Using Cloud Native Technologies to Solve Complex Application - - PowerPoint PPT Presentation
Using Cloud Native Technologies to Solve Complex Application - - PowerPoint PPT Presentation
Using Cloud Native Technologies to Solve Complex Application Security Challenges in Kubernetes Deployments Cequence Security: A Cloud Native Approach to Application Security Venture-backed start-up bringing much-needed innovation to
2
Cequence Security: A Cloud Native Approach to Application Security
- Venture-backed start-up bringing much-needed innovation to application
security
- Award-winning AI-powered security platform delivered as containers to
protect web, mobile, API-based applications from bot attacks and vulnerability exploits
- Built on top of cloud native components like Kubernetes and Prometheus
- Plays well with existing ingress controllers and Sidecars like Envoy and
NGINX, without needing to replace them
- Visit us at www.cequence.ai
DATA CENTER PUBLIC CLOUD CLOUD NATIVE
3
Supplier API Partner API Web Customer Mobile Customer
Your Public Facing Applications Are Attack Targets
Business Logic Abuse
- Highly automated
- Content appears legitimate
- Difficult to detect and block
Vulnerability Exploits
- Highly targeted
- Exploiting app vulnerabilities
- Both known and unknown
4
Runtime Application Protection for Monolithic Applications
Internet Load Balancer
MONOLTHIC APPLICATIONS
Frontend Data Access Business Logic
WAF Breach Vulnerability Scan
PUBLIC CLOUD DATA CENTER
5
Internet
Runtime Application Protection for Monolithic Applications
Load Balancer Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping
MONOLTHIC APPLICATIONS
Frontend Data Access Business Logic
WAF Breach Vulnerability Scan
PUBLIC CLOUD DATA CENTER
BOT
6
Runtime Application Protection for Monolithic Applications
Internet
MONOLTHIC APPLICATIONS
Frontend Data Access Business Logic
Load Balancer Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping WAF Breach Vulnerability Scan
PUBLIC CLOUD DATA CENTER
BOT App DDOS Application Floods
7
Monolith to Microservices
MONOLTHIC APPLICATIONS
User Interface Data Access Business Logic User Interface
API </> API </> API </> API </> API </>
USER MANAGEMENT MICROSERVICE SHOPPING CART MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE INVENTORY MGMT MICROSERVICE
8
New Security Challenge: Increased Entry Points
User Interface
API </> API </> API </> API </> API </>
USER MANAGEMENT MICROSERVICE SHOPPING CART MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE INVENTORY MGMT MICROSERVICE
Internet
Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping WAF Breach Vulnerability Scan BOT App DDOS Application Floods
9
New Security Challenge: Keep up with DevOps Pace
User Interface
API </> API </> API </> API </> API </>
USER MANAGEMENT MICROSERVICE SHOPPING CART v2 MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE INVENTORY MGMT MICROSERVICE
API </>
SHOPPING CART MICROSERVICE
API </>
CUSTOMER RATINGS MICROSERVICE
Internet
Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping WAF Breach Vulnerability Scan BOT App DDOS Application Floods
10
New Security Challenge: Heterogeneous Environments
User Interface
API </> API </> API </> API </> API </>
USER MANAGEMENT MICROSERVICE SHOPPING CART MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE INVENTORY MGMT MICROSERVICE
Internet
Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping WAF Breach Vulnerability Scan BOT App DDOS Application Floods
11
New Security Challenge: Multi-Cloud Environments
User Interface
API </> API </> API </> API </> API </>
USER MANAGEMENT MICROSERVICE SHOPPING CART MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE INVENTORY MGMT MICROSERVICE
Internet
Fake Accounts Credential Stuffing Fake Likes Inventory Lockup Scraping WAF Breach Vulnerability Scan BOT App DDOS Application Floods
12
New Approach: From Perimeter Defense to Microservices Defense
MONOLTHIC APPLICATIONS
Frontend Data Access Business Logic
API </>
App DDoS Bot WAF
MICROSERVICES PODS WAF BOT App DDOS
13
Runtime Application Protection for Microservices
User Interface
USER MANAGEMENT MICROSERVICE SHOPPING CART MICROSERVICE DATA ACCESS MICROSERVICE CUSTOMER REVIEWS MICROSERVICE
Internet
INVENTORY MANAGEMENT MICROSERVICE
API </>
App DDoS Bo t W AF
API </>
App DDoS Bo t W AF
API </>
App DDoS Bo t W AF
API </>
App DDoS Bo t W AF
API </>
App DDoS Bo t W AF
14
Must-Haves in Runtime Application Protection for Microservices
- Designed to work with existing applications without making modifications
- Non-invasive: no agents, SDK, or JavaScript
- Single pane of glass for all microservices
- Protection moves with the microservices to any cloud
- Microservices based protection for protecting other microservices
- Co-exist and not replace with existing Ingress Controllers and Sidecars
SIMPLE RELEVANT EFFECTIVE
15
New Security Stack for Microservices
Infrastructure Security Container Security & Compliance Runtime Application Protection (WAF, Bot & Application DDoS)
16
17