Defending Serverless Infrastructure in the Cloud

Defending Serverless Infrastructure in the Cloud

RSA Conference via YouTube Direct link

Function Network Flow Logs

24 of 25

24 of 25

Function Network Flow Logs

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Defending Serverless Infrastructure in the Cloud

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Cloud Serverless Infrastructure
  3. 3 Puma Security: Serverless Prey
  4. 4 Establishing The Function Reverse Shell
  5. 5 Serverless Execution Environment
  6. 6 Default Function Execution Networking
  7. 7 Serverless Secrets Management Options
  8. 8 Serverless Secrets: Where is the Source Code?
  9. 9 GCP Function: Source Code Example
  10. 10 GCP Function: Configuration File Example
  11. 11 Azure Function: Environment Variable Example
  12. 12 Serverless Execution Role
  13. 13 Serverless Account Credential Storage
  14. 14 Azure Managed Service Identity Token
  15. 15 Function Credential Pivoting
  16. 16 Serverless Function Credential Lifetime
  17. 17 Function Malware Persistence Example
  18. 18 Serverless Function Persistence Lifetime
  19. 19 Function Credential Audit Logging
  20. 20 Function Network Integration Options
  21. 21 Function Network Integration Benefits
  22. 22 Function Network Integration Example
  23. 23 Function Network Access Control Rules
  24. 24 Function Network Flow Logs
  25. 25 Function Private Endpoints

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.