SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
AWS LAMBDA SECURITY: INSIDE & OUT
Mike Deck Principal Solutions Architect, AWS
Ory Segal PureSec CTO
https://www.puresec.io/
Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec
Agenda
 AWS Lambda overview
 AWS Lambda under the hood
 Security isolation & network isolation
 Serverless security
 The evolution of the shared responsibility
model
 Protecting serverless applications
© 2019, Amazon Web Services, Inc. or its Affiliates.
SERVICES (ANYTHING)
Changes in
data state
Requests to
endpoints
Changes in
resource state
EVENT SOURCE FUNCTION
Node.js
Python
Java
C#
Go
AWS Lambda overview
© 2019, Amazon Web Services, Inc. or its Affiliates.
Lambda handles…
Load Balancing
Auto Scaling
Handling Failures
Security Isolation
Managing Utilization
(and many other things) for you
© 2019, Amazon Web Services, Inc. or its Affiliates.
Let’s take a look under the
hood
© 2019, Amazon Web Services, Inc. or its Affiliates.
© 2019, Amazon Web Services, Inc. or its Affiliates.
AWS Cloud
Region
Lambda customer
(Existing Worker,
New Sandbox)
Availability zone 2
Availability zone 1
Invoke
Front End
Invoke
Front End
Worker Mgr
Worker Mgr
Reserve Sandbox
Invoke
Worker
Worker
Worker
Init
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Sandbox isolation
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
One Function
ManyAccounts
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Virtual Devices
Device Emulation
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
virtio drivers
virtio host in Firecracker
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Virtual Devices
Device Emulation
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Network isolation
© 2019, Amazon Web Services, Inc. or its Affiliates.
Worker
Lambda
Function
ENI in
yourVPC
YourVPC
Local
NAT
© 2019, Amazon Web Services, Inc. or its Affiliates.
Worker
Lambda
Function
ENI in
yourVPC
YourVPC
Remote
NAT
© 2019, Amazon Web Services, Inc. or its Affiliates.
© 2019, Amazon Web Services, Inc. or its Affiliates.
↓
↓
↑
Firecracker Hypervisor vs. Others
© 2019, Amazon Web Services, Inc. or its Affiliates.
Security Whitepaper
https://bit.ly/lambda-security
© 2019, Amazon Web Services, Inc. or its Affiliates.
Learn more
Available onYouTube
https://youtu.be/QdzV04T_kec
AWS LAMBDA
SECURITY
SERVERLESS
SECURITY
Shared Model Of Responsibility
CLOUD PROVIDER
Responsible for security
“of”
The cloud
REGIONS AVAILABILITY ZONES EDGE LOCATIONS
COMPUTE STORAGE DATABASE NETWORK
OPERATING SYSTEM + VIRTUAL MACHINES + CONTAINERS
APPLICATION
OWNER
Responsible for
security “in” the cloud
APPLICATIONS (FUNCTIONS)
IDENTITY & ACCESS
MANAGEMENT
CLOUD SERVICES
CONFIGURATION
CLIENT-SIDE DATA IN CLOUD DATA IN TRANSIT
Security Responsibility: When You Own The
Infrastructure (IaaS)
 Physical infrastructure, access restrictions to physical perimeter and hardware
 Secure configuration of infrastructure devices and systems
 Regularly testing the security of all systems/processes (OS, services)
 Identification and authentication of access to systems (OS, services)
 Patching and fixing flaws in OS
 Hardening OS and services
 Protecting all systems against malware and backdoors
 Patching and fixing flaws in runtime environment and related software packages
 Exploit prevention and memory protection
 Network segmentation
 Tracking and monitoring all network resources and access
 Installation and maintenance of network firewalls
 Network-layer DoS protection
 Authentication of users
 Authorization controls when accessing application and data
 Log and maintain audit trails of all access to application and data
 Deploy an application layer firewall for event-data inspection
 Detect and fix vulnerabilities in third-party dependencies
 Use least-privileged IAM roles and permissions
 Enforce legitimate application behavior
 Data leak prevention
 Scan code and configurations statically during development
 Maintain serverless/cloud asset inventory
 Remove obsolete/unused cloud services and functions
 Continuously monitor errors and security incidents
8%
92%
APPLICATION
OWNER
CLOUD
PROVIDER
Security Responsibility: When You Adopt
Serverless
 Physical infrastructure, access restrictions to physical perimeter and hardware
 Secure configuration of infrastructure devices and systems
 Regularly testing the security of all systems/processes (OS, services)
 Identification and authentication of access to systems (OS, services)
 Patching and fixing flaws in OS
 Hardening OS and services
 Protecting all systems against malware and backdoors
 Patching and fixing flaws in runtime environment and related software packages
 Exploit prevention and memory protection
 Network segmentation
 Tracking and monitoring all network resources and access
 Installation and maintenance of network firewalls
 Network-layer DoS protection
 Authentication of users
 Authorization controls when accessing application and data
 Log and maintain audit trails of all access to application and data
 Deploy an application layer firewall for event-data inspection
 Detect and fix vulnerabilities in third-party dependencies
 Use least-privileged IAM roles and permissions
 Enforce legitimate application behavior
 Data leak prevention
 Scan code and configurations statically during development
 Maintain serverless/cloud asset inventory
 Remove obsolete/unused cloud services and functions
 Continuously monitor errors and security incidents
52%
48%
APPLICATION
OWNER
CLOUD
PROVIDER
Top Risks for Serverless Applicationshttp://bit.ly/csa-top-12
SAS-1
Function event-data injection
Broken authentication
SAS-2
Insecure serverless deployment
SAS-3
Over-privileged function permissions
SAS-4
Inadequate function monitoring
SAS-5
Insecure 3rd party dependencies
SAS-6
Insecure app secrets storage
SAS-7
DoS & Financial exhaustion
SAS-8
Serverless business logic manipulation
SAS-9
Improper exceptions handling & errors
SAS-10
Legacy functions & cloud resources
SAS-11
Cross-execution data persistency
SAS-12
Existing Application Security Solutions Do
Not Fit
Protects applications by
being deployed on
networks and servers
TRADITIONAL SECURITY
The application owner doesn't
have any control over the
infrastructure
SERVERLESS
INFRASTRUCTURE
SERVERLESS
FUNCTIONS WAF
LAYER 7
NG-FW
INBOUND
WSG
OUTBOUND
IPS
NETWORK
EPP
BEHAVIORAL
APPLICATION
Traditional Protections Cannot Be Deployed
On Serverless
With No Infrastructure Based Protections,
Your Security is Reduced to
Good Coding and Strict Configuration
THE CHALLENGE OF ”LEAST-
PRIVILEGED” IAM ROLES
 Functions should only be allowed to do
what they are tasked with
 AWS IAM model is extremely powerful,
yet hard to get right, especially at large
scale
 Human factor
 ‘Over-privileged’ issues are the most
common problem
C O N F I G U R AT I O N
GETTING IAM PERMISSIONS RIGHT
 Adopt ‘Role-per-Function’ model
 Single responsibility principle – each
function should have a single focused task
 Use SAM managed policies where
applicable
 Automate IAM permissions scanning and
role generation (PureSec)
Your Function
Static Code
Analysis
Learn about cloud
resource interactions,
and least required
privileges
IAM Role
Configuration
Analysis
Learn about
privileges granted
Account Analysis
Learn about cloud
resources in your
account that might be
at risk
Automating Least-Privileged IAM w/ PureSec
• Remediate risks during development with the CLI-based scanner
• Enforce least-privilege policy during build (CI/CD integration)
• Continuously monitor & enforce security on deployed applications
There’s more to AWS Lambda than
AWS Gateway
HTTP
…47 services
• Web Application Firewalls inspect HTTP(s) web traffic
• Require deployment in-line between client and Lambda
• Parse and inspect HTTP messages (parameters, cookies, headers)
Cloud-native event inspection requires a
different approach.
* Where is data coming from?
Eventually from the outside…
PureSec Runtime Protection: serverless, scalable & blazing-fast
 Serverless application firewall - inspects all cloud-native events
 Serverless Behavioral Protection – enforces expected app behavior
 Protects real-world production applications with billions of invocations
ory@puresec.io
Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Puma Security, LLC
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeCSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeAlert Logic
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsPuma Security, LLC
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAmazon Web Services
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at NetflixJason Chan
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelinePuma Security, LLC
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes EverywhereAmazon Web Services
 
Winning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructureWinning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructurePuma Security, LLC
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...😸 Richard Spindler
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAmazon Web Services
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Puma Security, LLC
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Amazon Web Services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAlert Logic
 

Was ist angesagt? (19)

Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeCSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps Pipeline
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Winning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructureWinning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless Infrastructure
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps Pipelines
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 

Ähnlich wie AWS Lambda Security Inside & Out

Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Jeremy Daly
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionAmazon Web Services
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountAmazon Web Services
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Application Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesApplication Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesRightScale
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Amazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation OverviewAmazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 

Ähnlich wie AWS Lambda Security Inside & Out (20)

Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Application Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesApplication Security in the Cloud - Best Practices
Application Security in the Cloud - Best Practices
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation Overview
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 

Kürzlich hochgeladen

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 

Kürzlich hochgeladen (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 

AWS Lambda Security Inside & Out

  • 1. AWS LAMBDA SECURITY: INSIDE & OUT Mike Deck Principal Solutions Architect, AWS Ory Segal PureSec CTO https://www.puresec.io/ Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec
  • 2. Agenda  AWS Lambda overview  AWS Lambda under the hood  Security isolation & network isolation  Serverless security  The evolution of the shared responsibility model  Protecting serverless applications
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. SERVICES (ANYTHING) Changes in data state Requests to endpoints Changes in resource state EVENT SOURCE FUNCTION Node.js Python Java C# Go AWS Lambda overview
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. Lambda handles… Load Balancing Auto Scaling Handling Failures Security Isolation Managing Utilization (and many other things) for you
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. Let’s take a look under the hood
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates.
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. AWS Cloud Region Lambda customer (Existing Worker, New Sandbox) Availability zone 2 Availability zone 1 Invoke Front End Invoke Front End Worker Mgr Worker Mgr Reserve Sandbox Invoke Worker Worker Worker Init
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Sandbox isolation
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode One Function ManyAccounts
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Virtual Devices Device Emulation Physical Devices
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS virtio drivers virtio host in Firecracker Physical Devices
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Virtual Devices Device Emulation Physical Devices
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Network isolation
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. Worker Lambda Function ENI in yourVPC YourVPC Local NAT
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. Worker Lambda Function ENI in yourVPC YourVPC Remote NAT
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates.
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. ↓ ↓ ↑ Firecracker Hypervisor vs. Others
  • 24. © 2019, Amazon Web Services, Inc. or its Affiliates. Security Whitepaper https://bit.ly/lambda-security
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. Learn more Available onYouTube https://youtu.be/QdzV04T_kec
  • 27. Shared Model Of Responsibility CLOUD PROVIDER Responsible for security “of” The cloud REGIONS AVAILABILITY ZONES EDGE LOCATIONS COMPUTE STORAGE DATABASE NETWORK OPERATING SYSTEM + VIRTUAL MACHINES + CONTAINERS APPLICATION OWNER Responsible for security “in” the cloud APPLICATIONS (FUNCTIONS) IDENTITY & ACCESS MANAGEMENT CLOUD SERVICES CONFIGURATION CLIENT-SIDE DATA IN CLOUD DATA IN TRANSIT
  • 28. Security Responsibility: When You Own The Infrastructure (IaaS)  Physical infrastructure, access restrictions to physical perimeter and hardware  Secure configuration of infrastructure devices and systems  Regularly testing the security of all systems/processes (OS, services)  Identification and authentication of access to systems (OS, services)  Patching and fixing flaws in OS  Hardening OS and services  Protecting all systems against malware and backdoors  Patching and fixing flaws in runtime environment and related software packages  Exploit prevention and memory protection  Network segmentation  Tracking and monitoring all network resources and access  Installation and maintenance of network firewalls  Network-layer DoS protection  Authentication of users  Authorization controls when accessing application and data  Log and maintain audit trails of all access to application and data  Deploy an application layer firewall for event-data inspection  Detect and fix vulnerabilities in third-party dependencies  Use least-privileged IAM roles and permissions  Enforce legitimate application behavior  Data leak prevention  Scan code and configurations statically during development  Maintain serverless/cloud asset inventory  Remove obsolete/unused cloud services and functions  Continuously monitor errors and security incidents 8% 92% APPLICATION OWNER CLOUD PROVIDER
  • 29. Security Responsibility: When You Adopt Serverless  Physical infrastructure, access restrictions to physical perimeter and hardware  Secure configuration of infrastructure devices and systems  Regularly testing the security of all systems/processes (OS, services)  Identification and authentication of access to systems (OS, services)  Patching and fixing flaws in OS  Hardening OS and services  Protecting all systems against malware and backdoors  Patching and fixing flaws in runtime environment and related software packages  Exploit prevention and memory protection  Network segmentation  Tracking and monitoring all network resources and access  Installation and maintenance of network firewalls  Network-layer DoS protection  Authentication of users  Authorization controls when accessing application and data  Log and maintain audit trails of all access to application and data  Deploy an application layer firewall for event-data inspection  Detect and fix vulnerabilities in third-party dependencies  Use least-privileged IAM roles and permissions  Enforce legitimate application behavior  Data leak prevention  Scan code and configurations statically during development  Maintain serverless/cloud asset inventory  Remove obsolete/unused cloud services and functions  Continuously monitor errors and security incidents 52% 48% APPLICATION OWNER CLOUD PROVIDER
  • 30. Top Risks for Serverless Applicationshttp://bit.ly/csa-top-12 SAS-1 Function event-data injection Broken authentication SAS-2 Insecure serverless deployment SAS-3 Over-privileged function permissions SAS-4 Inadequate function monitoring SAS-5 Insecure 3rd party dependencies SAS-6 Insecure app secrets storage SAS-7 DoS & Financial exhaustion SAS-8 Serverless business logic manipulation SAS-9 Improper exceptions handling & errors SAS-10 Legacy functions & cloud resources SAS-11 Cross-execution data persistency SAS-12
  • 31. Existing Application Security Solutions Do Not Fit Protects applications by being deployed on networks and servers TRADITIONAL SECURITY The application owner doesn't have any control over the infrastructure SERVERLESS
  • 32. INFRASTRUCTURE SERVERLESS FUNCTIONS WAF LAYER 7 NG-FW INBOUND WSG OUTBOUND IPS NETWORK EPP BEHAVIORAL APPLICATION Traditional Protections Cannot Be Deployed On Serverless With No Infrastructure Based Protections, Your Security is Reduced to Good Coding and Strict Configuration
  • 33.
  • 34. THE CHALLENGE OF ”LEAST- PRIVILEGED” IAM ROLES  Functions should only be allowed to do what they are tasked with  AWS IAM model is extremely powerful, yet hard to get right, especially at large scale  Human factor  ‘Over-privileged’ issues are the most common problem C O N F I G U R AT I O N
  • 35. GETTING IAM PERMISSIONS RIGHT  Adopt ‘Role-per-Function’ model  Single responsibility principle – each function should have a single focused task  Use SAM managed policies where applicable  Automate IAM permissions scanning and role generation (PureSec)
  • 36. Your Function Static Code Analysis Learn about cloud resource interactions, and least required privileges IAM Role Configuration Analysis Learn about privileges granted Account Analysis Learn about cloud resources in your account that might be at risk Automating Least-Privileged IAM w/ PureSec
  • 37. • Remediate risks during development with the CLI-based scanner • Enforce least-privilege policy during build (CI/CD integration) • Continuously monitor & enforce security on deployed applications
  • 38.
  • 39. There’s more to AWS Lambda than AWS Gateway HTTP …47 services • Web Application Firewalls inspect HTTP(s) web traffic • Require deployment in-line between client and Lambda • Parse and inspect HTTP messages (parameters, cookies, headers) Cloud-native event inspection requires a different approach. * Where is data coming from? Eventually from the outside…
  • 40. PureSec Runtime Protection: serverless, scalable & blazing-fast  Serverless application firewall - inspects all cloud-native events  Serverless Behavioral Protection – enforces expected app behavior  Protects real-world production applications with billions of invocations
  • 41. ory@puresec.io Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec