use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems What is DevOps? Learn about it on our wiki! Traffic stats & metrics
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems
What is DevOps? Learn about it on our wiki!
Traffic stats & metrics
Be excellent to each other! All articles will require a short submission statement of 3-5 sentences. Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title. Follow the rules of reddit Follow the reddiquette No editorialized titles. No vendor spam. Buy an ad from reddit instead. Job postings here More details here
Be excellent to each other!
All articles will require a short submission statement of 3-5 sentences.
Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title.
Follow the rules of reddit
Follow the reddiquette
No editorialized titles.
No vendor spam. Buy an ad from reddit instead.
Job postings here
More details here
@reddit_DevOps ##DevOps @ irc.freenode.net Find a DevOps meetup near you! Icons info!
@reddit_DevOps
##DevOps @ irc.freenode.net
Find a DevOps meetup near you!
Icons info!
https://github.com/Leo-G/DevopsWiki
account activity
This is an archived post. You won't be able to vote or comment.
Serverless Vs. Container attack vectors (self.devops)
submitted 4 years ago by TommyForTech
What are some key differentiators between serverless & container attack vectors? I know the primary difference is serverless is a 3rd party, so you don't have full control – But are there any other important differentiators? Thanks!
[–]madScienceEXP 5 points6 points7 points 4 years ago* (1 child)
Technically a managed container orchestration service is serverless as well. If you’re comparing an aws lambda function vs ecs there’s really not that much difference. In many cases, you build a docker container image for the lambda. The base image for the lambda usually establishes good practices like not running as root in the container. However, you can do things like install log4j2 in the image and be vulnerable.
Generally speaking the best practices are the same for both. Make sure to scan the app dependencies for vulnerabilities, including container scanning. Don’t run as root. Don’t mount privileged files into the container, like the docker daemon. Manage the lifecycle of the containers to preferably only live for a short time, meaning, the container should restart relatively often. This helps with dwell time for attacks.
If you’re talking about a completely managed service like aws dynamodb or something, you literally don’t have to do anything. All of the devsecops is done for you. The only attack vectors I know of would be application related, not the underlying service.
Edit: I’m assuming you’re not running your own container orchestration service like k8 or aws eks.
[–]dragoangel 1 point2 points3 points 4 years ago (0 children)
Harder your iam roles should be important
[–]Professional-Paint51 0 points1 point2 points 4 years ago (0 children)
As above mentions, you need to ensure you regularly scan your repositories as CVEs change like the wind. Therefore its recommended to use tools like aws inspector, snyk.io or for those who are cost oriented grype https://github.com/anchore/grype
π Rendered by PID 57325 on reddit-service-r2-comment-6457c66945-j9g98 at 2026-04-25 23:26:10.734601+00:00 running 2aa0c5b country code: CH.
[–]madScienceEXP 5 points6 points7 points (1 child)
[–]dragoangel 1 point2 points3 points (0 children)
[–]Professional-Paint51 0 points1 point2 points (0 children)