Going ‘serverless’ is like farming out mundane tasks to professional dev teams. The distributed nature of serverless gives a cyber breach lots of golden opportunities. Serverless is also its archenemy that provides attackers with significantly more points of entry. The main reason for that is that we don’t always make sure the input is of the expected data type. In general, many well-known software risks like wrongly configured credentials or SQL injection make a comeback in serverless.
Official account for all of the HackerNoon newsletters. www.hackernoon.com/u/newsletters
Create your free account to unlock your custom reading experience.