@voit3k
PRINCIPAL DEVELOPER / TECH LEAD
Wojciech Lesniak
MICROSERVICES SECURITY CHALLENGES
Microservices Security Fundamentals MICROSERVICES SECURITY - - PowerPoint PPT Presentation
Microservices Security Fundamentals MICROSERVICES SECURITY CHALLENGES Wojciech Lesniak PRINCIPAL DEVELOPER / TECH LEAD @voit3k Microservices International Data Corporation (IDC) predicts that by: 2019 Q1 Microservices International Data
@voit3k
PRINCIPAL DEVELOPER / TECH LEAD
Wojciech Lesniak
MICROSERVICES SECURITY CHALLENGES
Microservices
International Data Corporation (IDC) predicts that by: 2019 Q1
Microservices
Of all applications will feature microservices architectures that improve the ability to design, debug, update, and leverage third-party code. 2022 Q2 International Data Corporation (IDC) predicts that by:
Polyglot Each service can implement its own technology stack
Flexibility a Microservices Architecture
Agile Teams Smaller independent Teams Independent Developed, deployed and scaled independently
Microservices the promised land
API Gateway
Microservices Architecture Patterns
Service discovery Distributed tracing Client load balancing
Stifling team productivity. Reduce the performance or time to market
Negating any of the benefits a microservices architecture.
How do you secure your Microservices without ?
Fix, test and deploy the offending microservice.
Fail Fast Fail Early Fail Often
Reputational and brand damage Loss of trust Financial loss
Consequences of Security Breaches
Legal issues Bankruptcy Negative headlines
There are also tried and tested best practices and architectural patterns you can use to solve the security challenges within your Microservices architecture.
DevOps: Security is now everyone's responsibility.....
Draconian Excessively harsh, severe and lock everything down
Your Security Implementation Should Not Be
The Challenges of Microservices Security
Monolith Microservices
Contrast Security Challenges
Security Fundamentals and Prevention
can use secure your microservices architecture.
Hackers Are Lazy
Detection
Identifying security vulnerabilities throughout the development lifestyle. Monitoring and identifying security breaches. Reacting to security breaches.
Threat Modelling Prioritize security vulnerabilities
Engrain a Security Culture within Your Development Teams
Is an information assurance concept in which multiple layers
information technology (IT) system. Also known as a castle approach.
Monolith Microservices
Monolith Microservices
Contrast Security Challenges
Monolith Microservices
Data Access Pricing Support HTML Portfolio REST
PORT: 80
Account
in-process
Session Smaller attack surface. In-process communication between components is more secure. User context is stored centrally, easily retrievable and trusted.
Mono nolith th
Data Access Support REST Data Access Account REST Data Access Portfolio REST
Microservices
Data Access Pricing REST
Confused Deputy
JS HTML Service GET: /victoria Victoria Data Access Account REST Data Access Portfolio REST GET: /joe
Data Access Support REST Data Access Account REST Data Access Portfolio REST
Bootstrapping Secrets
Data Access Pricing REST
Env variables Env variables Env variables Env variables
Secret Sprawl
Property file Env variables Source code Configuration management Source control
Challenges with immutable servers
maintained on the servers file system.
Data Access Portfolio REST Immutable Server Docker Container Microservice
Security is not just authentication and authorization, it’s also quality of service
Denial of Service
Netflix Microservices Architecture
Monitoring and Tracing
Queue
Queue
Challenges due to polyglot Challenges due to polyglot mic icroser ervic ices es a archit itec ectures es. Requires security expertise for each technology. Maintaining multiple sets of security best practices and guidelines for each technology. Keeping up with security patches. Queue
Your Microservices security implementation should not:
scaled and deployed independently.
performance.
experimenting and selecting different technology stacks.
Key Takeways