SlideShare a Scribd company logo
1 of 69
Cloud Security
Ateneu Barcelonés, March 28th 6:30pm
https://www.meetup.com/Barcelona-Cybersecurity/events/259902770/
We build confidence
Agenda
(50’) Security for Microservices in
CLOUD by Germán Arranz,
Juan Gordo and Jose Moyano
(10’) Q&A
(60’) Drinks and networking
●Place: Bar & Terrace at Principal floor.
We build confidence
(7pm)
(8pm)
#A2Meetup meet-up@a2secure.com
BCN Cybersec Monthly - March
Security for Microservices
in Google Cloud Platform
Arranz Cobos, Germán
Gordo Ara, Juan
Moyano Gutierrez, Jose
#A2Meetup meet-up@a2secure.com
Germán Arranz Cobos
● Security Project Manager
● Responsible of Google Cloud Platform Layer
Juan Gordo Ara
● Security Analyst
● Responsible of Host Attack and Monitoring
Layer
Jose Moyano Gutierrez
● Security Technical Officer
● Responsible of K8s Network Layer
The crew
#A2Meetup meet-up@a2secure.com
Content
IAM
Firewall
Rules
Monitoring
Attack
vectors
#A2Meetup meet-up@a2secure.com
Understanding of IAM
hierarchy in GCP
#A2Meetup meet-up@a2secure.com
GCP Architecture
#A2Meetup meet-up@a2secure.com
IAM hierarchy in GCP
#A2Meetup meet-up@a2secure.com
Example: IAM hierarchy in GCP
Organization
Folder
Project
#A2Meetup meet-up@a2secure.com
Example: IAM hierarchy in GCP
#A2Meetup meet-up@a2secure.com
Example: IAM hierarchy in GCP
#A2Meetup meet-up@a2secure.com
Relationship of GCP
roles and GKE roles
#A2Meetup meet-up@a2secure.com
Relationship of GCP roles and GKE
roles
Kubernetes Engine Cluster Admin
Kubernetes Engine Admin
Kubernetes Engine Developer
Kubernetes Engine Viewer
Cluster Admin
Admin
Edit
View
#A2Meetup meet-up@a2secure.com
Relationship of GCP roles and GKE
roles
Kubernetes Engine Cluster Admin
Kubernetes Engine Admin
Kubernetes Engine Developer
Kubernetes Engine Viewer
Cluster Admin
Admin
Edit
View
#A2Meetup meet-up@a2secure.com
Firewall Rules in GCP
#A2Meetup meet-up@a2secure.com
Firewall rules by default
Default-allow-internal
Allows network connections of any protocol and port between
instances on the network.
Default-allow-ssh
Allows SSH connections from any source to any instance on the
network over TCP port 22.
Default-allow-rdp
Allows RDP connections from any source to any instance on the
network over TCP port 3389.
Default-allow-icmp
Allows ICMP traffic from any source to any instance on the
network
#A2Meetup meet-up@a2secure.com
Firewall Rules Key
points when using GKE
#A2Meetup meet-up@a2secure.com
Firewall Rules Key points using GKE
Auto-generation of firewall rules when you deploy a service inside the cluster.
#A2Meetup meet-up@a2secure.com
Firewall Rules Key points using GKE
Define the Authorized Network to restrict the access to the master.
#A2Meetup meet-up@a2secure.com
Apply SSH restrictions to
connect to the GKE nodes
#A2Meetup meet-up@a2secure.com
Our scenario
Tag: shelob Tag: shelob
#A2Meetup meet-up@a2secure.com
SSH Bastion “Minas Tirith” architecture
Tag: shelob Tag: shelob
Tag: bastion
#A2Meetup meet-up@a2secure.com
DEMO
#A2Meetup meet-up@a2secure.com
GKE basic WebApp
“DevOps ready to play”
#A2Meetup meet-up@a2secure.com
Our scenario
#A2Meetup meet-up@a2secure.com
Web App
#A2Meetup meet-up@a2secure.com
Service
#A2Meetup meet-up@a2secure.com
Deployment
#A2Meetup meet-up@a2secure.com
Dockerfile
#A2Meetup meet-up@a2secure.com
Web App
#A2Meetup meet-up@a2secure.com
Elevation of privileges &&
Back Door
“ One Ring to rule them all, One Ring to find them, One
Ring to bring them all and in the darkness bind them”
#A2Meetup meet-up@a2secure.com
Web App
#A2Meetup meet-up@a2secure.com
OneRing
#A2Meetup meet-up@a2secure.com
Deployment
#A2Meetup meet-up@a2secure.com
Dockerfile
#A2Meetup meet-up@a2secure.com
BackDoor
#A2Meetup meet-up@a2secure.com
BackDoor
#A2Meetup meet-up@a2secure.com
DEMO
#A2Meetup meet-up@a2secure.com
GKE - Falco
Runtime monitoring
#A2Meetup meet-up@a2secure.com
What is Falco?
#A2Meetup meet-up@a2secure.com
Falco
#A2Meetup meet-up@a2secure.com
Service
#A2Meetup meet-up@a2secure.com
Daemonset
#A2Meetup meet-up@a2secure.com
BackDoor - Monitoring
#A2Meetup meet-up@a2secure.com
BackDoor - Monitoring
#A2Meetup meet-up@a2secure.com
Alerts
#A2Meetup meet-up@a2secure.com
DEMO
#A2Meetup meet-up@a2secure.com
References
● OneRing repo: https://github.com/ilcapone/OneRing
● Install falco in k8:
https://github.com/falcosecurity/falco/tree/dev/integrations/k8s-using-
daemonset
● Deploying a containerized web application in GKE:
https://cloud.google.com/kubernetes-engine/docs/tutorials/hello-app
#A2Meetup meet-up@a2secure.com
K8s Network
#A2Meetup meet-up@a2secure.com
K8s Network
The problems
What happens with Pod 2 Pod connectivity?
Are the VPC rules enough?
How can I monitor the network traffic?
#A2Meetup meet-up@a2secure.com
Network Policies
What are they?
K8s resource that allows to define allowed traffic flows.
How do they work?
● NP are Namespace resources
● Assigned to Groups of Pods selected
by labels
● Applied to Pod level. Like iptables =)
● Policies are “stateful”
● Default K8s Policy is to allow all
#A2Meetup meet-up@a2secure.com
Network Policies
What are they?
K8s resource that allows to define allowed traffic.
How do they work?
● NP are Namespace resources
● Assigned to Groups of Pods selected
by labels
● Applied to Pod level. Like iptables =)
● Policies are “stateful”
● Default K8s Policy is ALLOW ALL
#A2Meetup meet-up@a2secure.com
Network Policies
Ingress Policy
#A2Meetup meet-up@a2secure.com
Network Policies
Deny by Default
#A2Meetup meet-up@a2secure.com
Network Policies
● Demo - Deny by default
#A2Meetup meet-up@a2secure.com
Network Policies
● Demo - Deny by default
#A2Meetup meet-up@a2secure.com
Network Policies
Security Policies are not enabled by default!
Network policies are a key security point
Deny By Default always!
NP can enforce our security or let an user compromise your cluster!
● Control by RBAC who can manage Network Policies
● Control by RBAC who can create Namespaces
#A2Meetup meet-up@a2secure.com
IDS on GKE
#A2Meetup meet-up@a2secure.com
IDS on GKE
Why an IDS?
● Allows us to detect attacks even before they succeed
● Can monitor all kind of traffic
● Forensic
Handicaps
● There is no port mirroring in GKE/GCP, but we still need a way to detect
attacks against our microservices
● K8s nodes are managed and volatile
#A2Meetup meet-up@a2secure.com
IDS on GKE - Scenario
#A2Meetup meet-up@a2secure.com
IDS on GKE - GKE Node
TCPDUMP on each node
/usr/sbin/tcpdump -i ${IFACE} -w - "($PCAP_FILTER) and not (dst
host $SOCAT_HOST and dst port $SOCAT_PORT)"| socat -
openssl:"$SOCAT_HOST":"$SOCAT_PORT",verify=0,ignoreeof
TCPDUMP on IDS server
$ socat openssl-listen:58888,cert=/etc/suricata/cert.pem,key=/etc/s
uricata/cert.key,reuseaddr,pf=ip4,fork,verify=0 SYSTEM:tcpdump -n -
s0 -r - -W 5 -G 30 -w
/var/lib/topo/unread/tcpdump_%Y%m%d%H%M%S.pcap
#A2Meetup meet-up@a2secure.com
IDS on GKE
● Demo
#A2Meetup meet-up@a2secure.com
IDS on GKE
References
● Topo repo: https://github.com/gum0x/topo
● Install Suricata in Centos7
https://redmine.openinfosecfoundation.org/projects/suricata/wiki/CentO
S_Installation
● Special thanks to:
https://github.com/xme/fpc - Socat concept extracted from here
https://github.com/owlh/owlhmaster/ - Server concept extracted from
here
#A2Meetup meet-up@a2secure.com
Wrap up
#A2Meetup meet-up@a2secure.com
BCN Cybersec Monthly - March
Thanks for the attention.
Any question?
Arranz Cobos, Germán
Gordo Ara, Juan
Moyano Gutierrez, Jose
#A2Meetup meet-up@a2secure.com
BCN Cybersec Monthly - March
Arranz Cobos, Germán
Gordo Ara, Juan
Moyano Gutierrez, Jose
Si quieres más
información de quiénes somos:
meet-up@a2secure.com
¿Networking - Drinks?
Meet with us at Bar – Ateneu (principal)
BARCELONA
Avd. Francesc Cambó 21,
planta 10
08003 Barcelona
+34 933 945 600
Info@a2secure.com
MADRID
Paseo de la Castellana 210,
planta 10, puerta 7
28046 Madrid
+34 910 585 349
Info@a2secure.com

More Related Content

What's hot

php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2Adam Englander
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS LaneJames Wickett
 
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6Faelix Ltd
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNorth Texas Chapter of the ISSA
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your SecurityPxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security🏆Ruben Cocheno💭
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 ThreatsCyren, Inc
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3North Texas Chapter of the ISSA
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...Intergen
 

What's hot (10)

php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS Lane
 
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6
The Story of CVE-2018-19299 - finding and reporting bugs in Mikrotik RouterOS v6
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your SecurityPxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 Threats
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...
TechEd NZ 2014: Delivering end-to-end Video Experiences with Azure Media Serv...
 

Similar to Security for Microservices in GCP

Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWebinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWeaveworks
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesPriyanka Aash
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8sDevOps Indonesia
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Weaveworks
 
Azure Industrial Iot Edge
Azure Industrial Iot EdgeAzure Industrial Iot Edge
Azure Industrial Iot EdgeRiccardo Zamana
 
kreuzwerker about prowler - make best practises best practises
kreuzwerker about prowler - make best practises best practiseskreuzwerker about prowler - make best practises best practises
kreuzwerker about prowler - make best practises best practiseskreuzwerker GmbH
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Industrialise your deployment: Infrastructure as Code on OVHcloud Public Cloud
Industrialise your deployment: Infrastructure as Code on OVHcloud Public CloudIndustrialise your deployment: Infrastructure as Code on OVHcloud Public Cloud
Industrialise your deployment: Infrastructure as Code on OVHcloud Public CloudOVHcloud
 
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...Nico Meisenzahl
 
Connecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugConnecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugIan Skerrett
 
Introducing MongoDB Atlas
Introducing MongoDB AtlasIntroducing MongoDB Atlas
Introducing MongoDB AtlasMongoDB
 
Gojko's 5 rules for super responsive Serverless applications
Gojko's 5 rules for super responsive Serverless applicationsGojko's 5 rules for super responsive Serverless applications
Gojko's 5 rules for super responsive Serverless applicationsDaniel Zivkovic
 
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted GraphiteSREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted GraphiteHostedGraphite
 
Serverless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsServerless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsJames Wickett
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sQAware GmbH
 
How we found a firewall vendor bug using Teleport as a bastion jump host
How we found a firewall vendor bug using Teleport as a bastion jump hostHow we found a firewall vendor bug using Teleport as a bastion jump host
How we found a firewall vendor bug using Teleport as a bastion jump hostFaelix Ltd
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
You Can Be Cloud Native, Too
You Can Be Cloud Native, TooYou Can Be Cloud Native, Too
You Can Be Cloud Native, TooVMware Tanzu
 
Kubernetes fingerprinting with Prometheus.pdf
Kubernetes fingerprinting with Prometheus.pdfKubernetes fingerprinting with Prometheus.pdf
Kubernetes fingerprinting with Prometheus.pdfKawimbaLofgrens
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureSergey Gordeychik
 

Similar to Security for Microservices in GCP (20)

Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWebinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security Headaches
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
 
Azure Industrial Iot Edge
Azure Industrial Iot EdgeAzure Industrial Iot Edge
Azure Industrial Iot Edge
 
kreuzwerker about prowler - make best practises best practises
kreuzwerker about prowler - make best practises best practiseskreuzwerker about prowler - make best practises best practises
kreuzwerker about prowler - make best practises best practises
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Industrialise your deployment: Infrastructure as Code on OVHcloud Public Cloud
Industrialise your deployment: Infrastructure as Code on OVHcloud Public CloudIndustrialise your deployment: Infrastructure as Code on OVHcloud Public Cloud
Industrialise your deployment: Infrastructure as Code on OVHcloud Public Cloud
 
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...
 
Connecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugConnecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and Sparkplug
 
Introducing MongoDB Atlas
Introducing MongoDB AtlasIntroducing MongoDB Atlas
Introducing MongoDB Atlas
 
Gojko's 5 rules for super responsive Serverless applications
Gojko's 5 rules for super responsive Serverless applicationsGojko's 5 rules for super responsive Serverless applications
Gojko's 5 rules for super responsive Serverless applications
 
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted GraphiteSREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
 
Serverless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsServerless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 milliseconds
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8s
 
How we found a firewall vendor bug using Teleport as a bastion jump host
How we found a firewall vendor bug using Teleport as a bastion jump hostHow we found a firewall vendor bug using Teleport as a bastion jump host
How we found a firewall vendor bug using Teleport as a bastion jump host
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
You Can Be Cloud Native, Too
You Can Be Cloud Native, TooYou Can Be Cloud Native, Too
You Can Be Cloud Native, Too
 
Kubernetes fingerprinting with Prometheus.pdf
Kubernetes fingerprinting with Prometheus.pdfKubernetes fingerprinting with Prometheus.pdf
Kubernetes fingerprinting with Prometheus.pdf
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Security for Microservices in GCP