SlideShare a Scribd company logo
Serverless security - how to protect what you don't see?
Jean-Baptiste Aviat
CTO & Co-founder
Former (Red Team)
Email: jb@sqreen.io
Twitter: @jbaviat
Podcast:
What is Serverless?
And why is it different?
Business logic 100% written by developersDev
Ops
Code ⭐⭐⭐⭐⭐
Ops ⭐
Auth File
upload
Business
service #1
Business
service #2
Push
service
Async
workers
Dev
Ops
Code ⭐⭐⭐
Ops ⭐⭐⭐
Dev
Ops
Code ⭐
Ops ⭐⭐⭐
Dev
Ops
Dev
Dev
Ops
Micro
services
Monolithic
applications
Serverless
More code Less code
Dev and
ops
distance Ops
Ad-hoc usage: easier to deploy
Dynamically configure cloud elements, transform data on the go, comply to
cloud vendors requirements.
Teams use it to circumvent processes / CI / deploy.
Native serverless applications
Build applications designed for serverless infrastructures.
How does serverless impacts
security?
Dev Sec
Ops
Dev Sec
Ops
Dev Sec
Ops
Serverless forces bridging dev, sec & ops
Monolithic app Microservices Serverless
What “serverless” means is moving too fast
Edge serverless, ad-hoc, infra
Scale is different (1 monolithic app → 5 micro services → 100 serverless functions)
No tool allows to visualize all of your lambas at once (and the spreadsheet doesn’t work for
this scale and pace!)
The space didn’t reach maturity yet:
● No commonly accepted best practices, but a broad variety of best practices
● Evolving fast
Monitoring Protection
❌ ❌
Scaling challenges 🤯:
● Developers do 20 ⨉ more ops
● 1 microservice = 20 ⨉ functions
● 20 ⨉ vulnerable dependencies?
● 20 ⨉ ownership tracking?
● 20 ⨉ threat modeling?
● 20 ⨉ faster new function appearance?
New challenges 🚨:
● No way to visualize deployments
● Best practices still change rapidly
● Entrypoints vary widely (HTTP? Queue?
Stream? Database?)
● Higher coupling to the cloud provider
requires high cloud security
Solved challenges ✅:
● System updates (unless Docker based!)
● Network level security (mTLS, …)
⨉
Serverless security: what can we
do?
Use infrastructure as code (Terraform, Cloud Formation, …)
Shift your infrastructure left
● With serverless, a part of the business logic is handled by the infrastructure
● Serverless app developers own both the code and a part of the infrastructure
Use principle of least privilege for your lambdas (but with reasonable granularity!)
Monitor your costs (and be ready to block abuses)
* Network, encryption, mutual authentication is
mostly ensured by proper cloud services usage.
But is much simpler than for microservices*
Keep best practices
Injections
Vulnerable dependencies
Lack of monitoring
AuthN / AuthZ issues
OWASP top 10
Scalability & coherency
Design strong functions
frameworks
(CI, deployment, logging
frameworks, …)
NEW
New functions appear and disappear at a highest rate than ever
Leverage developer’s tools as much as possible to:
● Monitor security controls are applied
● Monitor the permissions used
● Ensure production doesn’t drift vs IaC
IaC / Terraform make
it easy to inspect
IaC / Terraform allows to apply static
control (and break CI if needed)
Cloud APIs allow to dynamically list
and inspect running containers
● Maintain the OWASP top 10
● Adopt a strong cloud security posture
● Generalize principle of least privilege
● Generalize IaC (Terraform, ...)
● Leverage cloud APIs to automate
controls and monitoring
● Monitor serverless cost
● Ensure coherency amongst functions
deployments
OWASP top 10
Cloud security posture
Serverless cost monitoring
Unified deployments
Use Serverless framework or Terraform
● With safe, relevant examples
● Coupled with CI
Provide relevant & safe code examples
● Using ORM / validation / log / …
● Coupled with CI
Prepare provisioning for:
● A working deployment
● CI job to deploy & run linting / static analysers
Document how to deploy secrets
Git repositories best practices:
● Mandatory pull requests
● Require a CODEOWNERS file
● Lock master
Complexity shifts to the
infrastructure
Serverless = different kind
of ops - not no ops!
Some risks occur 20 times
more
● Serverless shifts complexity from application code to
the infrastructure.
● Serverless doesn’t mean no ops but:
● Different kind of ops are done by different personas
● Ops are much simpler compared to microservices
(mTLS, peer to peer, etc.)
● Some security risks occur more (20 times more!),
some new ones appear, and a few ones disappear.
● Cloud security takes a much more important stance.
● Scaling development practices (CI, CD, frameworks,
BoM) becomes a requirement
Cloud security is more
important than ever
Scaling best practices
becomes a necessity
Serverless security - how to protect what you don't see?
CSA - The 12 Most Critical Risks for
Serverless Applications
OWASP top 10
OWASP serverless top 10
Serverless framework
Terraform, CloudFormation
CODEOWNERS (Github, Gitlab)
AppSec Builders podcast
Or get in touch / ask me directly:
Email: jb@sqreen.io
Twitter: @jbaviat
Podcast:

More Related Content

PDF
Policy as code what helm developers need to know about security
PDF
Securing your AWS Deployments with Spinnaker and Armory Enterprise
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PDF
Terrascan - Cloud Native Security Tool
PDF
Pragmatic Cloud Security Automation
PDF
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
PDF
Practical Guide to Securing Kubernetes
PPTX
Scaling Security in the Cloud With Open Source
Policy as code what helm developers need to know about security
Securing your AWS Deployments with Spinnaker and Armory Enterprise
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Terrascan - Cloud Native Security Tool
Pragmatic Cloud Security Automation
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
Practical Guide to Securing Kubernetes
Scaling Security in the Cloud With Open Source

What's hot (20)

PDF
What is Google Cloud Good For at DevFestInspire 2021
PDF
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
PDF
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
PDF
Microservices reativos usando a stack do Netflix na AWS
PDF
20170831 - Greg Palmier: Terraform & AWS at Tempus
PPTX
Native cloud security monitoring
PDF
Application Security in a Container World - Akash Mahajan - BCC 2017
PDF
Kubernetes security
PPTX
Of CORS thats a thing how CORS in the cloud still kills security
PDF
NetflixOSS: The Netflix Way
PDF
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
PDF
SRE & Kubernetes
PDF
Docker + App Container = ocp
PDF
Spring Cloud Netflix OSS
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
All Your Containers Are Belong To Us
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PDF
Monitoring Your AWS EKS Environment with Datadog
PDF
Tune your App Perf (and get fit for summer)
PPTX
Docker Serverless
What is Google Cloud Good For at DevFestInspire 2021
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Microservices reativos usando a stack do Netflix na AWS
20170831 - Greg Palmier: Terraform & AWS at Tempus
Native cloud security monitoring
Application Security in a Container World - Akash Mahajan - BCC 2017
Kubernetes security
Of CORS thats a thing how CORS in the cloud still kills security
NetflixOSS: The Netflix Way
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
SRE & Kubernetes
Docker + App Container = ocp
Spring Cloud Netflix OSS
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
All Your Containers Are Belong To Us
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Monitoring Your AWS EKS Environment with Datadog
Tune your App Perf (and get fit for summer)
Docker Serverless
Ad

Similar to Serverless security - how to protect what you don't see? (20)

PDF
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
PPTX
An introduction to Serverless
PDF
Learning Serverless Design Develop and Deploy with Confidence 1st Edition Jas...
PDF
Cloud the path forward
PDF
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
PDF
It's a Serverless World
PPTX
How Serverless Changes DevOps
PPTX
Serverless Toronto helps Startups
PPTX
The Serverless Native Mindset
PPTX
What is Serverless Computing?
PPTX
Meetup callback
PPTX
DevoxxFR 2018 #serverless - Mettez-le en œuvre dans votre entreprise et arriv...
PPTX
Serverless Computing
PPTX
Serverless-Computing-The-Future-of-Backend-Development
PDF
Enterprise serverless
PDF
Serverless: Market Overview and Investment Opportunities
PDF
Site reliability in the Serverless age - Serverless Boston 2019
PDF
Montréal AWS Users United: Let's go Serverless!
PDF
The Next Big Thing: Serverless
PDF
Serverless: A love hate relationship
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
An introduction to Serverless
Learning Serverless Design Develop and Deploy with Confidence 1st Edition Jas...
Cloud the path forward
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
It's a Serverless World
How Serverless Changes DevOps
Serverless Toronto helps Startups
The Serverless Native Mindset
What is Serverless Computing?
Meetup callback
DevoxxFR 2018 #serverless - Mettez-le en œuvre dans votre entreprise et arriv...
Serverless Computing
Serverless-Computing-The-Future-of-Backend-Development
Enterprise serverless
Serverless: Market Overview and Investment Opportunities
Site reliability in the Serverless age - Serverless Boston 2019
Montréal AWS Users United: Let's go Serverless!
The Next Big Thing: Serverless
Serverless: A love hate relationship
Ad

More from Sqreen (7)

PDF
Protecting against injections at scale
PDF
Writing a Python C extension
PDF
Api days 2018 - API Security by Sqreen
PDF
NoSQL Injections in Node.js - The case of MongoDB
PDF
Application Security from the Inside - OWASP
PDF
Instrument Rack to visualize
 Rails requests processing
PDF
Ruby on Rails security in your Continuous Integration
Protecting against injections at scale
Writing a Python C extension
Api days 2018 - API Security by Sqreen
NoSQL Injections in Node.js - The case of MongoDB
Application Security from the Inside - OWASP
Instrument Rack to visualize
 Rails requests processing
Ruby on Rails security in your Continuous Integration

Recently uploaded (20)

PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
ai tools demonstartion for schools and inter college
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPT
Introduction Database Management System for Course Database
PDF
AI in Product Development-omnex systems
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
System and Network Administration Chapter 2
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
System and Network Administraation Chapter 3
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Introduction to Artificial Intelligence
PDF
top salesforce developer skills in 2025.pdf
ISO 45001 Occupational Health and Safety Management System
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Softaken Excel to vCard Converter Software.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
ai tools demonstartion for schools and inter college
How Creative Agencies Leverage Project Management Software.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Design an Analysis of Algorithms I-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Introduction Database Management System for Course Database
AI in Product Development-omnex systems
Operating system designcfffgfgggggggvggggggggg
System and Network Administration Chapter 2
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
VVF-Customer-Presentation2025-Ver1.9.pptx
System and Network Administraation Chapter 3
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Introduction to Artificial Intelligence
top salesforce developer skills in 2025.pdf

Serverless security - how to protect what you don't see?

  • 2. Jean-Baptiste Aviat CTO & Co-founder Former (Red Team) Email: jb@sqreen.io Twitter: @jbaviat Podcast:
  • 3. What is Serverless? And why is it different?
  • 4. Business logic 100% written by developersDev Ops Code ⭐⭐⭐⭐⭐ Ops ⭐
  • 5. Auth File upload Business service #1 Business service #2 Push service Async workers Dev Ops Code ⭐⭐⭐ Ops ⭐⭐⭐
  • 8. Ad-hoc usage: easier to deploy Dynamically configure cloud elements, transform data on the go, comply to cloud vendors requirements. Teams use it to circumvent processes / CI / deploy. Native serverless applications Build applications designed for serverless infrastructures.
  • 9. How does serverless impacts security?
  • 10. Dev Sec Ops Dev Sec Ops Dev Sec Ops Serverless forces bridging dev, sec & ops Monolithic app Microservices Serverless
  • 11. What “serverless” means is moving too fast Edge serverless, ad-hoc, infra Scale is different (1 monolithic app → 5 micro services → 100 serverless functions) No tool allows to visualize all of your lambas at once (and the spreadsheet doesn’t work for this scale and pace!) The space didn’t reach maturity yet: ● No commonly accepted best practices, but a broad variety of best practices ● Evolving fast
  • 13. Scaling challenges 🤯: ● Developers do 20 ⨉ more ops ● 1 microservice = 20 ⨉ functions ● 20 ⨉ vulnerable dependencies? ● 20 ⨉ ownership tracking? ● 20 ⨉ threat modeling? ● 20 ⨉ faster new function appearance? New challenges 🚨: ● No way to visualize deployments ● Best practices still change rapidly ● Entrypoints vary widely (HTTP? Queue? Stream? Database?) ● Higher coupling to the cloud provider requires high cloud security Solved challenges ✅: ● System updates (unless Docker based!) ● Network level security (mTLS, …) ⨉
  • 15. Use infrastructure as code (Terraform, Cloud Formation, …) Shift your infrastructure left ● With serverless, a part of the business logic is handled by the infrastructure ● Serverless app developers own both the code and a part of the infrastructure Use principle of least privilege for your lambdas (but with reasonable granularity!) Monitor your costs (and be ready to block abuses) * Network, encryption, mutual authentication is mostly ensured by proper cloud services usage. But is much simpler than for microservices*
  • 16. Keep best practices Injections Vulnerable dependencies Lack of monitoring AuthN / AuthZ issues OWASP top 10 Scalability & coherency Design strong functions frameworks (CI, deployment, logging frameworks, …) NEW
  • 17. New functions appear and disappear at a highest rate than ever Leverage developer’s tools as much as possible to: ● Monitor security controls are applied ● Monitor the permissions used ● Ensure production doesn’t drift vs IaC IaC / Terraform make it easy to inspect IaC / Terraform allows to apply static control (and break CI if needed) Cloud APIs allow to dynamically list and inspect running containers
  • 18. ● Maintain the OWASP top 10 ● Adopt a strong cloud security posture ● Generalize principle of least privilege ● Generalize IaC (Terraform, ...) ● Leverage cloud APIs to automate controls and monitoring ● Monitor serverless cost ● Ensure coherency amongst functions deployments OWASP top 10 Cloud security posture Serverless cost monitoring Unified deployments
  • 19. Use Serverless framework or Terraform ● With safe, relevant examples ● Coupled with CI Provide relevant & safe code examples ● Using ORM / validation / log / … ● Coupled with CI Prepare provisioning for: ● A working deployment ● CI job to deploy & run linting / static analysers Document how to deploy secrets Git repositories best practices: ● Mandatory pull requests ● Require a CODEOWNERS file ● Lock master
  • 20. Complexity shifts to the infrastructure Serverless = different kind of ops - not no ops! Some risks occur 20 times more ● Serverless shifts complexity from application code to the infrastructure. ● Serverless doesn’t mean no ops but: ● Different kind of ops are done by different personas ● Ops are much simpler compared to microservices (mTLS, peer to peer, etc.) ● Some security risks occur more (20 times more!), some new ones appear, and a few ones disappear. ● Cloud security takes a much more important stance. ● Scaling development practices (CI, CD, frameworks, BoM) becomes a requirement Cloud security is more important than ever Scaling best practices becomes a necessity
  • 22. CSA - The 12 Most Critical Risks for Serverless Applications OWASP top 10 OWASP serverless top 10 Serverless framework Terraform, CloudFormation CODEOWNERS (Github, Gitlab) AppSec Builders podcast Or get in touch / ask me directly: Email: jb@sqreen.io Twitter: @jbaviat Podcast: