Security Congress Abstract
The benefits of cloud computing are well known, and companies worldwide are racing to migrate their workloads to these virtual environments. Serverless computing is one particular cloud service that has seen a dramatic uptake in the last year. It offers increased performance and scalability at a reduced cost. Yet, there is a misconception that serverless computing is inherently secure due to its ephemeral nature.
The reality is that serverless computing offers just as much risk to an enterprise, only that the risk has shifted. In this session, we will answer the questions of how you can audit a serverless function as well as identify vectors of attack. We will then provide a roadmap of best practices to mitigate potential areas of concern.