SlideShare a Scribd company logo
1 of 26
Download to read offline
Designing Security for Multi-Cloud and Microservices
Neelkamal Gaharwar
Micro services with Pros and Cons
Security Concern for Micro-Services
Multi-Cloud – What & Why
Multi-Cloud Security Concerns
Multi-Cloud Security Solution
Contents
What are Micro servicesDashboard
App Tier
User Account
Order
Product
Payment
DB Tier
Dashboard
User
Account
Order
Product
Payment
Monolithic Services
Micro Services
Micro services
Dashboard
User
Account
Order
Product
Payment
Micro Services
• An architectural style
• Collection of Loosely coupled services
accessible via API
• Clearly defined interface
• Each service runs as
➢ unique process
➢ usually manages its own database.
• Can be implemented using different
➢ programming languages
➢ Databases
➢ software environment.
➢ Stateless
“One at a time”
Micro Services
✓ Smaller Development Cycle
✓ Improves fault resolution
✓ No long-term technology
commitment
✓ Faster and reliable deployment
✓ Increase Uptime
✓ Service Reuse
✓ Scalable and better performance
✓ Better ownership and knowledge
✓ More Security
Pros
Dashboard
User
Account
Order
Product
Payment
Micro Services
Security Pros
• Compromising one service
will not expose entire system
• Defence-in-depth
Micro Services
✓ Manage Multiple distributed Systems
✓ Manage multiple Remote API Calls
✓ Manage multiple Databases
✓ Difficult to Test
✓ Issues with Deployment – Holistic
View
Cons
Dashboard
User
Account
Order
Product
Payment
Micro Services
Security Considerations For Micro
Services
Security Considerations – Accessibility
• With micro services internal calls are converted into
Remote API calls
• Use of weak or old passwords could be critical threat
now as interfaces accessible User Account
Order
Product
Payment
Security Considerations – Accessibility
Most Popular Action after
successful Hack???
Security Considerations – Access Control - Solutions
• Solutions
– Long phrase make password strong
• User Should be allowed to use long
passwords like phrases (64 chars by NIST)
• Password should not be truncated if they
exceed maximum password limit
• Eliminate complex rules
– Do not force password reset
• Inform user about login attempts on their
account
– Prevent user from selecting password from list of
Breached passwords
– Embrace use of password managers
User Account
Order
Product
Payment
https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/
https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/
Security Considerations – Credentials Management
• Lots of secrets !!!
• Secure the keys
– Distributed
• Worsened the Situation
• Difficult to revoked leaked credentials
• Expose credentials to everyone
– Centralized
• Vault - Keep secret A SECRET
• Allow to issue timed credentials
• Keep a record of
– Who used credentials
– For what duration
– No. of times request made
• Easy to Rotate
User Account
Order
Product
Payment
SSH Keys
DB credentialsTLS
Certificates
API Secret
Keys
Environment
Variables
Security Considerations – Patch Management
• Different Layers to cover
• Opportunity for implementing defence in depth
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
IaaS
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
• PaaS
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
PaaS
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
• PaaS
• Serverless Logic
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
ServerLess Logic
Security Considerations – Authentication & Authorization
User Account
Order
User Account
3rd Party
User Account
Mutual Authentication 3rd Party Authentication User Authentication
Order
Security Considerations – Authentication & Authorization
User Account
User Authentication
• Micro Services are Stateless
• Require separate mechanism for user authentication
• Possible Solutions
Distributed Session
Management
• Different Session based Solution -
•Server can store user specific session
•Each server knows all session details
•Centralized Server for managing server
• Session based solution will eventually
•lead to dependency on any of the server
•Create Bottleneck in the network
Token Based
Authentication
• Authenticate user via token like via JWT
• Self containing – no call to server once issued
• Lack of control on the token
Token With API
Gateway
• Generates Opaque token against access token
• Access token never revealed
• Allows option to revoke token when require
• Allows to control user access to a particular API
Order
Security Concerns – Authentication & Authorization
Mutual Authentication
User Account
Order
Product
Payment
Security Concerns – Authentication & Authorization
Mutual Authentication
• Services might be running on the
– Same Machine
– Across network
• End point authentication required
• TLS solves this issue
– Protects data confidentiality
– Mutual certification validation helps with
identity validation
• Separate certificate for each service
• Problem
– Too many services Too many certificates
to manage
• Private Certificate Centre can help
User Account
Order
Product
Payment
Security Considerations – Authentication & Authorization
User Account
3rd Party
3rd Party Authentication
• Granting access to 3rd party??
– Consider Authentication
– What they can access
• OAuth
• API Token
Security Considerations – Input Validation
Scenarios –
• Unsafe Deserialization
Multi Cloud
Multi Cloud – What & Why
• A multi-cloud strategy is the use of two or more cloud
computing services.
• A mix of public infrastructure as a service (IaaS)
environments, such as Amazon Web Services and Microsoft
Azure
What
• A way to prevent data loss or downtime due to a localized
component failure in the cloud.
• Use of more price-competitive cloud services
• Taking advantage of the speed, capacity or features offered
by a particular cloud provider in a particular geography.
• Compliance - enterprise data to physically reside in certain
location
Why
Multi Cloud Security Consideration
• Isolated Clouds Are Less Secure
– multiple secure clouds are not the same thing as a
secure multi-cloud.
• Poor visibility.
– o see into each cloud individually, but not into all clouds
at once, with no comprehensive view
• Lack of Coordination
– Isolated clouds PREVENT integration between security
functions and centralized orchestration. Thus preventing
coordinated response to mitigate the impact
• High TCO(Total Cost of Ownership) and reactive Security
– Spending hours matching and aggregating data from
different cloud management portals and then deciding
on appropriate actions takes time
• Example –
• Financial Services: Digital Transformation in the
Cloud
• Robust security provisions, such as Salesforce Trust and Fiserv’s
Sentry, are meant to allay security concerns.
• But it’s up to the bank’s security team, however, to figure out
whether the standards provided by these security provisions
match those of their internal network, and whether they can
ensure PCI compliance when personally identifiable data
traverses multiple cloud boundaries
• Education: Resourced Constrained
• Healthcare: IoMT Threats
Multi Cloud Security Solution
• Avoid ShadowOps
• Prioritize Visibility
– Solution that offers deep visibility, ideally at the
workload layer.
– Signature-based monitoring is not enough in the cloud.
Focus on behavior-based monitoring for detecting
anomalous behavior
• Uphold the Shared Responsibility Model
– make sure you understand the shared responsibility
model.
– If someone logs into production without permissions
and does something to put your organization at risk,
that’s on you.
• Focus on Automation
• We recommend that organizations leverage automation to
become secure by design
Thank You

More Related Content

What's hot

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoNCCOMMS
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azureAbdul Khan
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionalityvivekbhat
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack AzureAbdul Khan
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9Amazon Web Services
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environmentTaswar Bhatti
 
AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAmazon Web Services
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiNCCOMMS
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 

What's hot (20)

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
 
AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - Vocus
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 

Similar to Security Considerations for Microservices and Multi cloud

Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Codit
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultTom Kerkhove
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to beDebashis Banerjee
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesfirzhan naqash
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Precisely
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Techcello
 

Similar to Security Considerations for Microservices and Multi cloud (20)

Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Unit 5
Unit 5Unit 5
Unit 5
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 

Recently uploaded

social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptxsprasad829829
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..nishakur201
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxABMWeaklings
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utiliseccsubcollector
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushShivain97
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...CIOWomenMagazine
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndPooja Nehwal
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,dollysharma2066
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666nishakur201
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Leko Durda
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceanilsa9823
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 

Recently uploaded (20)

social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptx
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptx
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilise
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
 
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 

Security Considerations for Microservices and Multi cloud

  • 1. Designing Security for Multi-Cloud and Microservices Neelkamal Gaharwar
  • 2. Micro services with Pros and Cons Security Concern for Micro-Services Multi-Cloud – What & Why Multi-Cloud Security Concerns Multi-Cloud Security Solution Contents
  • 3. What are Micro servicesDashboard App Tier User Account Order Product Payment DB Tier Dashboard User Account Order Product Payment Monolithic Services Micro Services
  • 4. Micro services Dashboard User Account Order Product Payment Micro Services • An architectural style • Collection of Loosely coupled services accessible via API • Clearly defined interface • Each service runs as ➢ unique process ➢ usually manages its own database. • Can be implemented using different ➢ programming languages ➢ Databases ➢ software environment. ➢ Stateless “One at a time”
  • 5. Micro Services ✓ Smaller Development Cycle ✓ Improves fault resolution ✓ No long-term technology commitment ✓ Faster and reliable deployment ✓ Increase Uptime ✓ Service Reuse ✓ Scalable and better performance ✓ Better ownership and knowledge ✓ More Security Pros Dashboard User Account Order Product Payment Micro Services Security Pros • Compromising one service will not expose entire system • Defence-in-depth
  • 6. Micro Services ✓ Manage Multiple distributed Systems ✓ Manage multiple Remote API Calls ✓ Manage multiple Databases ✓ Difficult to Test ✓ Issues with Deployment – Holistic View Cons Dashboard User Account Order Product Payment Micro Services
  • 8. Security Considerations – Accessibility • With micro services internal calls are converted into Remote API calls • Use of weak or old passwords could be critical threat now as interfaces accessible User Account Order Product Payment
  • 9. Security Considerations – Accessibility Most Popular Action after successful Hack???
  • 10. Security Considerations – Access Control - Solutions • Solutions – Long phrase make password strong • User Should be allowed to use long passwords like phrases (64 chars by NIST) • Password should not be truncated if they exceed maximum password limit • Eliminate complex rules – Do not force password reset • Inform user about login attempts on their account – Prevent user from selecting password from list of Breached passwords – Embrace use of password managers User Account Order Product Payment https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/ https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/
  • 11. Security Considerations – Credentials Management • Lots of secrets !!! • Secure the keys – Distributed • Worsened the Situation • Difficult to revoked leaked credentials • Expose credentials to everyone – Centralized • Vault - Keep secret A SECRET • Allow to issue timed credentials • Keep a record of – Who used credentials – For what duration – No. of times request made • Easy to Rotate User Account Order Product Payment SSH Keys DB credentialsTLS Certificates API Secret Keys Environment Variables
  • 12. Security Considerations – Patch Management • Different Layers to cover • Opportunity for implementing defence in depth Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB
  • 13. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB IaaS
  • 14. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS • PaaS Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB PaaS
  • 15. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS • PaaS • Serverless Logic Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB ServerLess Logic
  • 16. Security Considerations – Authentication & Authorization User Account Order User Account 3rd Party User Account Mutual Authentication 3rd Party Authentication User Authentication Order
  • 17. Security Considerations – Authentication & Authorization User Account User Authentication • Micro Services are Stateless • Require separate mechanism for user authentication • Possible Solutions Distributed Session Management • Different Session based Solution - •Server can store user specific session •Each server knows all session details •Centralized Server for managing server • Session based solution will eventually •lead to dependency on any of the server •Create Bottleneck in the network Token Based Authentication • Authenticate user via token like via JWT • Self containing – no call to server once issued • Lack of control on the token Token With API Gateway • Generates Opaque token against access token • Access token never revealed • Allows option to revoke token when require • Allows to control user access to a particular API Order
  • 18. Security Concerns – Authentication & Authorization Mutual Authentication User Account Order Product Payment
  • 19. Security Concerns – Authentication & Authorization Mutual Authentication • Services might be running on the – Same Machine – Across network • End point authentication required • TLS solves this issue – Protects data confidentiality – Mutual certification validation helps with identity validation • Separate certificate for each service • Problem – Too many services Too many certificates to manage • Private Certificate Centre can help User Account Order Product Payment
  • 20. Security Considerations – Authentication & Authorization User Account 3rd Party 3rd Party Authentication • Granting access to 3rd party?? – Consider Authentication – What they can access • OAuth • API Token
  • 21. Security Considerations – Input Validation Scenarios – • Unsafe Deserialization
  • 23. Multi Cloud – What & Why • A multi-cloud strategy is the use of two or more cloud computing services. • A mix of public infrastructure as a service (IaaS) environments, such as Amazon Web Services and Microsoft Azure What • A way to prevent data loss or downtime due to a localized component failure in the cloud. • Use of more price-competitive cloud services • Taking advantage of the speed, capacity or features offered by a particular cloud provider in a particular geography. • Compliance - enterprise data to physically reside in certain location Why
  • 24. Multi Cloud Security Consideration • Isolated Clouds Are Less Secure – multiple secure clouds are not the same thing as a secure multi-cloud. • Poor visibility. – o see into each cloud individually, but not into all clouds at once, with no comprehensive view • Lack of Coordination – Isolated clouds PREVENT integration between security functions and centralized orchestration. Thus preventing coordinated response to mitigate the impact • High TCO(Total Cost of Ownership) and reactive Security – Spending hours matching and aggregating data from different cloud management portals and then deciding on appropriate actions takes time • Example – • Financial Services: Digital Transformation in the Cloud • Robust security provisions, such as Salesforce Trust and Fiserv’s Sentry, are meant to allay security concerns. • But it’s up to the bank’s security team, however, to figure out whether the standards provided by these security provisions match those of their internal network, and whether they can ensure PCI compliance when personally identifiable data traverses multiple cloud boundaries • Education: Resourced Constrained • Healthcare: IoMT Threats
  • 25. Multi Cloud Security Solution • Avoid ShadowOps • Prioritize Visibility – Solution that offers deep visibility, ideally at the workload layer. – Signature-based monitoring is not enough in the cloud. Focus on behavior-based monitoring for detecting anomalous behavior • Uphold the Shared Responsibility Model – make sure you understand the shared responsibility model. – If someone logs into production without permissions and does something to put your organization at risk, that’s on you. • Focus on Automation • We recommend that organizations leverage automation to become secure by design