Overview of the OWASP Serverless Top 10 [videos]

This YouTube video series provides quick overviews of the top 10 cybersecurity risks for serverless applications. Each video covers the risk and some recommendations on how to address it.

Why is the OWASP Serverless Top 10 important?

In this video, I discussed the reasons why the OWASP Serverless Top 10 cybersecurity risks for a serverless application are important to consider.

https://www.youtube.com/watch?v=wWDzqrvt73A

Injection attacks

In this video, I discussed what is the injection attack.

https://www.youtube.com/watch?v=QhmAs30-b_k

Broken authorization

In this video, I discussed what is broken authentication and authorization.

https://www.youtube.com/watch?v=fDO4n3HrvQw

Sensitive data exposure

In this video, I discussed the sensitive data exposure risk.

https://www.youtube.com/watch?v=Q8j8Cu0jhqc

XML external entities

In this video, I discussed the XML external entities risk.

https://www.youtube.com/watch?v=wtgTtYXenyM

Broken access control

In this video, I discussed the broken access control risk.

https://www.youtube.com/watch?v=nqBQdAiTOb8

Security misconfiguration

In this video, I discussed the security misconfiguration risk.

https://www.youtube.com/watch?v=yDyYqDGph8c

Cross-site script attacks

In this video, I discussed the cross-site scripting (XSS).

https://www.youtube.com/watch?v=jyLOBsHg-7c

Insecure deserialization

In this video, I discussed the insecure deserialization risk.

https://www.youtube.com/watch?v=RlV79AmI6Yw

Vulnerable components

In this video, I discussed the risk of using components with known vulnerabilities.

https://www.youtube.com/watch?v=Ij6xU48K11k

Logging and monitoring

In this video, I discussed the insufficient logging and monitoring risk.

https://www.youtube.com/watch?v=2Alu17kfNQA

--

--

--

Miguel is a published author and a cybersecurity engineer.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Bindu Sundaresan of AT&T Cybersecurity: 5 Things You Need To Know To Optimize Your Company’s…

HAPI Protocol is coming to Polygon

DAS Rebranding as .bit

Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)

How to stake Switcheo (SWTH) on TradeHub

15MLN $VOXE Token Giveaway 🪂

Web3 and Solcial — The end to centralized monopoly

Analysts Warn of Regulatory Risks if Russia Is Able to Use Crypto to Evade Sanctions

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Miguel A. Calles MBA

Miguel A. Calles MBA

Miguel is a published author and a cybersecurity engineer.

More from Medium

AWS Beanstalk

Deploy a Dockerized Laravel Application to AWS ECS with EC2 Instance Launch type using GitHub…

Workflow for setting up a web server in AWS EC2 (Free Tier).

Connect an AWS ECS Fargate service to an EFS File System with Pulumi