Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st...

15
Serverless Security Your Code, Your Responsibility October 2018 © 2018 PureSec Ory Segal, CTO & Co-Founder, PureSec

Transcript of Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st...

Page 1: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Serverless SecurityYour Code, Your Responsibility

October 2018 © 2018 PureSec

Ory Segal, CTO & Co-Founder, PureSec

Page 2: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

P U R E S E C

© 2018 PureSec

• I’m Ory Segal, CTO & Co-Founder @ PureSec

• I’ve been involved in application security for the past

20yrs.

• Responsible for the security research behind:

• IBM AppScan (SAST / DAST / IAST)

• Sanctum AppShield (World’s 1st WAF)

• Akamai Kona Cloud Security (World’s 1st Cloud-WAF)

• Author of 20 patents in the fields of Web Security,

SAST, DAST, IAST and automated threat intelligence

• WASC officer, OWASP, NIST, MITRE CWE, W3C, …

Twitter: @orysegal , @PureSecTeam

Page 3: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Serverless: Who’s Responsible For Securing The Application Layer?

Cloud Provider

Responsible for security “of” the cloud

Regions Availability Zones Edge Locations

Compute Storage Database Networking

Operating System + Virtual Machines + Containers

Application Owner

Responsible for security “in” the cloud

Applications (Functions)

Identity & Access Management Cloud Services configuration

Client-Side Data in Cloud Data in Transit

Page 4: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Serverless Attack “Entry-Points”

4

F1. Event

2. Operation

3. Interaction

4. Output

HTTP/S, File, DB, Stream, SMS, Email, Queue etc.

Malicious code deployment / 3rd party library

Compromised component

1. Injection attacks2. Auth. bypass3. Data compromise4. Sensitive app secrets leakage5. Business logic manipulation6. DoS7. …

Page 5: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

The Problem With Existing Security Solutions

Traditional Security

Focuses on protecting

applications by securing the

network and servers

Serverless

The application owner doesn't

have any control over the

infrastructure

Traditional security solutions have become irrelevant

Page 6: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Malicious Behavior Detection with EPP

Malicious Network Traffic Inspection with IPS/IDS

Outbound Web Traffic Inspection with WSG

Your ApplicationInbound Traffic Inspection with FW

Inbound App Layer Inspection with WAF

Serverless Functions

Traditional Security Solutions Cannot Be Deployed on Serverless Architectures

Page 7: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Serverless Top 10 Most Common Weaknesses Guide

7

https://github.com/puresec/sas-top-10

Page 8: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Serverless Architectures Security Top 10 - 2018

8

Page 9: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Can You Automate Security Testing of Serverless?

• SAST: accurate data flow analysis in a distributed (cloud) platform such as serverless is extremely hard. Current state of SAST technology is lagging behind

• DAST: existing dynamic testing tools don’t support invoking serverless functions, unless they consume HTTP triggers

• IAST: requires an instrumentation agent. Currently, impossible in public-cloud serverless architectures

9

Page 10: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

SERVERLESS HACKING DEMO

Page 11: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Attack Demo: Job Candidate CV Handling System

11

Candidate

AWS SES AWS SNSAWS Lambda

Function

AWS DynamoDB

1

2 3

4

5

1. Candidate sends CV as PDF in email

2. SES receives email, creates SNS message

3. SNS invokes the function

4. Function converts PDF to text + stores results in

DynamoDB

5. Function sends receipt to candidate

Page 12: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

6 Things You Can Do Today To Improve Your Serverless Security Posture

12

Get your serverless secure CI/CD program right

Regain your security visibility

Follow the ‘least-privileged’ concept

Scan 3rd party OSS dependencies

Follow app & cloud security best-practices

Deploy a serverless security platform

Page 13: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Cloud Configuration

Best-Practices

Cloud-Native Event

Inspection(serverless app firewall)

Secure Code: Custom & 3rd

Party

Function Behavior

Enforcement

Resilient Design

Serverless Application Security Strategy

The Serverless Application Security model was created to help organizations formulate and implement a strategy for serverless security that is tailored to the specific risks related to cloud-native serverless applications.

SAS-1: Function Event Data Injection

SAS-2: Broken Authentication

SAS-3: Insecure Serverless Deployment Configuration

SAS-4: Over-Privileged Function Permissions & Roles

SAS-5: Inadequate Function Monitoring and Logging

SAS-6: Insecure 3rd Party Dependencies

SAS-7: Insecure Application Secrets Storage

SAS-8: Denial of Service & Financial Resource Exhaustion

SAS-9: Serverless Function Execution Flow Manipulation

SAS-10: Improper Exception Handling & Verbose Error Messages

Serverless Security Top 10

https://github.com/puresec/sas-top-10

+ Remediating controls

Page 14: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Open Source / Free Tools To Help You Get Started

• Lambda-Proxy: https://github.com/puresec/lambda-proxy Lambda-native SQLi testing with SQLMap

• Auto-generate least-privilege IAM for AWS Lambda: https://www.npmjs.com/package/serverless-puresec-cli

• FunctionShield: https://www.puresec.io/function-shield Free library for hardening AWS Lambda functions

• Serverless-artillery: https://github.com/Nordstrom/serverless-artillery Stress test serverless applications

14

Page 15: Serverless Security Your Code, Your Responsibility...• Akamai Kona Cloud Security (World’s 1st Cloud-WAF) •Author of 20 patents in the fields of Web Security, SAST, DAST, IAST

Thank You!