Serverless Function Misconfiguration

Vulnerability Details

Severity:

Medium

Category:

Cloud

Description

Serverless functions are deployed with excessive permissions, overly long timeouts, large memory allocations, or insufficient input validation, creating security risks.

Risks

An attacker could exploit misconfigured functions to access unauthorized resources, exfiltrate data, incur excessive costs, or use the function's elevated permissions for lateral movement.

Remediation

Apply least-privilege IAM roles to each function. Set appropriate timeout and memory limits. Validate and sanitize all function inputs. Implement monitoring and alerting for abnormal function behavior. Store secrets in secure vaults, not environment variables.