Todays columnist, Kelly White of RiskRecon runs through seven questions security teams need to ask when setting up the controls for Microsoft 365 Enterprise.
A newly discovered Azure Functions vulnerability lets an attacker escalate privileges and escape the Azure Functions Docker to the Docker host.
After an internal assessment, Microsoft determined that the vulnerability has no security impact on Azure Functions users because the Docker host itself gets protected by a Microsoft Hyper-V boundary, according to researchers from Intezer who discovered the flaw. Based on their findings, Microsoft has since made changes to block/etc and the /sys directories.
Azure Functions, essentially the Microsoft equivalent to Amazon Web Services' Lambda service, operates as a serverless compute service that lets users run code without having to provision or manage infrastructure.