Book description
Despite the increased adoption of serverless computing services around the world, a big gap still exists when it comes to serverless security knowledge and expertise. This gap comes with a steep price: the increased risk of data breaches as more companies store their data in the cloud.
This practical guide covers the relevant offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll learn how to attack and defend a variety of vulnerable serverless applications using the step-by-step instructions. By the end of this book, you'll have a solid understanding on how to prevent a variety of serverless application attacks and privilege escalation techniques.
Author Joshua Arvin Lat, chief technology officer at NuWorks Interactive Labs and AWS Machine Learning Hero, shows you how to:
- Identify and exploit vulnerabilities within modern serverless applications
- Perform privilege escalation techniques in cloud environments
- Use automated tools and services for offensive and defensive security
- Configure authentication and identity services properly on AWS, Azure, and Google Cloud
- Implement security strategies and best practices to prevent a variety of serverless application attacks
- Audit serverless environments using a variety of security tools and frameworks
Publisher resources
Table of contents
-
1. Introduction to Serverless Computing
- Demystifying Serverless Computing
-
Common Myths and Misconceptions on Serverless Computing
- Myth # 1: Serverless == FaaS
- Myth # 2: Serverless computing and containerization don’t work well together
- Myth # 3: Serverless applications only support a limited number of languages
- Myth # 4: Serverless applications are difficult to manage
- Myth # 5: Serverless applications are immune to security attacks
- 2. Understanding Serverless Architectures and Implementation Patterns
- 3. Getting Started with Serverless Security
-
4. Diving Deeper into Serverless Security Threats and Risks
- Leaked Credentials
- Over-Privileged Permissions & Roles
- Broken Authentication
- Insecure VPC Network Configuration
- Credentials Exfiltration
- Injection
- Vulnerable App Dependencies
- Security Misconfiguration and Insecure Defaults
- Insecure Deserialization
- Denial of Service & Denial of Wallet
- Insecure Storage of Credentials and Secret Keys
- Insufficient Tracing, Logging, Monitoring, and Alerting
- Business Logic Vulnerabilities
- Serverless Security Mechanism Limitations
- Summary
- 5. Understanding how Serverless Functions Work
- 6. Hacking Serverless Functions
- 7. Securing Serverless Functions
- 8. Understanding how Authentication and Identity Services Work
- About the Author
Product information
- Title: Learning Serverless Security
- Author(s):
- Release date: December 2025
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098149017
You might also like
book
Kubernetes Security and Observability
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of …
book
Practical Cloud Native Security with Falco
As more and more organizations migrate their applications to the cloud, cloud native computing has become …
book
Security as Code
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. …
book
Hacking Kubernetes
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide …