SlideShare a Scribd company logo
@WICKETT
DOING SECURITY IN
100 MILLISECONDS
SERVERLESS
SECURITY
@WICKETT
JAMES WICKETT
๏ Head of Research at Signal
Sciences
๏ Author at Lynda/LinkedIn Training
for DevOps Fundamentals course
releasing in November
๏ Blogger at theagileadmin.com and
labs.signalsciences.com
@WICKETT
DEVOPS ROADMAP
FOR SECURITY
http://info.signalsciences.com/book
@WICKETT
๏ Web App Firewall for modern workloads
๏ Cloud-native and devops friendly
๏ Answer the questions: Am I being attacked
right now? Are attackers becoming
successful?
๏ We are hiring (Golang, appsec, devops)
@WICKETT
@WICKETT
@WICKETT
@WICKETT
CONCLUSION
๏ Serverless encourages functions as deploy
units, coupled with third party services
that allow running end-to-end applications
without worrying about system operation.
๏ New serverless patterns are just emerging
๏ Security with serverless is easier
๏ Security with serverless is harder
@WICKETT
CONCLUSION (2)
๏ Four key areas apply to serverless security
๏ Software Supply Chain Security
๏ Delivery Pipeline Security
๏ Data Flow Security
๏ Attack Detection
@WICKETT
WHAT IS
SERVERLESS?
@WICKETT
MISCONCEPTIONS
@WICKETT
IT’S MARKETING
(CLOUD REBRANDED)
@WICKETT
SERVERLESS ==
NO SERVERS
@WICKETT
SERVERLESS ==
CLOUD
@WICKETT
SERVERLESS ==
BACKEND AS A
SERVICE
@WICKETT
SERVERLESS ==
PLATFORM AS A
SERVICE
@WICKETT
@WICKETT
SO, WHAT IS
SERVERLESS?
@WICKETT http://martinfowler.com/articles/serverless.html
@WICKETT
@MIKEBROBERTS
@WICKETT
Serverless was first used
to describe applications
that significantly or fully
depend on 3rd party
applications / services (‘in
the cloud’) to manage
server-side logic and
state.
http://martinfowler.com/articles/serverless.html
@WICKETT
Serverless can also mean
applications where some amount
of server-side logic is still written
by the application developer but
unlike traditional architectures is
run in stateless compute
containers that are event-
triggered, ephemeral (may only
last for one invocation), and fully
managed by a 3rd party.
http://martinfowler.com/articles/serverless.html
@WICKETT
HISTORY OF SERVERLESS
๏ 2012 - used to describe BaaS and Continuous Integration
services run by third parties
๏ Late 2014 - AWS launched Lambda
๏ July 2015 - AWS launched API Gateway
๏ October 2015 - AWS re:Invent - The Serverless company
using AWS Lambda
๏ 2015 to present - Frameworks forming
๏ 2016 - Serverless Conference
http://www.slideshare.net/AmazonWebServices/arc308-
the-serverless-company-using-aws-lambda
@WICKETT
Client
Server
Database
Proxy/LB
Server
Server
@WICKETT
Client
Auth Service API Gateway
Database
Service
Function A
Function B
Web Delivery
@WICKETT
@WICKETT
WHAT CAN WE SAY
IS SERVERLESS?
@WICKETT
SERVERLESS IS
FUNCTIONS AS A
SERVICE (FaaS)
@WICKETT
BUT, BUT…
CONTAINERS!
@WICKETT
CONTAINERS …
ON DEMAND
@WICKETT
SERVERLESS IS
(NO MANAGEMENT OF)
SERVERS
@WICKETT
SERVERLESS IS
SERVICEFULL
@WICKETT
SERVERLESS IS AN
OPINIONATED FRAMEWORK
FOR COMPUTE
@WICKETT
Serverless encourages
functions as deploy units,
coupled with third party
services that allow running
end-to-end applications
without worrying about
system operation.
@WICKETT
A SHORT HISTORY
OF CLOUD
@WICKETT
VIRTUALIZATION
@WICKETT
“THE CLOUD”
@WICKETT
DEVOPS
@WICKETT
SaaS
PaaS
IaaS
@WICKETT
PRIVATE CLOUD
@WICKETT
THEN, ALONG
CAME CONTAINERS
@WICKETT
CONTAINERS ARE
TEH HAWTNESS
@WICKETT
@WICKETT
LOTS OF EFFORT IN
CONTAINER
ORCHESTRATION
@WICKETT
THE CLOUD WAS TO
VIRTUALIZATION AS
SERVERLESS WILL
BE TO CONTAINERS
@WICKETT
IF YOU WANT TO LEAD YOUR
COMPANY BRAVELY INTO THE
NEW WORLD, YOU WOULD DO
WELL TO FOCUS LOT ON HOW
SERVERLESS WILL EVOLVE.
- @CLOUDOPINION
https://medium.com/@cloud_opinion/the-pattern-may-
repeat-26de1e8b489d
@WICKETT
Serverless encourages
functions as deploy units,
coupled with third party
services that allow running
end-to-end applications
without worrying about
system operation.
@WICKETT
SO, WHAT ARE THE
UPSIDES?
@WICKETT
SCALING BUILT IN
@WICKETT
PAY FOR WHAT YOU
USE IN 100MS
INCREMENTS
@WICKETT
WITH SERVERLESS
SYSTEM ADMINISTRATION
IS (MOSTLY) LOWER
@WICKETT
SERVERLESS IS
IMPLICIT
MICROSERVICES
@WICKETT
SHORT CIRCUITS OPS
AND MOVES
INFRASTRUCTURE
RUNTIME CLOSER TO
DEVS
@WICKETT
YOU CAN SKIP
CHEFFING DOCKERING
ALL THE THINGS!
@WICKETT
LEAN STARTUP
FRIENDLY
@WICKETT
INCREASED
VELOCITY
@WICKETT
GREAT, WHAT’S
THE CATCH?
@WICKETT
OPS BURDEN TO
RATIONALIZE
SERVERLESS MODEL
(SPECIFICALLY DEPLOY)
@WICKETT
MONITORING
@WICKETT
LOGGING
@WICKETT
STATELESS FOR REAL NO
MEMORY PERSISTENCE
ACROSS FUNCTION RUNS
@WICKETT
VENDOR LOCK-IN
@WICKETT
SECURITY
@WICKETT
RELIABILITY
@WICKETT
@WICKETT
SERVERLESS USE
CASES
@WICKETT
IMAGE RESIZING
@WICKETT
QUEUE PROCESSING
http://martinfowler.com/articles/serverless.html
@WICKETT
RUN A WEB
APPLICATION
@WICKETT
API GATEWAY
http://martinfowler.com/articles/serverless.html
@WICKETT
CI/CD
@WICKETT
LICENSING
@WICKETT
SECURITY IS THE
SAME AND DIFFERENT
@WICKETT
EVERYTHING IS
HTTP(S)
@WICKETT
WHAT USED TO BE
SYSTEM CALLS IS
NOW DISTRIBUTED
COMPUTING OVER
THE NETWORK
@WICKETT
SERVERLESS SHIFTS
ATTACK SURFACE TO
THIRD PARTIES
@WICKETT
LETS TRY A SAMPLE
APPLICATION IN AWS
@WICKETT
๏ Golang!
๏ AWS Lambda supports bring your own
binary
๏ Sparta wraps your binary with node.js shim
@WICKETT
@WICKETT
OTHER OPTIONS
๏ Serverless Framework
๏ APEX
๏ Kappa
@WICKETT
WORDY
๏ Analyzes textual
occurrences given a block
of text, returns JSON
count of words
๏ Calls API under the hood
to get text
๏ It is comprised of
Lambda, s3, API Gateway
@WICKETT
@WICKETT
@WICKETT
@WICKETT
go run main.go provision -s S3_BUCKET
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
@WICKETT
WHAT I LEARNED
ABOUT SERVERLESS
SECURITY
@WICKETT
@WICKETT
FOUR AREAS OF
SERVERLESS SECURITY
๏ Secure Software Supply Chain
๏ Delivery Pipeline
๏ Data Flow Security
๏ Attack Detection
@WICKETT
@WICKETT
SURFACE AREA
REDUCTION!
@WICKETT
SURFACE AREA
EXPANSION!
@WICKETT
SSL / TLS FROM
THE PROVIDER
@WICKETT
DNS!
@WICKETT
LAMBDA + S3 +
KINESIS + DYNAMODB
+ CLOUDFORMATION +
API GATEWAY + AUTH0
@WICKETT
USE A THIRD-PARTY
SERVICE FOR CONFIG
CHANGES
@WICKETT
ACCESS CONTROL
@WICKETT
DELIVERY PIPELINE
SECURITY
@WICKETT
@WICKETT
UNIT TESTING
@WICKETT
@WICKETT
INTEGRATION
TESTING
@WICKETT
CONFIGURATION IS
PART OF DELIVERY
@WICKETT
PROVIDER SECURITY
๏ Disable root access keys
๏ Manage users with profiles
๏ Secure your keys in your deploy system
๏ Secure keys in dev system
๏ Use provider MFA
@WICKETT
SIMPLE DEPLOY
PIPELINE SECURITY
๏ Only dev keys can push to ‘dev’
๏ Only build/deploy system can push to pre-
prod
๏ Integration tests must pass in this env
๏ Security validation must take place
๏ Allow push to prod, only by deploy system
@WICKETT
SECURITY INTEGRATION
TESTING
๏ BDD-Security - github.com/
continuumsecurity/bdd-security
๏ Gauntlt - gauntlt.org
@WICKETT
http://www.slideshare.net/wickett/pragmatic-security-and-
rugged-devops-sxsw-2015
@WICKETT
DATA FLOW
SECURITY
๏ Development
๏ Data Flow
Diagrams
๏ Threat modeling
๏ Runtime
@WICKETT
Application layer
DoS
@WICKETT
TIMEOUTS AND
EXECUTION
RESTRICTIONS
@WICKETT
HTTP / HTTPS
@WICKETT
ATTACK
DETECTION
@WICKETT
DEVELOPMENT
๏ Normal OWASP tooling
๏ Language filtering and more
@WICKETT
APPSEC PROBLEMS
@WICKETT
DEFENSE
๏ Logging, emitting events
๏ Vandium (SQLi) wrapper
๏ Content Security Policy (CSP)
๏ More work needs to be done here…
@WICKETT
CONCLUSION
๏ Serverless encourages functions as deploy
units, coupled with third party services
that allow running end-to-end applications
without worrying about system operation.
๏ New serverless patterns are just emerging
๏ Security with serverless is easier
๏ Security with serverless is harder
@WICKETT
CONCLUSION (2)
๏ Four key areas apply to serverless security
๏ Software Supply Chain Security
๏ Delivery Pipeline Security
๏ Data Flow Security
๏ Attack Detection
@WICKETT
@WICKETT
LET’S TALK!
๏ james@signalsciences.com
๏ @wickett
๏ http://info.signalsciences.com/book

More Related Content

PDF
Serverless Security: Are you ready for the Future?
PDF
Serverless Security: A pragmatic primer for builders and defenders
PDF
Serverless Security at LASCON 2017
PDF
Containerizing your Security Operations Center
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
Security in the Delivery Pipeline - GOTO Amsterdam 2017
PDF
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
PDF
How to Effect Change in the Epistemological Wasteland of Application Security
Serverless Security: Are you ready for the Future?
Serverless Security: A pragmatic primer for builders and defenders
Serverless Security at LASCON 2017
Containerizing your Security Operations Center
The Emergent Cloud Security Toolchain for CI/CD
Security in the Delivery Pipeline - GOTO Amsterdam 2017
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
How to Effect Change in the Epistemological Wasteland of Application Security

What's hot (20)

PPTX
Defining DevSecOps
PDF
LambHack: A Vulnerable Serverless Application
PDF
Serverless Security: What's Left To Protect
PDF
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
PDF
Introduction to DevSecOps
PDF
DevSecOps - Building Rugged Software
PDF
Hacker Games & DevSecOps
PPTX
DevSecOps reference architectures 2018
PDF
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PPTX
Third Party Performance (Velocity, 2014)
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
PDF
Security as Code: DOES15
PDF
The New Ways of DevSecOps - The Secure Dev 2019
PDF
Enterprise DevOps Series: Using VS Code & Zowe
PPTX
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
PDF
Hybrid Cloud Networking
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
Defining DevSecOps
LambHack: A Vulnerable Serverless Application
Serverless Security: What's Left To Protect
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
Building a DevSecOps Pipeline Around Your Spring Boot Application
Introduction to DevSecOps
DevSecOps - Building Rugged Software
Hacker Games & DevSecOps
DevSecOps reference architectures 2018
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
The DevSecOps Builder’s Guide to the CI/CD Pipeline
Third Party Performance (Velocity, 2014)
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Security as Code: DOES15
The New Ways of DevSecOps - The Secure Dev 2019
Enterprise DevOps Series: Using VS Code & Zowe
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Hybrid Cloud Networking
Security in CI/CD Pipelines: Tips for DevOps Engineers
Ad

Similar to Serverless Security: Doing Security in 100 milliseconds (20)

PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
PDF
Serverless Architectural Patterns
PDF
apidays Australia 2023 - APIs Aren't Enough: Why SaaS Leaders Are Investing I...
PDF
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?
PDF
Security in the FaaS Lane
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PDF
Top conf serverlezz
PDF
Serverless Computing, AWS Way: SourceFuse Technologies
PDF
Serverless Computing, AWS Way by SourceFuse Technologies
PDF
(SACON) Anant Shrivastava - cloud pentesting
PDF
Three Innovations that Define a “Next-Generation Global Transit Hub”
PDF
Resilient Microservices with Spring Cloud
PPTX
Serverless architecture with Azure
PDF
Seven Criteria for Building an AWS Global Transit Network
PDF
Keepler | Full-Stack Serverless Applications on GCP
PDF
Introducing to serverless computing and AWS lambda - Israel Clouds Meetup
PDF
Data Driven Decisions in DevOps
PDF
Continuous (Non)-Functional Testing of Microservices on k8s
PDF
Serverless Design Patterns
PDF
Serveless design patterns (VoxxedDays Luxembourg)
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Architectural Patterns
apidays Australia 2023 - APIs Aren't Enough: Why SaaS Leaders Are Investing I...
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?
Security in the FaaS Lane
How to Optimize Your AWS Environment for Improved Cloud Performance
Top conf serverlezz
Serverless Computing, AWS Way: SourceFuse Technologies
Serverless Computing, AWS Way by SourceFuse Technologies
(SACON) Anant Shrivastava - cloud pentesting
Three Innovations that Define a “Next-Generation Global Transit Hub”
Resilient Microservices with Spring Cloud
Serverless architecture with Azure
Seven Criteria for Building an AWS Global Transit Network
Keepler | Full-Stack Serverless Applications on GCP
Introducing to serverless computing and AWS lambda - Israel Clouds Meetup
Data Driven Decisions in DevOps
Continuous (Non)-Functional Testing of Microservices on k8s
Serverless Design Patterns
Serveless design patterns (VoxxedDays Luxembourg)
Ad

More from James Wickett (20)

PDF
A Pragmatic Union: Security and SRE
PDF
A Way to Think about DevSecOps: MEASURE
PDF
The Security, DevOps, and Chaos Playbook to Change the World
PDF
Pragmatic Pipeline Security
PDF
A Tale of Woe, Chaos, and Business
PDF
A DevSecOps Tale of Business, Engineering, and People
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
PDF
The New Ways of Chaos, Security, and DevOps
PDF
DevOpsDays Austin: Security in the FaaS Lane
PDF
The Seven Habits of the Highly Effective DevSecOp
PDF
Release Your Inner DevSecOp
PDF
The New Security Playbook: DevSecOps
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
Adversary Driven Defense in the Real World
PDF
DevSecOps and the CI/CD Pipeline
PDF
The State of DevSecOps in 2018
PDF
DevSecOps in the Year 2018
PDF
DevSecOps and the New Path Forward
PDF
Defense-Oriented DevOps for Modern Software Development
PDF
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
A Pragmatic Union: Security and SRE
A Way to Think about DevSecOps: MEASURE
The Security, DevOps, and Chaos Playbook to Change the World
Pragmatic Pipeline Security
A Tale of Woe, Chaos, and Business
A DevSecOps Tale of Business, Engineering, and People
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
DevOpsDays Austin: Security in the FaaS Lane
The Seven Habits of the Highly Effective DevSecOp
Release Your Inner DevSecOp
The New Security Playbook: DevSecOps
The Emergent Cloud Security Toolchain for CI/CD
Adversary Driven Defense in the Real World
DevSecOps and the CI/CD Pipeline
The State of DevSecOps in 2018
DevSecOps in the Year 2018
DevSecOps and the New Path Forward
Defense-Oriented DevOps for Modern Software Development
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Serverless Security: Doing Security in 100 milliseconds