With the accelerating adoption of cloud technologies and remote work, those pathways are increasingly abundant. Today’s attackers have realigned their efforts to capitalize, focusing on remaining undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches
Sep 19, 2022 | 09:00 AM - 10:00 AM PT
NSA Pontential Threat Vectors to 5G Infrastructure 20210510.PDF
See matching posts in thread - This product is not an exhaustive risk summary o...
The review lists six sections: A. New possible attack vectors when targeting serverless applications B. How/Why a serverless application could be vulnerable to such attacks C. What is the business impact on the cloud account D. Best practices and suggestions for preventing and mitigating such attacks E. Example scenario(s), demonstrating a possible vulnerability and exploit F. Taking into account the attack vectors, weaknesses and impact, as well as the ability to identify and mitigate it; is this security risk higher, lower or the same in serverless applications?
OWASP Top 10 Serverless Interpretation 2017.pdf