Protect Serverless Functions Using the Attivo Networks Solutions
Attivo Networks Blogs

Protect Serverless Functions Using the Attivo Networks Solutions

Written by: Vikram Navali, Senior Technical Product Manager – Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services and function-as-a-service (FaaS).

Adopting a serverless architecture gives DevOps a substantial advantage since organizations no longer must worry about infrastructure, network, or host security. However, such operational efficiencies typically increase the attack surface with new attack paths security risks associated with serverless environments. The Cloud Security Alliance published a report for The 12 Most Critical Risks for Serverless Applications 2019, a great roundup of serverless infrastructure risks. This blog reviews several of them and discusses how one could adopt deception as a strategy to mitigate those risks using the Attivo Networks ThreatDefend platform.

  • Insecure Serverless Deployment Configuration: Serverless architectures offer many customizations and configurations to users for each specific need and task. Many applications built for serverless deployments depend on cloud storage infrastructure to store and persist data between executions. The growing number of cloud data breaches result from storage service misconfigurations. As per the State of DevSecOps Report – Summer 2020 report, misconfigured cloud storage services were commonplace in 93% of cloud deployments. These misconfigurations have critical implications on the overall security posture of the application.
  • Insecure Applications Secrets Storage:As applications are growing on a large scale, the need for maintaining application storage and secrets like API keys, database credentials, encryption keys, and configuration settings have become crucial. One common mistake is storing application secrets as environment variables in plain text. While environment variables are a useful way to persist data across serverless function executions, these variables can leak sensitive data to adversaries in some instances.
  • Functions Execution Flow Manipulation: Serverless applications often follow the microservices design paradigm and contain many discrete functions chained together in a specific order that implements the overall application logic. Application flow manipulation may help adversaries disrupt application logic that bypasses access controls, privilege escalation, or even causes Denial of Service attacks.

Mitigation Strategies

The Attivo ThreatDefend® platform helps customers create and deploy deceptive access tokens, breadcrumbs, and other AWS native services, including serverless functions. The production environment can host decoy entities with similar URLs and web contents to create the deception overlay. When adversaries access decoy entities by launching websites, the ThreatDefend platform will trigger an alert and generate forensic reports.

The Endpoint Detection Net (EDN) solution helps create and distribute decoy cloud objects (such as access certificates, credentials, decoy documents, or URLs) as lures on both endpoints and servers. Adversaries steal credentials and access serverless websites involving any of the decoy assets from the compromised endpoints. The Attivo EDN solution detects adversary actions and misdirects their lateral movement attempts from the serverless infrastructure to the engagement environment.

Organizations that are rapidly migrating from traditional computing to serverless computing need to change the way they think about security. Customers often consider the benefits of better scaling and low cost as the reasons to move to the cloud. However, identifying the security risks and deploying a deception solution are just as important aspects to address.

For additional information, please visit https://www.attivonetworks.com/solutions/threat-detection/cloud/.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

nineteen + fourteen =

Ready to find out what’s lurking in your network?

Scroll to Top