microservices security fundamentals
play

Microservices Security Fundamentals MICROSERVICES SECURITY - PowerPoint PPT Presentation

Microservices Security Fundamentals MICROSERVICES SECURITY CHALLENGES Wojciech Lesniak PRINCIPAL DEVELOPER / TECH LEAD @voit3k Microservices International Data Corporation (IDC) predicts that by: 2019 Q1 Microservices International Data


  1. Microservices Security Fundamentals MICROSERVICES SECURITY CHALLENGES Wojciech Lesniak PRINCIPAL DEVELOPER / TECH LEAD @voit3k

  2. Microservices International Data Corporation (IDC) predicts that by: 2019 Q1

  3. Microservices International Data Corporation (IDC) predicts that by: 90% 2022 Of all applications will feature microservices architectures that improve the ability to design, debug, update, and leverage third-party code. Q2

  4. Flexibility a Microservices Architecture Polyglot Agile Teams Independent Each service can Smaller independent Developed, deployed implement its own Teams and scaled technology stack independently

  5. Microservices the promised land

  6. Microservices Architecture Patterns API Gateway Service Distributed Client load discovery tracing balancing

  7. How do you secure your Microservices without ? Stifling team productivity. Reduce the performance or time to market of the application. Negating any of the benefits a microservices architecture.

  8. Bugs in Microservices Fix, test and deploy the offending microservice.

  9. Fail Fast Fail Early Fail Often

  10. Consequences of Security Breaches Reputational and brand Legal issues damage Bankruptcy Loss of trust Financial loss Negative headlines

  11. There are also tried and tested best practices and architectural patterns you can use to solve the security challenges within your Microservices architecture.

  12. DevOps: Security is now everyone's responsibility.....

  13. Your Security Implementation Should Not Be Draconian Excessively harsh, severe and lock everything down

  14. The Challenges of Microservices Security

  15. Contrast Security Challenges Monolith Microservices

  16. Security Fundamentals and Prevention - the various techniques and patterns you can use secure your microservices architecture.

  17. Hackers Are Lazy

  18. Detection Identifying security vulnerabilities throughout the development lifestyle. Monitoring and identifying security breaches. Reacting to security breaches.

  19. Engrain a Security Culture within Your Development Teams Threat Modelling Prioritize security vulnerabilities

  20. Defenc nce i in D n Depth Is an information assurance concept in which multiple layers of security controls (defence) are placed throughout an information technology (IT) system. Also known as a castle approach.

  21. Monolith Microservices

  22. Contrast Security Challenges Monolith Microservices

  23. Monolith Microservices

  24. Mono nolith th PORT : 80 HTML REST Smaller attack surface. Session In-process communication between components is more in-process Portfolio Support secure. User context is stored centrally, Pricing Account easily retrievable and trusted. Data Access

  25. Microservices REST REST REST Portfolio Account Support Data Data Data Access Access Access REST Pricing Data Access

  26. Confused Deputy Victoria REST REST GET: /victoria GET: /joe HTML JS Portfolio Account Data Data Service Access Access

  27. Bootstrapping Secrets REST REST REST REST Portfolio Account Support Pricing Data Data Data Data Access Access Access Access Env variables Env variables Env variables Env variables

  28. Secret Sprawl Source control Env variables Property file Configuration management Source code

  29. Immutable Server Challenges with immutable servers - Secrets and whitelists cannot be maintained on the servers file system. Docker Container Microservice REST Portfolio Data Access

  30. Security is not just authentication and authorization, it’s also quality of service

  31. Denial of Service

  32. Netflix Microservices Architecture

  33. Monitoring and Tracing Queue

  34. Queue

  35. Challenges due to polyglot Challenges due to polyglot mic icroser ervic ices es a archit itec ectures es. Requires security expertise for each technology. Maintaining multiple sets of security best practices and Queue guidelines for each technology. Keeping up with security patches.

  36. Your Microservices security implementation should not: - Resemble a monolith. Key Takeways - Prevent your service from being scaled and deployed independently. - Degrade your applications performance. - Stifle team productivity. - Prevent or restrict your teams from experimenting and selecting different technology stacks.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend