SlideShare a Scribd company logo
snyk.io
Securing Serverless - 

By Breaking In
Guy Podjarny, Snyk
@guypod
snyk.io
About Me
• Guy Podjarny, @guypod on Twitter
• CEO & Co-founder at Snyk
• History:
• Cyber Security part of Israel Defense Forces
• First Web App Firewall(AppShield), Dynamic/Static Tester(AppScan)
• Security: Worked in Sanctum -> Watchfire -> IBM
• Performance: Founded Blaze -> CTO @Akamai
• O’Reilly author, speaker
snyk.io
Serverless Security: The Theory

(talk from ServerlessConf)
https://www.youtube.com/watch?v=CiyUD_rI8D8
https://www.infoq.com/articles/serverless-security
snyk.io
Today - straight to practice!
snyk.io
Agenda
• Show a demo serverless app
• Hack it
• Explain the security flaws and how to fix them
• Summary
• Q&A
snyk.io
Introducing our app…
snyk.io
Vulnerable Libraries
snyk.io
Example: Fetch file & store in s3
(Serverless Framework Example)
19 Lines of Code
2 Direct dependencies
19 dependencies(incl. indirect)
191,155 Lines of Code
snyk.io
snyk.io
Serverless does secure

OS dependencies
Just not app dependencies
snyk.io
1. Beware Vulnerable Libraries

(test during dev, monitor over time)
snyk.io
Side Note:

Snyk isn’t only for Serverless
snyk.io
Denial of Service
snyk.io
2. ReDoS can still be costly

(won’t take you down, but can hike up bill)
snyk.io
Beware

Resource Exhaustion Attacks
Not all your services elastically scale
snyk.io
Secrets
snyk.io
3. Avoid secrets in deployed code

(env variables aren’t enough - Use a KMS!)
snyk.io
Serverless platforms offer a

Key Management System
Just use it!
snyk.io
Granularity
snyk.io
4. Deploy granular functions

(shared function code = greater exposure)
snyk.io
AWS Security Policy
Easier
Policy 3Policy 2
Policy 1
Safer
snyk.io
Permissions
snyk.io
5. Use Granular Policies

(only allow each function its minimum permissions)
snyk.io
A function is a perimeter
That needs to be secured
Perimeter Perimeter
Perimeter
Perimeter
Perimeter
snyk.io
Immutability
snyk.io
6. Don’t rely on immutability

(Lambda - and others - reuse servers)
snyk.io
Serverless user is typically

Low Privilege
Reducing impact substantially, but not eliminating it
snyk.io
7. Worry about all functions

(Every available function increases your attack surface)
snyk.io
Summary
1. Beware vulnerable libraries
2. ReDoS can still be costly
3. Avoid secrets in deployed code
4. Deploy granular functions
5. Use Granular Permissions
6. Don’t rely on immutability
7. Worry about all functions
snyk.io
Serverless Security: The Theory

(talk from ServerlessConf)
https://www.youtube.com/watch?v=CiyUD_rI8D8
https://www.infoq.com/articles/serverless-security
snyk.io
Serverless is defined now.

Let’s build Security in.
Thank You!
Guy Podjarny, Snyk
@guypod

More Related Content

PDF
Serverless Security: What's Left To Protect
PDF
Security Patterns for Microservice Architectures - London Java Community 2020
PDF
AWS live hack: Docker + Snyk Container on AWS
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PDF
Dev seccon london 2016 intelliment security
PPTX
Evaluating container security with ATT&CK Framework
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
Serverless Security: What's Left To Protect
Security Patterns for Microservice Architectures - London Java Community 2020
AWS live hack: Docker + Snyk Container on AWS
Stephen Sadowski - Securely automating infrastructure in the cloud
Dev seccon london 2016 intelliment security
Evaluating container security with ATT&CK Framework
AWS live hack: Atlassian + Snyk OSS on AWS
Elizabeth Lawler - Devops, security, and compliance working in unison

What's hot (20)

PDF
Why should developers care about container security?
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
The Future of Security and Productivity in Our Newly Remote World
PDF
Henrique Dantas - API fuzzing using Swagger
PPTX
360° Kubernetes Security: From Source Code to K8s Configuration Security
PPTX
Lacework | Top 10 Cloud Security Threats
PPTX
Alfredo Reino - Monitoring aws and azure
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PPTX
AllDayDevOps 2019 AppSensor
PDF
All Your Containers Are Belong To Us
PPTX
Aleksei Dremin - Application Security Pipeline - phdays9
PDF
DevSecOps | DevOps Sec
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PDF
Hacking into your containers, and how to stop it!
PDF
Secure Your Code Implement DevSecOps in Azure
PDF
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
PPTX
Lacework Kubernetes Meetup | August 28, 2018
PDF
DevSecOps in Baby Steps
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
Why should developers care about container security?
Security in CI/CD Pipelines: Tips for DevOps Engineers
The Future of Security and Productivity in Our Newly Remote World
Henrique Dantas - API fuzzing using Swagger
360° Kubernetes Security: From Source Code to K8s Configuration Security
Lacework | Top 10 Cloud Security Threats
Alfredo Reino - Monitoring aws and azure
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
AllDayDevOps 2019 AppSensor
All Your Containers Are Belong To Us
Aleksei Dremin - Application Security Pipeline - phdays9
DevSecOps | DevOps Sec
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Hacking into your containers, and how to stop it!
Secure Your Code Implement DevSecOps in Azure
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
Lacework Kubernetes Meetup | August 28, 2018
DevSecOps in Baby Steps
You Build It, You Secure It: Introduction to DevSecOps
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
Ad

Similar to Securing Serverless - By Breaking In (20)

PDF
Securing Serverless by Breaking in
PDF
Serverless Security: What's Left to Protect?
PDF
Guy Podjarmy - Secure Node Code
PDF
Stranger Danger: Securing Third Party Components (Tech2020)
PDF
Securing serverless system
PPTX
Securing Serverless Systems
PPTX
OWASP Serverless Top 10
PDF
Serverless DevSecOps: Why We Must Make it Everyone's Problem | Hillel Solow
PDF
Security in serverless world
PDF
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
PDF
DevSecCon London 2018: Security in the serverless world
PDF
Security in serverless world
PDF
Security in Serverless world
PDF
Serverless Security: Defence Against the Dark Arts
PDF
Security in serverless world (get.net)
PDF
Security in serverless world
PDF
stackconf 2021 | Continuous Security – integrating security into your pipelines
PDF
Serverless security: defence against the dark arts
PDF
Stranger Danger (NodeSummit, 2016)
PDF
Serverless security: defense against the dark arts
Securing Serverless by Breaking in
Serverless Security: What's Left to Protect?
Guy Podjarmy - Secure Node Code
Stranger Danger: Securing Third Party Components (Tech2020)
Securing serverless system
Securing Serverless Systems
OWASP Serverless Top 10
Serverless DevSecOps: Why We Must Make it Everyone's Problem | Hillel Solow
Security in serverless world
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
DevSecCon London 2018: Security in the serverless world
Security in serverless world
Security in Serverless world
Serverless Security: Defence Against the Dark Arts
Security in serverless world (get.net)
Security in serverless world
stackconf 2021 | Continuous Security – integrating security into your pipelines
Serverless security: defence against the dark arts
Stranger Danger (NodeSummit, 2016)
Serverless security: defense against the dark arts
Ad

More from Guy Podjarny (18)

PDF
Secure Node Code (workshop, O'Reilly Security)
PDF
High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)
PDF
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
PDF
High Performance Images: Beautiful Shouldn't Mean Slow
PDF
Responsive In The Wild, 2014
PPTX
Third Party Performance (Velocity, 2014)
PPTX
Rules driven-delivery
PPTX
Responsive In The Wild (SmashingConf, 2014)
PPTX
Putting Your Images on a Diet (SmashingConf, 2014)
PPTX
Third party-performance (Airbnb Nerds, Nov 2013)
PPTX
Third Party Performance
PDF
A Picture Costs A Thousand Words
PPTX
Step by Step Mobile Optimization
PPTX
Quantifying The Mobile Difference
PPTX
Performance Implications of Mobile Design (Perf Audience Edition)
PPTX
Performance Implications of Mobile Design
PDF
Unravelling Mobile Web Performance
PPTX
State Of Mobile Web Performance
Secure Node Code (workshop, O'Reilly Security)
High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
High Performance Images: Beautiful Shouldn't Mean Slow
Responsive In The Wild, 2014
Third Party Performance (Velocity, 2014)
Rules driven-delivery
Responsive In The Wild (SmashingConf, 2014)
Putting Your Images on a Diet (SmashingConf, 2014)
Third party-performance (Airbnb Nerds, Nov 2013)
Third Party Performance
A Picture Costs A Thousand Words
Step by Step Mobile Optimization
Quantifying The Mobile Difference
Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design
Unravelling Mobile Web Performance
State Of Mobile Web Performance

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
OMC Textile Division Presentation 2021.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25-Week II
SOPHOS-XG Firewall Administrator PPT.pptx
cloud_computing_Infrastucture_as_cloud_p
Building Integrated photovoltaic BIPV_UPV.pdf
Getting Started with Data Integration: FME Form 101
Heart disease approach using modified random forest and particle swarm optimi...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Spectroscopy.pptx food analysis technology
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A comparative study of natural language inference in Swahili using monolingua...
Machine learning based COVID-19 study performance prediction
OMC Textile Division Presentation 2021.pptx

Securing Serverless - By Breaking In