3min chapter

Cloud Security Podcast cover image

Breaking and Building Serverless Application Security

Cloud Security Podcast

CHAPTER

Servilis Security White Paper

Epicap: I like to start with the sass top ten. That's provider independente so it starts with function data and injection. You might have a function that authorizes another function that has an authentication by pass. This is not a problem that's unique to circlists, but it still doesn't alo insecure secret storage definitely applies. People constantly with landed functions and azure functions and gugle cloud functions. They sensitive things in environment variables. And it's not any different than coubernets, right? Or ye s too. It just still applies here, denial of service and a financial resource exhaustion which is part of a threat model i think a lot of

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode