SlideShare a Scribd company logo
Designing Security for Multi-Cloud and Microservices
Neelkamal Gaharwar
Micro services with Pros and Cons
Security Concern for Micro-Services
Multi-Cloud – What & Why
Multi-Cloud Security Concerns
Multi-Cloud Security Solution
Contents
What are Micro servicesDashboard
App Tier
User Account
Order
Product
Payment
DB Tier
Dashboard
User
Account
Order
Product
Payment
Monolithic Services
Micro Services
Micro services
Dashboard
User
Account
Order
Product
Payment
Micro Services
• An architectural style
• Collection of Loosely coupled services
accessible via API
• Clearly defined interface
• Each service runs as
➢ unique process
➢ usually manages its own database.
• Can be implemented using different
➢ programming languages
➢ Databases
➢ software environment.
➢ Stateless
“One at a time”
Micro Services
✓ Smaller Development Cycle
✓ Improves fault resolution
✓ No long-term technology
commitment
✓ Faster and reliable deployment
✓ Increase Uptime
✓ Service Reuse
✓ Scalable and better performance
✓ Better ownership and knowledge
✓ More Security
Pros
Dashboard
User
Account
Order
Product
Payment
Micro Services
Security Pros
• Compromising one service
will not expose entire system
• Defence-in-depth
Micro Services
✓ Manage Multiple distributed Systems
✓ Manage multiple Remote API Calls
✓ Manage multiple Databases
✓ Difficult to Test
✓ Issues with Deployment – Holistic
View
Cons
Dashboard
User
Account
Order
Product
Payment
Micro Services
Security Considerations For Micro
Services
Security Considerations – Accessibility
• With micro services internal calls are converted into
Remote API calls
• Use of weak or old passwords could be critical threat
now as interfaces accessible User Account
Order
Product
Payment
Security Considerations – Accessibility
Most Popular Action after
successful Hack???
Security Considerations – Access Control - Solutions
• Solutions
– Long phrase make password strong
• User Should be allowed to use long
passwords like phrases (64 chars by NIST)
• Password should not be truncated if they
exceed maximum password limit
• Eliminate complex rules
– Do not force password reset
• Inform user about login attempts on their
account
– Prevent user from selecting password from list of
Breached passwords
– Embrace use of password managers
User Account
Order
Product
Payment
https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/
https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/
Security Considerations – Credentials Management
• Lots of secrets !!!
• Secure the keys
– Distributed
• Worsened the Situation
• Difficult to revoked leaked credentials
• Expose credentials to everyone
– Centralized
• Vault - Keep secret A SECRET
• Allow to issue timed credentials
• Keep a record of
– Who used credentials
– For what duration
– No. of times request made
• Easy to Rotate
User Account
Order
Product
Payment
SSH Keys
DB credentialsTLS
Certificates
API Secret
Keys
Environment
Variables
Security Considerations – Patch Management
• Different Layers to cover
• Opportunity for implementing defence in depth
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
IaaS
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
• PaaS
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
PaaS
Security Considerations – Patch Management
• Based on you deployment model you can get help
– Cloud Provider will take care
• IaaS
• PaaS
• Serverless Logic
Hardware
Operating System
Hyper visor
VM 1 VM 2
OS
Container
OS
App
DB
DB
DB
ServerLess Logic
Security Considerations – Authentication & Authorization
User Account
Order
User Account
3rd Party
User Account
Mutual Authentication 3rd Party Authentication User Authentication
Order
Security Considerations – Authentication & Authorization
User Account
User Authentication
• Micro Services are Stateless
• Require separate mechanism for user authentication
• Possible Solutions
Distributed Session
Management
• Different Session based Solution -
•Server can store user specific session
•Each server knows all session details
•Centralized Server for managing server
• Session based solution will eventually
•lead to dependency on any of the server
•Create Bottleneck in the network
Token Based
Authentication
• Authenticate user via token like via JWT
• Self containing – no call to server once issued
• Lack of control on the token
Token With API
Gateway
• Generates Opaque token against access token
• Access token never revealed
• Allows option to revoke token when require
• Allows to control user access to a particular API
Order
Security Concerns – Authentication & Authorization
Mutual Authentication
User Account
Order
Product
Payment
Security Concerns – Authentication & Authorization
Mutual Authentication
• Services might be running on the
– Same Machine
– Across network
• End point authentication required
• TLS solves this issue
– Protects data confidentiality
– Mutual certification validation helps with
identity validation
• Separate certificate for each service
• Problem
– Too many services Too many certificates
to manage
• Private Certificate Centre can help
User Account
Order
Product
Payment
Security Considerations – Authentication & Authorization
User Account
3rd Party
3rd Party Authentication
• Granting access to 3rd party??
– Consider Authentication
– What they can access
• OAuth
• API Token
Security Considerations – Input Validation
Scenarios –
• Unsafe Deserialization
Multi Cloud
Multi Cloud – What & Why
• A multi-cloud strategy is the use of two or more cloud
computing services.
• A mix of public infrastructure as a service (IaaS)
environments, such as Amazon Web Services and Microsoft
Azure
What
• A way to prevent data loss or downtime due to a localized
component failure in the cloud.
• Use of more price-competitive cloud services
• Taking advantage of the speed, capacity or features offered
by a particular cloud provider in a particular geography.
• Compliance - enterprise data to physically reside in certain
location
Why
Multi Cloud Security Consideration
• Isolated Clouds Are Less Secure
– multiple secure clouds are not the same thing as a
secure multi-cloud.
• Poor visibility.
– o see into each cloud individually, but not into all clouds
at once, with no comprehensive view
• Lack of Coordination
– Isolated clouds PREVENT integration between security
functions and centralized orchestration. Thus preventing
coordinated response to mitigate the impact
• High TCO(Total Cost of Ownership) and reactive Security
– Spending hours matching and aggregating data from
different cloud management portals and then deciding
on appropriate actions takes time
• Example –
• Financial Services: Digital Transformation in the
Cloud
• Robust security provisions, such as Salesforce Trust and Fiserv’s
Sentry, are meant to allay security concerns.
• But it’s up to the bank’s security team, however, to figure out
whether the standards provided by these security provisions
match those of their internal network, and whether they can
ensure PCI compliance when personally identifiable data
traverses multiple cloud boundaries
• Education: Resourced Constrained
• Healthcare: IoMT Threats
Multi Cloud Security Solution
• Avoid ShadowOps
• Prioritize Visibility
– Solution that offers deep visibility, ideally at the
workload layer.
– Signature-based monitoring is not enough in the cloud.
Focus on behavior-based monitoring for detecting
anomalous behavior
• Uphold the Shared Responsibility Model
– make sure you understand the shared responsibility
model.
– If someone logs into production without permissions
and does something to put your organization at risk,
that’s on you.
• Focus on Automation
• We recommend that organizations leverage automation to
become secure by design
Thank You

More Related Content

What's hot

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
Abdul Khan
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
vivekbhat
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
Abdul Khan
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
Amazon Web Services
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
Alert Logic
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
Taswar Bhatti
 
AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - Vocus
Amazon Web Services
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
Microsoft Azure
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
Aidan Finn
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Quest
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
NCCOMMS
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
Lorenzo Barbieri
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
Alert Logic
 

What's hot (20)

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
 
AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - Vocus
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 

Similar to Security Considerations for Microservices and Multi cloud

Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Codit
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Tom Kerkhove
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
Unit 5
Unit 5Unit 5
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
Debashis Banerjee
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
MongoDB
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
firzhan naqash
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
Amazon Web Services
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Amazon Web Services
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
Amazon Web Services
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
Amazon Web Services
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Precisely
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Techcello
 

Similar to Security Considerations for Microservices and Multi cloud (20)

Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Unit 5
Unit 5Unit 5
Unit 5
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 

Recently uploaded

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
ichettrisagar95
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
gpangilinan2017
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
ghyke
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Tim Han Success Insider
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
shahul62
 
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
kirannaveed6
 

Recently uploaded (9)

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
 
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
 

Security Considerations for Microservices and Multi cloud

  • 1. Designing Security for Multi-Cloud and Microservices Neelkamal Gaharwar
  • 2. Micro services with Pros and Cons Security Concern for Micro-Services Multi-Cloud – What & Why Multi-Cloud Security Concerns Multi-Cloud Security Solution Contents
  • 3. What are Micro servicesDashboard App Tier User Account Order Product Payment DB Tier Dashboard User Account Order Product Payment Monolithic Services Micro Services
  • 4. Micro services Dashboard User Account Order Product Payment Micro Services • An architectural style • Collection of Loosely coupled services accessible via API • Clearly defined interface • Each service runs as ➢ unique process ➢ usually manages its own database. • Can be implemented using different ➢ programming languages ➢ Databases ➢ software environment. ➢ Stateless “One at a time”
  • 5. Micro Services ✓ Smaller Development Cycle ✓ Improves fault resolution ✓ No long-term technology commitment ✓ Faster and reliable deployment ✓ Increase Uptime ✓ Service Reuse ✓ Scalable and better performance ✓ Better ownership and knowledge ✓ More Security Pros Dashboard User Account Order Product Payment Micro Services Security Pros • Compromising one service will not expose entire system • Defence-in-depth
  • 6. Micro Services ✓ Manage Multiple distributed Systems ✓ Manage multiple Remote API Calls ✓ Manage multiple Databases ✓ Difficult to Test ✓ Issues with Deployment – Holistic View Cons Dashboard User Account Order Product Payment Micro Services
  • 8. Security Considerations – Accessibility • With micro services internal calls are converted into Remote API calls • Use of weak or old passwords could be critical threat now as interfaces accessible User Account Order Product Payment
  • 9. Security Considerations – Accessibility Most Popular Action after successful Hack???
  • 10. Security Considerations – Access Control - Solutions • Solutions – Long phrase make password strong • User Should be allowed to use long passwords like phrases (64 chars by NIST) • Password should not be truncated if they exceed maximum password limit • Eliminate complex rules – Do not force password reset • Inform user about login attempts on their account – Prevent user from selecting password from list of Breached passwords – Embrace use of password managers User Account Order Product Payment https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/ https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/
  • 11. Security Considerations – Credentials Management • Lots of secrets !!! • Secure the keys – Distributed • Worsened the Situation • Difficult to revoked leaked credentials • Expose credentials to everyone – Centralized • Vault - Keep secret A SECRET • Allow to issue timed credentials • Keep a record of – Who used credentials – For what duration – No. of times request made • Easy to Rotate User Account Order Product Payment SSH Keys DB credentialsTLS Certificates API Secret Keys Environment Variables
  • 12. Security Considerations – Patch Management • Different Layers to cover • Opportunity for implementing defence in depth Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB
  • 13. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB IaaS
  • 14. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS • PaaS Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB PaaS
  • 15. Security Considerations – Patch Management • Based on you deployment model you can get help – Cloud Provider will take care • IaaS • PaaS • Serverless Logic Hardware Operating System Hyper visor VM 1 VM 2 OS Container OS App DB DB DB ServerLess Logic
  • 16. Security Considerations – Authentication & Authorization User Account Order User Account 3rd Party User Account Mutual Authentication 3rd Party Authentication User Authentication Order
  • 17. Security Considerations – Authentication & Authorization User Account User Authentication • Micro Services are Stateless • Require separate mechanism for user authentication • Possible Solutions Distributed Session Management • Different Session based Solution - •Server can store user specific session •Each server knows all session details •Centralized Server for managing server • Session based solution will eventually •lead to dependency on any of the server •Create Bottleneck in the network Token Based Authentication • Authenticate user via token like via JWT • Self containing – no call to server once issued • Lack of control on the token Token With API Gateway • Generates Opaque token against access token • Access token never revealed • Allows option to revoke token when require • Allows to control user access to a particular API Order
  • 18. Security Concerns – Authentication & Authorization Mutual Authentication User Account Order Product Payment
  • 19. Security Concerns – Authentication & Authorization Mutual Authentication • Services might be running on the – Same Machine – Across network • End point authentication required • TLS solves this issue – Protects data confidentiality – Mutual certification validation helps with identity validation • Separate certificate for each service • Problem – Too many services Too many certificates to manage • Private Certificate Centre can help User Account Order Product Payment
  • 20. Security Considerations – Authentication & Authorization User Account 3rd Party 3rd Party Authentication • Granting access to 3rd party?? – Consider Authentication – What they can access • OAuth • API Token
  • 21. Security Considerations – Input Validation Scenarios – • Unsafe Deserialization
  • 23. Multi Cloud – What & Why • A multi-cloud strategy is the use of two or more cloud computing services. • A mix of public infrastructure as a service (IaaS) environments, such as Amazon Web Services and Microsoft Azure What • A way to prevent data loss or downtime due to a localized component failure in the cloud. • Use of more price-competitive cloud services • Taking advantage of the speed, capacity or features offered by a particular cloud provider in a particular geography. • Compliance - enterprise data to physically reside in certain location Why
  • 24. Multi Cloud Security Consideration • Isolated Clouds Are Less Secure – multiple secure clouds are not the same thing as a secure multi-cloud. • Poor visibility. – o see into each cloud individually, but not into all clouds at once, with no comprehensive view • Lack of Coordination – Isolated clouds PREVENT integration between security functions and centralized orchestration. Thus preventing coordinated response to mitigate the impact • High TCO(Total Cost of Ownership) and reactive Security – Spending hours matching and aggregating data from different cloud management portals and then deciding on appropriate actions takes time • Example – • Financial Services: Digital Transformation in the Cloud • Robust security provisions, such as Salesforce Trust and Fiserv’s Sentry, are meant to allay security concerns. • But it’s up to the bank’s security team, however, to figure out whether the standards provided by these security provisions match those of their internal network, and whether they can ensure PCI compliance when personally identifiable data traverses multiple cloud boundaries • Education: Resourced Constrained • Healthcare: IoMT Threats
  • 25. Multi Cloud Security Solution • Avoid ShadowOps • Prioritize Visibility – Solution that offers deep visibility, ideally at the workload layer. – Signature-based monitoring is not enough in the cloud. Focus on behavior-based monitoring for detecting anomalous behavior • Uphold the Shared Responsibility Model – make sure you understand the shared responsibility model. – If someone logs into production without permissions and does something to put your organization at risk, that’s on you. • Focus on Automation • We recommend that organizations leverage automation to become secure by design