Don't Be SecureLess
Best practices for keeping your Lambdas secure
bene@theodo.co.uk
Ben Ellerby
@EllerbyBen
Ben Ellerby
@EllerbyBen
serverless-transformation
@EllerbyBen
Serverless
What is this Serverless thing?
-
Architectural movement
- Developers send application code which is run by the cloud provider in isolated containers abstracted from the developer.
- Use 3rd party services used to manage backend logic and state (e.g. Firebase, Cognito)
- Cost nothing when not used
- A framework with the same name
@EllerbyBen
Why Serverless?
💰 Cost reduction
👷♂️ #NoOps
💻 Developers focus on delivering business value
📈 More scalable
🌳 Greener
@EllerbyBen
Not just Lambda (FaaS)
Lambda
S3
Dynamo
API Gateway
Compute
Storage
Data
API Proxy
Cognito
Auth
SQS
Queue
EventBridge
Event Bus
Power and Flexibility
@EllerbyBen
FaaS: AWS Lambda
@EllerbyBen
@EllerbyBen
Cleanup /tmp
When the temporary is persistent
@EllerbyBen
-
/tmp is the only place to write to disk on Lambda
-
Useful for performance and file manipulation (e.g. PDFs)
-
But, removes the sandboxing isolation from src (and injected) code.
- EFS has changed some aspects of this, but tmp is the main concern for most users.
Cleanup after yourself
@EllerbyBen
Always remove any file written to the /tmp directory unless you are explicitly doing it to optimize performance and have considered all potential security risks.
Cleanup after yourself
@EllerbyBen
const removeFolderContentsRecursively = (directory) => {
fs.readdir(directory, (err, files) => {
if (err) throw err;
for (const file of files) {
console.log(`--- Deleting ${file} ---`);
const curPath = `${directory}/${file}`;
if (fs.lstatSync(curPath).isDirectory()) {
removeFolderContentsRecursively(curPath);
} else { // delete file
try {
fs.unlinkSync(file);
} catch (error) {
}
}
}
});
}
// Clean up if on Lambda (not local!)
if (context.awsRequestId && !process.env.IS_LOCAL) {
removeFolderContentsRecursively('/tmp');
}
@EllerbyBen
Separate Lambdas
Separation of Lambda Concerns
@EllerbyBen
-
IAM roles allow fine-grained permissions
-
Large cross-functional monolithic Lambdas don't benefit as much
-
"Micro-Lambdas" that do one thing can have fine-grained policies.
@EllerbyBen
@EllerbyBen
@EllerbyBen
Keep it fine-grained
@EllerbyBen
Keep your Lambdas fine-grained with a separation of concerns, using specific roles with specific policies for each.
Automate Checks
@EllerbyBen
@EllerbyBen
@EllerbyBen
Least Privilege
Don't go wild with IAM
@EllerbyBen
-
IAM is a great tool to secure your application.
-
Developers have been massively empowered by Serverless, but at what cost?
-
Use policies that give least privilege possible to perform a specific task.
Audit your policies
@EllerbyBen
Train and Automate
@EllerbyBen
Ensure all IAM policies allow the least privileges needed to perform their task. Train your team on this principle and ensure basic checks are enforced on CI.
@EllerbyBen
API Gateway
Security Check
@EllerbyBen
-
Keep private lambdas private
-
Expose via well-configured API Gateway
-
DoS protection
-
Rate limiting
-
Integration with “Authentication as a Service” e.g. Cognito, Okta...
Add WAF
@EllerbyBen
AWS WAF is your first line of defence against web exploits
WAF & API Gateway?
@EllerbyBen
Check Requests
@EllerbyBen
Avoid exposing Lambda functions to the Internet and if exposed only allow invocation through API Gateway with WAF.
@EllerbyBen
Observability
Know what’s happening
@EllerbyBen
-
The flexibility, distribution and granularity of Serverless architectures make logging hard.
-
Cloudwatch & XRay are the minimum.
@EllerbyBen
CloudWatch Lambda Insights
@EllerbyBen
Dedicated Observability Service
Be All-Seeing
@EllerbyBen
Basic logging is a given. Add onto this, X-Ray Logging and specialised third-party Serverless logging providers (and Cloudwatch ServiceLens).
Build to make your logs recoverable.
@EllerbyBen
OWASP 10
Don’t forget the basics
@EllerbyBen
-
Serverless changes many things - but don't forget to secure code, access control, dependencies encryption...
-
Apply OWASP Top 10
-
Apply Serverless OWASP Top 10
Keep applying the basics
@EllerbyBen
Keep applying basic security principles and use the OWASP Top Ten as your reference.
Also, use automated tools like snyk and Protego
@EllerbyBen
Account Security
Environmental Impact
@EllerbyBen
-
1 AWS Account PER Environment (e.g. dev, staging, UAT, production)
-
Use AWS Organizations to share billing and policies. Aim for 1 account / service strategy.
-
MFA is NEVER optional.
AWS SSO can help too!
Secure Your Accounts
@EllerbyBen
Separate your dev, test and production environments to mitigate human error and attacks
MFA is not optional for your teams!
Conclusion
-
Serverless does take away some (not all) security concerns like patching
-
There new attack vectors and mitigating them is key
-
Developer speed and autonomy may threaten your security. Ops need to coach and automate
@EllerbyBen
serverless-transformation
@EllerbyBen
sls-dev-tools
@EllerbyBen
Don't be SecureLess: Best practices for keeping your Lambdas secure
By Ben Ellerby
Don't be SecureLess: Best practices for keeping your Lambdas secure
Talk given at the AWS Community Summit.
- 2,381