SlideShare ist ein Scribd-Unternehmen logo
1 von 107
Downloaden Sie, um offline zu lesen
snyk.io
Serverless Security:

What’s Left to Protect?
Guy Podjarny, Snyk
@guypod
snyk.io
About Me
• Guy Podjarny, @guypod on Twitter
• CEO & Co-founder at Snyk
• History:
• Cyber Security part of Israel Defense Forces
• First Web App Firewall(AppShield), Dynamic/Static Tester(AppScan)
• Security: Worked in Sanctum -> Watchfire -> IBM
• Performance: Founded Blaze -> CTO @Akamai
• O’Reilly author, speaker
snyk.io
Serverless

Changes Security
snyk.io
Serverless Is…
Better for some security concerns
Neutral for some security concerns
Worse for some security concerns
snyk.io
When is Serverless 

Better for Security?
snyk.io
Serverless has no Servers!
(that you manage and secure)
snyk.io
Vulnerable

OS Dependencies
“patching”your servers
Less need to worry about…
snyk.io
Heartbleed
snyk.io
Shellshock
snyk.io
snyk.io
Verizon:

“Most attacks exploit known
vulnerabilities that have never been
patched despite patches being
available for months, or even years”
snyk.io
Symantec: 

“Through 2020, 99% of vulnerabilities
exploited will continue to be ones
known by security and IT
professionals for at least one year”
snyk.io
With Serverless, it’s the

platform’s responsibility
And it’s the platform operators core competency
snyk.io
FaaS ~= PaaS
FaaS naturally relies less on OS dependencies
snyk.io
Denial of Service
Less need to worry about…
snyk.io
DoS means a stream of

specific“heavy”requests

take down server(s)(e.g. ReDoS).
In FaaS, there is no long standing server to take down
snyk.io
Auto Scale FTW!
Deal with bad demand just like dealing with good demand
snyk.io
Caveat: 

Concurrent execution limit
AWS Lambda default limit 1000 concurrent function executions pre region
snyk.io
Caveat: 

Resource exhaustion
Back-end resources are often not equally elastic
snyk.io
Caveat: 

Limited in size
100Gbps attack will still take you down…

Consider a DDoS protection solution too.
snyk.io
Caveat: 

Your bill
You still pay for extra traffic…
snyk.io
Long-lived
Compromised Servers
Less need to worry about…
snyk.io
Attackers penetrate 

in stages
snyk.io
Attackers like to lay in wait
snyk.io
FaaS forces Statelessness -

including bad state
Attackers need to repeat attacks many times, risking detection & remediation
snyk.io
Caveat: 

Containers are often reused
A compromised function may still compromise other users
snyk.io
FaaS > PaaS
PaaS Servers are managed, but still live longer
snyk.io
Security in Serverless
Vulnerable OS Dependencies
Denial of Service
Long-lived Compromised
Servers
Better
snyk.io
So attackers will go…
¯_(ツ)_/¯
Right?
snyk.io
When is Serverless 

Neutral for Security?
snyk.io
Permissions
and authorization
Still need to worry about…
snyk.io
Who can invoke your
function?
snyk.io
Who can access code & 

env vars for your function?
snyk.io
If your function was
compromised, what can it do?
snyk.io
AWS Security Policy
snyk.io
AWS Security Policy
Easier
Policy 3Policy 2
Policy 1
Safer
snyk.io
Keep your policies granular
snyk.io
iRobot automates IAM roles
https://www.youtube.com/watch?v=BVVHzCd8APw
snyk.io
Use Least Privilege Principle
snyk.io
Policies continuously
expand until somebody
adds an asterix
snyk.io
Adding permissions is easy.

Removing permissions is hard
snyk.io
Caveat:

FaaS permissions are limited to

Platform actions
snyk.io
PureSec FunctionShield
snyk.io
Serverless is a bit better

for authorization
if managed properly, which it often isn’t
snyk.io
Securing Data(at rest)
Still need to worry about…
snyk.io
FaaS apps still store data
and that data can be stolen or tampered with
snyk.io
Bad:

FaaS means more state 

outside the server
can no longer keep sensitive data “on the machine”
snyk.io
Good:

FaaS allows more granular

data access controls
Control which functions can access which data
snyk.io
Tips & Tricks
• Encrypt all sensitive persistent data
• Encrypt all sensitive off-box state data
• Minimize functions that can access each data store
• Use separate DB credentials per function
• And control what these credentials should do
• Monitor which functions are accessing which data
snyk.io
Vulnerabilities in 

Your Code
Still need to worry about…
snyk.io
Serverless doesn’t protect

the Application Layer
snyk.io
SQL Injection
Cross Site Scripting
Remote Command Execution
Cross Site Request Forgery
Bad auth logic
…
snyk.io https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
snyk.io
App Sec Tips
• Dynamic App Sec Testing
• Static App Sec Testing
• Standardize input processing to include sanitization
• Use shared libraries across functions
• Make API Gateway models as strict as possible
• Secure each function independently
• Secure unit tests FTW!
snyk.io
Vulnerable

Application Dependencies
Still need to worry about…
snyk.io
Serverless functions use

Application Dependencies
npm, Maven, PyPI, nuget…
snyk.io
For many functions, the majority 

of code is dependencies
3rd party code can hold vulnerabilities just like 1st party code
snyk.io
Example: Fetch file & store in s3
(Serverless Framework Example)
19 Lines of Code
2 Direct dependencies
19 dependencies(incl. indirect)
191,155 Lines of Code
snyk.io
More code ~= 

More Vulnerabilities
snyk.io
Over time, dependencies grow

stale & vulnerable
snyk.io
snyk.io
The platform manages 

OS Dependencies.



You need to manage 

App Dependencies.
snyk.io
<Shameless Plug>
snyk.io
Snyk for Serverless!

(and PaaS)
snyk.io
Snyk for Serverless!

(and PaaS)
snyk.io
Fix during Dev
snyk.io
</Shameless Plug>
snyk.io
Security in Serverless
Vulnerabilities in your code
Vulnerable App Dependencies
Permissions
Securing Data at rest
Vulnerable OS Dependencies
Denial of Service
Long-lived Compromised
Servers
Better Neutral
snyk.io
Neutral ~= Worse
By eliminating some threats, 

Serverless shifts attacker attention to what’s left
snyk.io
When is Serverless 

Worse for Security?
snyk.io
Serverless doesn’t create 

new security problems.
snyk.io
Serverless means more…


Independent Services
Flexible Interfaces
Use of 3rd party services
including the risks that entails!
snyk.io
Third Party Services
and securing data in transit
More need to worry about…
snyk.io
What data are you sharing?
and how well does the other service manage it?
For each service, worry about…
snyk.io
Is data in transit secured?
Is it using HTTPS? Is it within a VPC? Is it encrypted?
For each service, worry about…
snyk.io
Who are you talking to?
You use an API key, but how do you authenticate them?

Validate HTTPS cert, especially when exiting your network
For each service, worry about…
snyk.io
Do you trust its responses?
If the other service is compromised, can it be used to get to you?
For each service, worry about…
snyk.io
How to store API keys?
Be sure to use a KMS and rotate keys!
For each service, worry about…
snyk.io
For each service, worry about…
• What data are you sharing?
• Is data in transit secured?
• Who are you talking to?
• Do you trust its responses?
• How to store API keys?
snyk.io
Worry about 

1st party services too!
Don’t let your least secure function take down the system
snyk.io
Use

AWS X-Ray

for visibility
Image via Yan Cui’s blog
snyk.io
Attack Surface
mo’ functions, mo’ problems
More need to worry about…
snyk.io
Serverless -> Granularity ->

Flexibility
snyk.io
Flexibility -> Risk
Harder to define what’s “right”, more use-cases to abuse
snyk.io
A function is a perimeter
That needs to be secured
Perimeter Perimeter
Perimeter
Perimeter
Perimeter
snyk.io
Tips & Tricks
• Test every function for security flaws, independently
• Don’t rely on limiting access to a function
• Access controls will change over time, without code changes
• Use shared input/output processing libraries
• Make it easier to process input securely than insecurely
• Limit functionality to what you actually need
• Sometimes you need to work more to let functions do less
• Monitor both individual functions and full flows
snyk.io
Security Monitoring
mo’ functions, mo’ problems
More need to worry about…
snyk.io
Why NOT

deploy a function?
Super easy,(effectively)zero cost
snyk.io
Easy deployment + min cost =
LOTS of functions
Many of which are lightly used
snyk.io
Easy to add,

Hard to remove
snyk.io
Policies tend to expand…
Expanding is easy, contracting is hard
snyk.io
LOTS of functions,

many of which are lightly used,

with overly open policies…
our future?
snyk.io
Every Function 

introduces Risk
snyk.io
No ops cost != 

No cost of ownership
Risk & Management costs still exist
snyk.io
Tips & Tricks
• Consider before you deploy. Do you need this?
• Separate networks/accounts for groups of functions
• Track what you have deployed, and how it’s used
• Minimize permissions up front
• Chaos-style reduce permissions and see what breaks
• Monitor for known vulnerabilities in functions
snyk.io
Security in Serverless
Vulnerabilities in your code
Vulnerable App Dependencies
Permissions
Securing Data at rest
Vulnerable OS Dependencies
Denial of Service
Long-lived Compromised
Servers
Third Party Services
Attack Surface
Security Monitoring
Better Neutral Worse
snyk.io
Tools?
snyk.io
https://thenewstack.io/serverless-roadmaps-monitoring-security-frameworks-tools/
snyk.io
Monitor attacks in the SOCC

(Security Operation Control Center)
PureSec
Twistlock
Protego
snyk.io
Monitor & Fix vulnerable libs 

in Dev & CI/CD
snyk.io
Summary
snyk.io
Serverless dramatically reduces
some top security threats
snyk.io
But…
snyk.io
Security is hard - 

and attackers don’t give up
snyk.io
Serverless shuffles 

security priorities
Previously easy attacks are now hard.

Attackers will move on to the next item on the list

snyk.io
Security in Serverless
Vulnerabilities in your code
Vulnerable App Dependencies
Permissions
Securing Data at rest
Vulnerable OS Dependencies
Denial of Service
Long-lived Compromised
Servers
Third Party Services
Attack Surface
Security Monitoring
Better Neutral Worse
snyk.io
Serverless is defined now.

Let’s build Security in.
Thank You!
Guy Podjarny, Snyk
@guypod

Weitere ähnliche Inhalte

Was ist angesagt?

Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloud
DevSecCon
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
DevSecCon
 
Dev secops on the offense automating amazon web services account takeover
Dev secops on the offense  automating amazon web services account takeoverDev secops on the offense  automating amazon web services account takeover
Dev secops on the offense automating amazon web services account takeover
Priyanka Aash
 

Was ist angesagt? (20)

Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloud
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
 
Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)
 
Prepare to defend thyself with Blue/Green
Prepare to defend thyself with Blue/GreenPrepare to defend thyself with Blue/Green
Prepare to defend thyself with Blue/Green
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020
 
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes BackBSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
 
Security in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps EngineersSecurity in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps Engineers
 
Dev secops on the offense automating amazon web services account takeover
Dev secops on the offense  automating amazon web services account takeoverDev secops on the offense  automating amazon web services account takeover
Dev secops on the offense automating amazon web services account takeover
 
Become a Cloud Security Ninja
Become a Cloud Security NinjaBecome a Cloud Security Ninja
Become a Cloud Security Ninja
 
Evaluating container security with ATT&CK Framework
Evaluating container security with ATT&CK FrameworkEvaluating container security with ATT&CK Framework
Evaluating container security with ATT&CK Framework
 
AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensor
 
DevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security SuccessDevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security Success
 
Security in Serverless world
Security in Serverless worldSecurity in Serverless world
Security in Serverless world
 
Policy as code what helm developers need to know about security
Policy as code  what helm developers need to know about securityPolicy as code  what helm developers need to know about security
Policy as code what helm developers need to know about security
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 
Why should developers care about container security?
Why should developers care about container security?Why should developers care about container security?
Why should developers care about container security?
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?
 
Pragmatic Security Automation for Cloud
Pragmatic Security Automation for CloudPragmatic Security Automation for Cloud
Pragmatic Security Automation for Cloud
 

Ähnlich wie Serverless Security: What's Left To Protect

Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
Priyanka Aash
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
 

Ähnlich wie Serverless Security: What's Left To Protect (20)

Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
Application Security within Agile
Application Security within AgileApplication Security within Agile
Application Security within Agile
 
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays New York 2023 - Putting yourself out there - how to secure your publi...apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays New York 2023 - Putting yourself out there - how to secure your publi...
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
Jobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to SecurityJobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to Security
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontVices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 

Mehr von Guy Podjarny

Rules driven-delivery
Rules driven-deliveryRules driven-delivery
Rules driven-delivery
Guy Podjarny
 

Mehr von Guy Podjarny (18)

Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)
 
Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)
 
High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)
High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)
High Performance Images: Beautiful Shouldn't Mean Slow (Velocity EU 2015)
 
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
 
High Performance Images: Beautiful Shouldn't Mean Slow
High Performance Images: Beautiful Shouldn't Mean SlowHigh Performance Images: Beautiful Shouldn't Mean Slow
High Performance Images: Beautiful Shouldn't Mean Slow
 
Responsive In The Wild, 2014
Responsive In The Wild, 2014Responsive In The Wild, 2014
Responsive In The Wild, 2014
 
Rules driven-delivery
Rules driven-deliveryRules driven-delivery
Rules driven-delivery
 
Responsive In The Wild (SmashingConf, 2014)
Responsive In The Wild (SmashingConf, 2014)Responsive In The Wild (SmashingConf, 2014)
Responsive In The Wild (SmashingConf, 2014)
 
Putting Your Images on a Diet (SmashingConf, 2014)
Putting Your Images on a Diet (SmashingConf, 2014)Putting Your Images on a Diet (SmashingConf, 2014)
Putting Your Images on a Diet (SmashingConf, 2014)
 
Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)
 
Third Party Performance
Third Party PerformanceThird Party Performance
Third Party Performance
 
A Picture Costs A Thousand Words
A Picture Costs A Thousand WordsA Picture Costs A Thousand Words
A Picture Costs A Thousand Words
 
Step by Step Mobile Optimization
Step by Step Mobile OptimizationStep by Step Mobile Optimization
Step by Step Mobile Optimization
 
Quantifying The Mobile Difference
Quantifying The Mobile DifferenceQuantifying The Mobile Difference
Quantifying The Mobile Difference
 
Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)
 
Performance Implications of Mobile Design
Performance Implications of Mobile DesignPerformance Implications of Mobile Design
Performance Implications of Mobile Design
 
Unravelling Mobile Web Performance
Unravelling Mobile Web PerformanceUnravelling Mobile Web Performance
Unravelling Mobile Web Performance
 
State Of Mobile Web Performance
State Of Mobile Web PerformanceState Of Mobile Web Performance
State Of Mobile Web Performance
 

Kürzlich hochgeladen

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Kürzlich hochgeladen (20)

Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Serverless Security: What's Left To Protect