Overview
Syllabus
Intro
Cloud Serverless Infrastructure
Puma Security: Serverless Prey
Establishing The Function Reverse Shell
Serverless Execution Environment
Default Function Execution Networking
Serverless Secrets Management Options
Serverless Secrets: Where is the Source Code?
GCP Function: Source Code Example
GCP Function: Configuration File Example
Azure Function: Environment Variable Example
Serverless Execution Role
Serverless Account Credential Storage
Azure Managed Service Identity Token
Function Credential Pivoting
Serverless Function Credential Lifetime
Function Malware Persistence Example
Serverless Function Persistence Lifetime
Function Credential Audit Logging
Function Network Integration Options
Function Network Integration Benefits
Function Network Integration Example
Function Network Access Control Rules
Function Network Flow Logs
Function Private Endpoints
Taught by
RSA Conference