Serverless Risk Assessment

CloudGuard Proact Serverless protection evaluates the risk in serverless functions in your AWSClosed Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services. environments. CloudGuard scans and analyzes your functions and their dependent libraries for vulnerabilities, IAMClosed Identity and Access Management (IAM) - A web service that customers can use to manage users and user permissions within their organizations. permissions that are not necessary, and sensitive information such as passwords and keys. It then calculates a Posture score, based on the number, nature, and severity of vulnerabilities found, and generates alerts for each vulnerability, that show the specific issues and, in many cases, the actions necessary to remedy them.

To activate Proact Serverless risk assessment, your AWS environment must be onboarded to CloudGuard (see Unified Onboarding of AWS Environments). Enable Serverless protection (see Enabling Serverless Protection) if you skipped this step during the onboarding procedure.

Benefits

  • Identify overly permissive IAM roles used by serverless functions

  • Identify 3rd-party libraries for vulnerabilities

  • Identify hard-coded credentials, secrets, and other sensitive information in serverless code

  • Identify functions that are not used

Continuous Scanning and Analysis

CloudGuard Proact scans the functions in your cloud accounts when they are onboarded to CloudGuard. In addition, CloudGuard rescans functions when they are changed to provide a continuous and up-to-date risk assessment.

Posture Explorer

The Posture Explorer is a graphical view of the security posture of a serverless function, based on an analysis of the function.

Legend:

Item

Description

1

The serverless function

2

The cloud service types that can trigger the function

3

The service types that the function has permission to access

Scan in CI/CD

In addition, you can scan your functions in the CI/CD pipeline, before they are deployed to your cloud account, with the Serverless CI/CD Plugin. This runs as part of your CI/CD toolchain, scans for the same risks, and presents the results in the CI/CD tool. In addition, you can configure it to block the deployment of builds containing specific risks.

Finding Types

The table below lists the scan-finding types.

Actions