practical microservice security
play

Practical Microservice Security Laura Bell Practical Microservice - PowerPoint PPT Presentation

Practical Microservice Security Laura Bell Practical Microservice security Laura Bell Founder and Lead Consultant - SafeStack @lady_nerd laura@safestack.io http:/ /safestack.io caution: fast paced field ahead watch for out of date


  1. Practical Microservice Security Laura Bell

  2. Practical Microservice security Laura Bell Founder and Lead Consultant - SafeStack @lady_nerd laura@safestack.io http:/ /safestack.io

  3. caution: fast paced field ahead watch for out of date content

  4. In this talk Security Fundamentals Some important points that are worth refreshing Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response

  5. apps that automatically scale up to handle millions of users and scale down again to have this be done by smaller teams

  6. Confidentiality Integrity Availability

  7. Spoofing Tampering Repudiation Information Disclosure Denial of Service Escalation of Privilege

  8. Basic controls

  9. so bad that StackOverflow has a process to handle it

  10. For storing passwords in a database, MD5 is ac acceptab able , supposed you salt it properly. For this usage, the known attack is entirely unimportant. If you are in paranoia mode, you can use a more complicated scheme like bcrypt too, but for most people, storing a salted password is just good enough. It prevents the easiest, most obvious attack, is easy to implement, hard to do wrong, and has low overhead.

  11. https://www.owasp.org/index.php/REST_Security_Cheat_Sheet find good trusted, peer reviewed sources

  12. or why acronyms make you less secure

  13. 2FA

  14. Planned

  15. I’m sorry Dave, I can’t let you do that

  16. (fast updating, never cached, multi-device default)

  17. the keys to token success

  18. header field format method

  19. Service decomposition

  20. the reality of immature application segmentation

  21. shouldn’t

  22. exhaustion

  23. Orchestration layer attacks

  24. rule them all?

  25. <quote> protect your APIs from OWASP Top 10 threats such as SQL Injection, XSS and application DDoS, and adaptive threats such as bad bots. </quote>

  26. simple

  27. features that scare me impersonation 2) investigation mode 3) demo accounts on production 4) SSL interception and analysis 5) many password sins

  28. Choose Restrict Monitor Configure Challenge Test

  29. never assume a security vendor is better at secure development than you are

  30. Identity and access management

  31. the lowest set of permissions and accesses required to do your job

  32. require well defined roles

  33. v.s.

  34. Automate and alert

  35. mature groups and role assistance

  36. Immutable architectures matter in microservice security

  37. but you might not be the right person to audit them

  38. including those changes made by an attacker

  39. Typical Actions :

  40. become hard to persist

  41. Heterogeneous language and technology spaces

  42. you

  43. technologies

  44. vulnerability management can be challenging in microservice architectures

  45. All

  46. secure location immutable format away from production

  47. denial of service attacks

  48. backup, health check, domains

  49. like actually, for real, not just when you’re debugging

  50. TL;DR Security Fundamentals Some important points that are worth refreshing Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response

  51. Questions? Laura Bell Founder and Lead Consultant - SafeStack @lady_nerd laura@safestack.io http:/ /safestack.io

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend