serverless-security-scanner

A tool for scanning serverless applications for vulnerabilities and compliance issues, particularly on AWS Lambda.

AWS Open Source Cloud Service Only
Category Serverless Security
GitHub Stars 4
Last Commit 1 year ago
This page updated a month ago
Pricing Details Free and open-source.
Target Audience Developers and DevOps teams working with serverless applications on AWS.

The serverless-security-scanner tool manages ensuring the security and compliance of serverless applications, particularly those deployed on AWS Lambda. Here’s a technical overview of its architecture and operational considerations:

This tool leverages AWS Lambda to scan serverless functions for potential vulnerabilities and compliance issues. The scanner is designed to integrate with various source code repositories such as GitHub and Bitbucket, allowing it to automatically scan code repositories for security flaws.

The scanner uses environment variables to configure access to AWS services, GitHub, or Bitbucket. It requires AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY for AWS access, and additional credentials like GITHUB_TOKEN or BITBUCKET_USERNAME and BITBUCKET_APP_PASSWORD for repository access. The tool uploads scan results to an Amazon S3 bucket, which is named based on a provided prefix and the deployment stage.

To deploy and manage this scanner, you need to set up appropriate AWS IAM permissions. The tool includes Terraform configurations to create an AWS IAM user with the necessary permissions for deployment and removal of the serverless application. Manual creation of the IAM user is also supported using provided JSON templates.

The scanner can be configured to run regularly, ensuring continuous monitoring of your serverless functions. Scan results are stored in CSV format in an S3 bucket, facilitating easy access and analysis. It supports scanning repositories from both GitHub and Bitbucket, making it versatile for different development environments. The tool emphasizes secure deployment by requiring specific IAM permissions, ensuring that only authorized users can deploy or remove the scanner.

While the scanner provides comprehensive visibility into serverless function security, it may require additional configuration for complex repository structures or large-scale deployments. The tool's performance and cost efficiency can be impacted by the frequency of scans and the volume of repositories being monitored. Additionally, ensuring the scanner stays updated with the latest security checks and compliance requirements is crucial for its effectiveness.

Improve this page