Serverless Security Quick Wins

Logo
Presented by

Hillel Solow, CTO and Co-founder, Protego Labs

About this talk

Maintaining control and security of serverless applications requires a paradigm shift in your approach. Shrinking privileges of your serverless functions to least privilege is a key component to securing your applications and mitigating risks. Key Takeaways: --Why least privilege is particularly vital in serverless architectures --The unique flexibility and challenges serverless adds --Easy ways to mitigate risk by shrinking privilege --Mitigating the threat of malicious functions Join us for this informative session and you’ll understand the critical importance of least privilege in this differing threat landscape, and many solutions you can implement immediately.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (346)
Subscribers (52329)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.