Episode 72 — Secure serverless and managed compute by controlling permissions, triggers, and inputs

This episode focuses on how serverless and managed compute shift risk from host hardening to identity, configuration, and event integrity, which is a common trap in governance-oriented exam scenarios. You’ll define the security control points that matter most: the permissions the function runs with, the triggers that invoke it, and the inputs it processes. We’ll discuss how overbroad permissions turn small logic flaws into major breaches, how trigger tampering can become persistence, and how unvalidated inputs can drive unauthorized actions like data access or privilege changes. You’ll also learn troubleshooting considerations such as separating trigger management from code deployment, monitoring for unexpected trigger updates, and constraining which services may invoke functions. The goal is a repeatable model for defending serverless workloads where control-plane discipline and least privilege do the heavy lifting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 72 — Secure serverless and managed compute by controlling permissions, triggers, and inputs
Broadcast by