germany
 
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon LightsailDeploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon LightsailAWS Germany
 

More from AWS Germany (20)

Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the FieldAnalytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
 
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
 
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
 
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
 
Modern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWSModern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWS
 
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with SpinnakerModern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
 
Building Smart Home skills for Alexa
Building Smart Home skills for AlexaBuilding Smart Home skills for Alexa
Building Smart Home skills for Alexa
 
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructureHotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
 
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopWild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
 
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
 
AWS Programme für Nonprofits
AWS Programme für NonprofitsAWS Programme für Nonprofits
AWS Programme für Nonprofits
 
Microservices and Data Design
Microservices and Data DesignMicroservices and Data Design
Microservices and Data Design
 
Serverless vs. Developers – the real crash
Serverless vs. Developers – the real crashServerless vs. Developers – the real crash
Serverless vs. Developers – the real crash
 
Query your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performanceQuery your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performance
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s Vault
 
EKS Workshop
 EKS Workshop EKS Workshop
EKS Workshop
 
Scale to Infinity with ECS
Scale to Infinity with ECSScale to Infinity with ECS
Scale to Infinity with ECS
 
Containers on AWS - State of the Union
Containers on AWS - State of the UnionContainers on AWS - State of the Union
Containers on AWS - State of the Union
 
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon LightsailDeploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Securing Serverless Architectures - AWS Serverless Web Day

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Dave Walker Specialist Solutions Architect, Security and Compliance 23/06/16 Securing Serverless Architectures
  • 3. Agenda • Serverless Architectures: What they Are • “Caveat Emptor”? • Constraining Access and Permissions • Wrapping AWS Lambda Functions • Amazon API Gateway and AWS Service API Endpoints • Generalising Across Serverless Functions • Conclusions
  • 5. Serverless Architectures: What they Are • “The shiny new thing” • …though Amazon S3 has been around for 10 years, now • “Object stores, object transmission and aggregation pipelines, object format tranformers, standalone code execution systems” • Abstract (and sometimes, Container) Services • AWS looks after the underlying OS, High Availability, Scaling, often Application, transparently • Often event-driven (Lambda triggers etc) • “Customers only need to worry about their functionality”
  • 7. For Example… Internet Website Activity Indicator Chat Service Activity Messages Search Service Dynamo Streams Elasticsearch Service Web Hosting Twilio Slack Chat API Gateway IoT Backend Logic
  • 9. “Everything Starts with a Threat Model” • STRIDE, DREAD, others • Identify: • Actors • Vectors • “Bad stuff that could happen, when bad people get creative” • Probabilities and consequences of bad stuff happening • Apply technical and procedural mitigations • …all the way up the OSI stack, from Network to Application
  • 10. Attack Vectors • Application-level and API-level attacks • “If it takes input, it likely has an in-band attack vector” • “If it has a control point, it likely has an out-of-band attack vector” • “Even if it doesn’t itself have a useful compromise, it might be a useful propagation vector” • A successful attack = disruption or corruption of service output, or reduction in responsiveness to future service calls, or being a conduit of “bad content” to vulnerable consumers of the service. • Consider the OWASP Top 10 and other application-level attacks…
  • 11. Control Points and Out-of-band Attacks • (Almost) everything in our list has an API Endpoint. • API Endpoints are exposed to the Internet over https, using TLS 1.2 and unidirectional trust via s2n • API Endpoints are scaled, rate-managed and connection- monitored • API Endpoint calls need Sigv4 • SHA256 HMAC with Secret Access Key (240-bit entropic) over REST request • REST calls are checked for formation correctness • Looking pretty well-covered…
  • 12. In-band Attacks • There are more variables here – consider access methods and content sizes:
  • 14. IAM is your First Port of Call • Quickest and highly effective way to reduce risk of serverless “misbehaviour” at sub-data level • All API access should be Role-based • Roles can be given to EC2 Instances and Lambda functions • Roles use ephemeral STS tokens rather than static keys • Reduces consequences of static key mishandling, no motivation to hard-wire into code • Cross-account access gets close to Mandatory Access Control • See video of presentation from UK Security Roadshow (Coming Soon)
  • 15. IAM is your First Port of Call • API calls can be constrained in IAM by Source IP address • Get the AWS range from https://ip- ranges.amazonaws.com/ip-ranges.json • We could use this to ensure that only our wrapper functions can call our main Lambda functions or the real API endpoints • Recent development: verify when permissions were last used • See https://blogs.aws.amazon.com/security/post/Tx280RX2WH6 WUD7/Remove-Unnecessary-Permissions-in-Your-IAM- Policies-by-Using-Service-Last-Access
  • 17. Let’s start with Lambda… • Why? • It’s a great test case, as: • It can take input from (almost) anywhere • It can do (almost) anything with that input, given appropriate permissions • It can output (almost) anything to (almost) anywhere • Customers have control over what happens between input and output • Risk: “you can write insecure code in any language (including Node.js, Java, Python and anything you can call from them…)”
  • 18. Let’s start with Lambda… • Already good info on developing Lambda functions - https://aws.amazon.com/blogs/compute/continuous- integration-deployment-for-aws-lambda-functions-with- jenkins-and-grunt-part-1/ , https://aws.amazon.com/blogs/compute/continuous- integration-deployment-for-aws-lambda-functions-with- jenkins-and-grunt-part-2/ • Lambda functions run in an IAM role • Consider cross-account function calls (see https://aws.amazon.com/blogs/compute/easy-authorization- of-aws-lambda-functions/ ) • Now let’s add a front-end wrapper / filter and back-end / side API checker…
  • 20. Wrapping Lambda Functions bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway “Back end” “Front end” Our original functionTrigger event source API endpoint
  • 22. Wrapping Lambda Functions bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway 1. Event triggers wrapper 2. Wrapper passes trigger data to analyser API endpoint
  • 23. Wrapping Lambda Functions bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway 3. Analyser reads data 1. Event triggers wrapper 2. Wrapper passes trigger data to analyser API endpoint
  • 24. Wrapping Lambda Functions bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway 3. Analyser reads data 1. Event triggers wrapper 2. Wrapper passes trigger data to analyser 4. Wrapper invokes Function API endpoint
  • 25. Wrapping Lambda Functions bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway 5. Function reads data and processes as normal 3. Analyser reads data 1. Event triggers wrapper 2. Wrapper passes trigger data to analyser 4. Wrapper invokes Function API endpoint
  • 26. Wrapping Lambda Functions • First function, configured to trigger on the Lambda event, is a front-end wrapper • Passes copy of trigger event input and context to analysis engine (hello, Alert Logic  ) • Optionally, waits for “content OK” response from analysis engine (in-band checking) to determine whether main Lambda function should be invoked • …or calls main Lambda function immediately, if performance is more critical (out-of-band checking) • Has the same IAM Read / Get permissions in its role as the main Lambda function, plus what’s needed to send trigger info and invoke the main Lambda function
  • 27. Wrapping Lambda Functions • Analysis Engine • Needs IAM permissions to be able to read from the trigger source • Needs to be configurable to respond to the calling Lambda function after checks are complete (in-band checking, IPS- style) and / or raise alerts – eg via SNS – if “badness” is found (out-of-band checking, IDS-style) • In discussion with Alert Logic (co-inventors), but concept and invocation mechanisms are non-exclusive
  • 28. Wrapping Lambda Functions • Second function, invoked by the first, is our main Lambda function • Modify the permission conditions in the IAM role so that this function can only be called from IP addresses in the AMAZON range in the same Region • ie our wrapping Lambda function • Consider passing and verifying a shared secret • With the front-end wrapped, now let’s look at the back…
  • 29. API Gateway and API Endpoints
  • 30. API Gateway and API Endpoints bucket AWS Lambda AWS Lambda AWS Lambda Amazon API Gateway “Back end” API endpoint
  • 31. API Gateway and API Endpoints • Consider API Gateway as a protective front-end onto the main AWS API Endpoints • Can rate-limit calling frequency • Can have back-end Lambda functions on each of REST GET, PUT, POST, PATCH, DELETE, HEAD, OPTIONS to check call content • Supports Sigv4 – and generates logs • So, we have a back-end wrapper function  • …But we need to make API Gateway the target(s) for calls to API Endpoints, in our main Lambda function… • Easy!
  • 32. Endpoint mappings in boto and Java SDK: { "autoscaling": { "ap-northeast-1": "autoscaling.ap-northeast-1.amazonaws.com", "ap-northeast-2": "autoscaling.ap-northeast-2.amazonaws.com", "ap-southeast-1": "autoscaling.ap-southeast-1.amazonaws.com", "ap-southeast-2": "autoscaling.ap-southeast-2.amazonaws.com", "cn-north-1": "autoscaling.cn-north-1.amazonaws.com.cn", "eu-central-1": "autoscaling.eu-central-1.amazonaws.com", "eu-west-1": "autoscaling.eu-west-1.amazonaws.com", "sa-east-1": "autoscaling.sa-east-1.amazonaws.com", "us-east-1": "autoscaling.us-east-1.amazonaws.com", "us-gov-west-1": "autoscaling.us-gov-west-1.amazonaws.com", "us-west-1": "autoscaling.us-west-1.amazonaws.com", "us-west-2": "autoscaling.us-west-2.amazonaws.com" }, • boto/boto/endpoints.json and aws-java-sdk- core/src/main/resources/com/amazonaws/partitions/end points.json
  • 33. Wrapping Lambda Functions • Hack the in-environment SDK for your own main Lambda function! • 2-stage function needed, in the execution context: • 1. Verify that the endpoints as defined in the SDK are your own API Gateway endpoints; set them if not • 2. Invoke the actual “doing stuff” function
  • 35. Filtering API Calls AWS Lambda Amazon API Gateway API endpoint
  • 36. Filtering Kinesis (and some other) Streams AWS Lambda Amazon ElastiCache Amazon Kinesis Amazon Kinesis Amazon DynamoDB
  • 37. Offloading Encryption in Transit Amazon API Gateway AWS KMS data encryption key AWS Lambda role API Endpoints Amazon SQS instance Amazon Kinesis role
  • 38. Services with Lambda Trigger Support • Config • CloudWatch • S3 • DynamoDB • Kinesis • SNS • SES • Cognito • CloudFormation
  • 40. Threats and Mitigations • IAM is your first port of call, for limiting API calls and their scope • Cross-account access can also be useful here • API Endpoints are well-protected, but API Gateways can add hooks for further protection at Layer 7 to any service • …though they’re most applicable to serverless ones • Lambda functions can provide useful tap / inspection / filter hook points for queues and pipelines • Lambda functions can themselves be used as wrap and filter hook points on the input to Lambda functions
  • 41. Further Food for Thought…? • Using Serverless Capabilities to Add Security Functionality to More Traditional Services • Config Rules already does this • GitHub repo at https://github.com/awslabs/aws-config-rules • CI / CD: Add a final post-deploy Lambda step onto CodePipeline, and API Gateway as a front-end to pentest infrastructure, to automatically call a pentest down onto the newly-deployed components • Let’s discuss…
  • 42. Extra: “Serverless” Management of Arbitrary Secrets instances instance
  • 43. Extra: “Serverless” Management of Arbitrary Secrets instances instance instance
  • 44. Extra: “Serverless” Management of Arbitrary Secrets instances instance long-term security credential instance
  • 45. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS long-term security credential data encryptionkey instance
  • 46. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey long-term security credential data encryptionkey instance
  • 47. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey long-term security credential bucket data encryptionkey instance
  • 48. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey long-term security credential bucket data encryptionkey instance VPC Private Endpoint
  • 49. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey role long-term security credential bucket data encryptionkey instance role VPC Private Endpoint
  • 50. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey role long-term security credential bucket data encryptionkey instance role ARN of encrypted https key in S3 bucket ARN of data encryption key in KMS Instance UserData VPC Private Endpoint
  • 51. Extra: “Serverless” Management of Arbitrary Secrets instances instance AWS KMS dataencryptionkey role long-term security credential bucket data encryptionkey instance role ARN of encrypted https key in S3 bucket ARN of data encryption key in KMS Instance UserData VPC Private Endpoint
  • 52. Industry Best Practices for Securing AWS Resources CIS Amazon Web Services Foundations Architecture agnostic set of security configuration best practices provides set-by-step implementation and assessment procedures
  • 53. Helpful Resources Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/ Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and- compliance/ Compliance Centre Website: https://aws.amazon.com/compliance Security Centre: https://aws.amazon.com/security Security Blog: https://blogs.aws.amazon.com/security/ AWS Audit Training: awsaudittraining@amazon.com
  • 54. Helpful Resources: New Videos The AWS Shared Security Responsibility Model in Practice: https://youtu.be/RwUSPklR24M IAM Recommended Practices: https://youtu.be/R-PyVnhxx-U Encryption Options on AWS: https://youtu.be/9bn7p2tdym0 Compliance, Logging, Analysis and Alerting: https://youtu.be/42-1xpT-s6U