Microservices and Cloud-native Applications Containerizing - - PowerPoint PPT Presentation

microservices and cloud native applications
SMART_READER_LITE
LIVE PREVIEW

Microservices and Cloud-native Applications Containerizing - - PowerPoint PPT Presentation

Microservices and Cloud-native Applications Containerizing Traditional Applications Managing Security What we covered last time Steps to Containerize any Application Identify and handle application state Decide on how many containers q


slide-1
SLIDE 1

Containerizing Traditional Applications Microservices and Cloud-native Applications Managing Security

slide-2
SLIDE 2

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 2

Steps to Containerize any Application

ü Identify and handle application state ü Decide on how many containers q Select container security options q Select container networking options q Select container storage options

What we covered last time…

http://www.nirmata.com/resources/meetups/

slide-3
SLIDE 3

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 3

  • Introductions & Overview
  • Levels of Container Security
  • Twistlock
  • Demo
  • Q&A

Security for Containerized Apps

slide-4
SLIDE 4

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 4

Chenxi Wang - Chief Strategy Officer at Twistlock

Previously VP at CipherCloud and Intel, Analyst at Forrester Research, Assoc. Professor at CMU - Ph.D. in Computer Science from University of Virginia.

Jim Bugwadia - Founder and CEO at Nirmata

Developer, architect, and leadership roles at Cisco, Trapeze Networks, and Pano Logic, Bell Labs, Motorola. MS Computer Science University of Illinois.

Ritesh Patel - Founder and Product Lead at Nirmata

Engineering and business leadership at Brocade, Trapeze Networks, Nortel and Motorola. MBA from Berkley Haas

slide-5
SLIDE 5

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 5

About Twistlock

  • First enterprise solution purpose built for securing containers
  • Cradle-to-scale security
  • Protection from development to production
  • Portable: any cloud, any app, any registry
  • Technology pioneer
  • 15 patents, first security partner for AWS ECS & Google GCE, Docker contributor
  • Market leader – 30+ live deployments
  • Dark Reading: “20 Cyber Security companies to watch”. SC magazine: “Best emergent

technology”. CRN: “Top ten cloud security startups to watch in 2016”

slide-6
SLIDE 6

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 6

nirmata

Software infrastructure is best delivered as-a-service Cloud-native applications need cloud-native management Applications should not be locked in to a cloud provider

1 2 3

  • Fortune 1000 as well as

startup customers in production

  • 1M+ pulls; 10K+ managed

containers per month!

  • Wide range of apps – from

Enterprise IT to IoT!

we believe…. deploy, operate and optimize containerized applications on any cloud!

slide-7
SLIDE 7

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 7

The 3 Levels of Container Security

  • 1. The Execution Environment

hosts, container daemon, networks, access controls, …

  • 2. Container Images

image scanning, image signing, image verification

  • 3. The Application

manage credentials, secrets, data. Detect and respond to active threats and intrusions

slide-8
SLIDE 8
slide-9
SLIDE 9

Demo – Managing Secrets

slide-10
SLIDE 10

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 10

Docker Daemon Volume Plugin

Keywhiz-fs

Nirmata Agent Container Container Container

Admins

  • 1. Manage Secrets
  • 2. Manage Apps

Managing secrets using Keywhiz

slide-11
SLIDE 11

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 11

Summary

  • 1. Container security is an consideration in

containerizing a traditional application

  • 2. Your container security strategy should address:
  • The Execution Environment
  • Container Image Management
  • The Application
  • 3. With the right tooling, running applications in

containers can be more secure!

slide-12
SLIDE 12

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 12

If you liked this session…

  • 1. Rate this session and add a review
  • 2. Get a free trials of our sponsor’s tools!

http://www.meetup.com/microservices/ try.nirmata.io https://www.twistlock.com/demo/

slide-13
SLIDE 13

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 13

  • chenxi@twistlock.com
  • @ChenxiWang
  • https://www.linkedin.com/in/chenxiwang88
  • jim@nirmata.com
  • @JimBugwadia
  • https://www.linkedin.com/in/jimbugwadia
  • ritesh@nirmata.com
  • @riteshdp
  • https://www.linkedin.com/in/patelrit

Get in touch we love to help!

slide-14
SLIDE 14

Containerizing Traditional Applications – SF Bay Area Microservices Meetup - August 24th 2016 14

Questions Answers

&