Cloud Security Podcast cover image

Breaking and Building Serverless Application Security

Cloud Security Podcast

00:00

Servilis Security White Paper

Epicap: I like to start with the sass top ten. That's provider independente so it starts with function data and injection. You might have a function that authorizes another function that has an authentication by pass. This is not a problem that's unique to circlists, but it still doesn't alo insecure secret storage definitely applies. People constantly with landed functions and azure functions and gugle cloud functions. They sensitive things in environment variables. And it's not any different than coubernets, right? Or ye s too. It just still applies here, denial of service and a financial resource exhaustion which is part of a threat model i think a lot of

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app