A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication

A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication

Published Nov 1, 2018

Serverless architectures have multiple potential entry points, services, events and triggers, with no continuous flow. Developers must make sure every resource requires authentication.In this continuation of our series on The OWASP Serverless Top 10, Protego’s Head of Security Research demonstrates the potential results of failure to do so.

Read the Blog