securing serverless by breaking in
play

Securing Serverless - By Breaking In Guy Podjarny, Snyk @guypod - PowerPoint PPT Presentation

Securing Serverless - By Breaking In Guy Podjarny, Snyk @guypod snyk.io About Me Guy Podjarny, @guypod on Twitter CEO & Co-founder at Snyk History: Cyber Security part of Israel Defense Forces First Web App Firewall


  1. Securing Serverless - 
 By Breaking In Guy Podjarny, Snyk @guypod snyk.io

  2. About Me • Guy Podjarny, @guypod on Twitter • CEO & Co-founder at Snyk • History: Cyber Security part of Israel Defense Forces • First Web App Firewall (AppShield), Dynamic/Static Tester (AppScan) • Security : Worked in Sanctum -> Watchfire -> IBM • Performance : Founded Blaze -> CTO @Akamai • • O’Reilly author, speaker snyk.io

  3. Serverless Security: The Theory 
 (talk from ServerlessConf) https://www.infoq.com/articles/serverless-security https://www.youtube.com/watch?v=CiyUD_rI8D8 snyk.io

  4. Today - straight to practice! snyk.io

  5. Agenda • Show a demo serverless app • Hack it • Explain the security flaws and how to fix them • Summary • Q&A snyk.io

  6. Going Terminal… snyk.io

  7. Vulnerable Libraries snyk.io

  8. Example: Fetch file & store in s3 (Serverless Framework Example) 2 Direct dependencies 19 dependencies (incl. indirect) 191,155 Lines of Code 19 Lines of Code snyk.io

  9. snyk.io

  10. Serverless does secure 
 OS dependencies Just not app dependencies snyk.io

  11. 1. Beware Vulnerable Libraries 
 (test during dev, monitor over time) snyk.io

  12. Side Note: 
 Snyk isn’t only for Serverless snyk.io

  13. Denial of Service snyk.io

  14. 2. ReDoS can still be costly 
 (won’t take you down, but can hike up bill) snyk.io

  15. Beware 
 Resource Exhaustion Attacks Not all your services elastically scale snyk.io

  16. Secrets snyk.io

  17. 3. Avoid secrets in deployed code 
 (env variables aren’t enough - Use a KMS!) snyk.io

  18. Serverless platforms o ff er a 
 Key Management System Just use it! snyk.io

  19. Granularity snyk.io

  20. 4. Deploy granular functions 
 (shared function code = greater exposure) snyk.io

  21. Safer Easier AWS Security Policy Policy 1 Policy 2 Policy 3 snyk.io

  22. Permissions snyk.io

  23. 5. Use Granular Policies 
 (only allow each function its minimum permissions) snyk.io

  24. A function is a perimeter That needs to be secured Perimeter Perimeter Perimeter Perimeter Perimeter snyk.io

  25. Immutability snyk.io

  26. 6. Don’t rely on immutability 
 (Lambda - and others - reuse servers) snyk.io

  27. Serverless user is typically 
 Low Privilege Reducing impact substantially, but not eliminating it snyk.io

  28. 7. Worry about all functions 
 (Every available function increases your attack surface) snyk.io

  29. Security in Serverless Better Neutral Worse Vulnerable OS Dependencies Permissions Third Party Services Denial of Service Securing Data at rest Attack Surface Long-lived Compromised Vulnerabilities in your code Security Monitoring Servers Vulnerable App Dependencies snyk.io

  30. Serverless is defined now. 
 Let’s build Security in. Thank You! More to come: 
 Microservices Panel, Mon, 5:25pm 
 Serverless AMA, Wed, 2:55pm Guy Podjarny, Snyk @guypod snyk.io

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend