Serverless

OWASP Serverless Top 10 Interpretation 2017 

Jan 27, 2020 06:21:33 AM

Report Structure

Each of the original Top 10 risks is reviewed. The review lists six sections:

A. New possible attack vectors when targeting serverless applications
B. How/Why a serverless application could be vulnerable to such attacks
C. What is the business impact on the cloud account
D. Best practices and suggestions for preventing and mitigating such attacks
E. Example scenario(s), demonstrating a possible vulnerability and exploit
F. Taking into account the attack vectors, weaknesses and impact, as well as the ability to identify and
mitigate it; is this security risk higher, lower or the same in serverless applications?

Statistics
0 Favorited
3 Views
1 Files
0 Shares
2 Downloads
Attachment(s)
pdf file
OWASP Top 10 Serverless Interpretation 2017.pdf   2.99 MB   1 version
Uploaded - Jan 27, 2020

Tags and Keywords

Related Entries and Links

No Related Resource entered.