SlideShare a Scribd company logo
1 of 40
Crafting secure
composable Sitecore
SaaS-based applications
Vasiliy FOmichev
#sugcon
Initiate new sections
as you shine
Kick off specific subjects
within your presentation
with these section slides.
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
• Solution design
• DevSecOps
• Security reference diagram
Agenda
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Introductions
 Sitecore MVP 2015 – 2023:
Technology, Commerce, Ambassador
 15 years of Sitecore delivery
 9 years of managing Sitecore practices
 MarTech enthusiast — Content, Azure, AI, Blockchain
Vasiliy Fomichev
VP, Digital Solutions, Altudo
vasiliy.fomichev@altudo.co
@vasiliyfomichev
www.altudo.co
www.cmsbestpractices.com
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
We are a leader in Sitecore for 15+ years
600+
Sitecore Projects
Delivered
Sitecore Expertise
45+
Fortune 500 Clients
Trusted By Top Brands
10+
Awards Worldwide
Recognized By The
Experts
20+
Partnerships to help you
scale
Sitecore Ecosystem
450+
Sitecore SMEs
Extensive Experience
Most
innovative
partner
Global
Sitecore
expertise
Extensive
partnerships
Coveo
Partner
7x
Introduction to Secure
SaaS-based Web App
Design
Planning for resilience
The only secure system is the one
that’s turned off.
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
The foundational layers of security
Security by design
Automation
• People
• Systems
• Processes
• Best practices: Networking, Coding
• Peer reviews
• Threat modeling
• OWASP Security Knowledge
Framework (SKF)
• Unit testing
• Integration testing
• Code quality scanning
• SAST
• SCA dependency scanning
• Integration testing
• DTA container scanning
• Network scanning
• Performance testing
• IAST
• RASP
• DAST
Education
• Pair programming
• Lunch & learns
• Informal knowledge sharing
• Experiment
• Learn from incidents
• Create incidents yourself
• Use playgrounds
• Certification
• Self-paced
• Instructor-led
• Tutorials
• Gamification
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
The foundational layers of security
Security by design
Automation
• People
• Systems
• Processes
• Best practices: Networking, Coding
• Peer reviews
• Threat modeling
• OWASP Security Knowledge
Framework (SKF)
• Unit testing
• Integration testing
• Code quality scanning
• SAST
• SCA dependency scanning
• Integration testing
• DTA container scanning
• Network scanning
• Performance testing
• IAST
• RASP
• DAST
Education
• Pair programming
• Lunch & learns
• Informal knowledge sharing
• Experiment
• Learn from incidents
• Create incidents yourself
• Use playgrounds
• Certification
• Self-paced
• Instructor-led
• Tutorials
• Gamification
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
The three pillars of security
Confidentiality Integrity Availability
• System access control
• Data access control
• Information exposure limit
• System integrity
• Data integrity
• Behavioral integrity
• System SLA
• Data accessibility
• Application performance and
uptime
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Layered security model with OSI
https://industry40.co.in/networking-osi-layers/
Physical (1)
Data Link (2)
Network (3)
Transport (4)
Session (5)
Presentation (6)
Application (7)
Purpose
Ensure data is in a usable format
(serialization, deserialization, encryption)
Maintains connections, responsible for
ports and sessions.
Transmits data across the network using
transmission protocols; TCP and UDP
Decides which physical path the data will
take; IP routing
Defines the format of data on the network;
packet structure and frames; MAC address
Electrical signal transmission; connections,
wiring, fiber optic.
Intrusion – network, hardware.
Spoofing (MAC, ARP) MAC flooding, VLAN
hopping
Man-in-the-middle, distributed denial of
service (DDoS)
Eavesdropping, SYN flood, tampering and
message forgery, packet sniffing, port scanning.
Sniffing, RPC, NetBios attacks
Session hijacking
Exploits
Human-computer interaction layer, where
applications access network services.
Threat
Layers
out
in
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
The attack surface increase with SaaS
Job Job
API Job
API API
API API
Virtual Machine
Azure SQL
XM Cloud
SaaS and composable architectures
massively increase attack surfaces.
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Typical XM Cloud application
XM Cloud
Vercel
Client
Azure Services
TLS TLS
TLS TLS
TLS
1
2
3
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Secure network topologies
https://learn.microsoft.com/en-us/azure/architecture/solution-ideas/articles/protect-backend-apis-azure-management
https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/apis/protect-apis
Client Front Door
Active
Directory
(B2C)
API Management
AKS
Private Endpoint Function
API Services
1 Service Call
2
Authenticate /
validate token
4 Service Call
JWT
3
JWT
5
Intruder
JWT
JWT
5
Dead end
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Legacy point-to-point communication
Data Systems
Inventory Service
Application Layer
Product Service CRM ERP
Mobile App Website Kiosk
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Service layer abstraction for availability
Data Systems
Abstraction Layer
Inventory Service
Application Layer
Product Service CRM ERP
Inventory
API
Product API Contact API Order API
Mobile App Website Kiosk
Service to service communication: mTLS  Zero Trust
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Data Plane
Securing microservices with zero trust
Control Plane
Certificate
Management
Proxy
Microservice
Authorization Policy
Logging &
Monitoring
Routing Rules
Proxy
Microservice
Proxy
Microservice
Ingress
API
Management
east - west
north
-
south
mTLS
OSM
The service
proxy acts as a
policy enforcer.
1
2
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
1. Broken Object Level Authorization
2. Broken User Authentication
3. Excessive Data Exposure
4. Lack of Resources & Rate Limiting
5. Broken Function Level Authorization
6. Mass Assignment
7. Security Misconfiguration
8. Injection
9. Improper Assets Management
10.Insufficient Logging & Monitoring
Building secure APIs: OWASP top 10 API
OWASP Top 10
1. Create function-level authorization (JWT)
2. MFA, TLS
3. Limit objects and properties exposed via an API
4. Validate object size and rates
5. Ensure proper role and rights assignments
6. Validate objects; filter out properties
7. Restrict raw error exposure, tighten CORS, ensure
TLS, implement HSTS, use TLC Cipher String cheet
sheet; setup security headers
8. Ensure validation
9. ?
10.Implement an Azure cloud defender
Vulnerability Mitigation
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Availability
• Use edge caching to prevent unnecessary load on the backend
• Configure CORS for edge functions
• Use logging for observability (console.log)
Confidentiality
• Use Vercel security features to restrict access to environments
• Vercel Authentication to restrict preview (all, needs an account)
• Password protection (Enterprise or $150/mon.)
• Shareable links (all, needs an account)
• Do not store secrets in code
Integrity
• Use TLS 1.2 or 1.3
First line of defense with Vercel Edge
Automating security
testing and validation
Enforcing security with
DevSecOps
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Securing Docker and Kubernetes
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
“Polyglot programming is the practice of writing code in
multiple languages to capture additional functionality
and efficiency not available in a single language. The use
of domain specific languages (DSLs) has become a
standard practice for enterprise application
development.”
Need for more
• Governance
• Security specialists
• Platforms and tools
• Templates
• Infrastructure
Avoid polyglot applications from security
perspective.
Polyglot applications security
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Resourcing your teams based on your strategy
Team
1
Team
2
Team
3
Upskilled Team
+ Agile
+ Cheaper
? Ability to Scale
? Commitment
Team
1
Team
2
Team
3
++ Center of
Excellence
? Customer Focused
? Prioritisation
? Resourcing
? Speed of Turnaround
Platform Team
- Security champions and evangelists
Team
1
Team
2
Team
3
+ Customer Focus
+ Resources secured
? Distributed Knowledge
? Communication
? Overlapping Experiences
Shared Resources
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Infrastructure as Code (IaC) is the management of infrastructure (networks, virtual machines, load balancers, and
connection topology) in a descriptive model, using the same versioning as DevOps team uses for source code.
Infrastructure as code for automation
• Automates environment setup
• Allows repeatability and templatization
• Enables infrastructure versioning
• Promotes Site Reliability Engineering (SRE)
• Promotes standardization, security, consistency,
and stability
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
• No single test is sufficient
• Provide test coverage across units, technology, and
system layers
• Move the cheaper tests closer to the foundation to
reduce the feedback cycle
• Container tests should be done at three levels
o IDE by developers
o During the build process before deploying
to the registry
o Periodic scans for registry images
• Manual testing is good at finding outlier defects,
while automated delivers greater testing coverage to
identify common weaknesses.
Design test automation based on cost
IAST/R
ASP
Performanc
e testing
Network
Scanning
DTA Container
Scanning
Integration testing
SCA Dependency Scanning
SAST/Unit Testing
Cost
per
test
DAST
Penetration testing,
bug bounties, peer
reviews
Reference Solution
Architecture
How security is created.
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Composable SaaS security reference
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Implement an Azure Front Door, use TLS, encrypt data in store (Azure SQL default)
Turn off, secure password storage, check system for rogue peripherals.
Restrict traffic with VLANs, private links.
Implement an Azure Front Door; use Load Balancer to send bad requests to dead
end, redundancy and traffic offloading.
Implement an Azure Front Door
Implement an Azure Front Door, setup encryption
Implement an Azure Front Door; disable access when employee leaves; set auto-lock
in OS, log out of systems, use JWT for authorization, use zero trust with a service
mesh pattern, OWASP top Ten Web and API, CWE top 25, Vercel security
• Please insert a background image
that suits your presentation,
or leave it empty.
© 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/
Most security breaches happen from inside of
organizations.
I am a proud community member! Please contact me on the following
handles:
sitecorechat.slack.com twitter sitecore.stackexchange.com
Thank you!
I am a proud community member!
Please contact me on the following handles:
sitecorechat.slack.com twitter
• Layer 1 – port protection of your laptop and
hardware; access to systems, login expiration
• Layer 2 - VLANS
• Layer 3 – Front Door
• Layer 4 – Front Door
• Layer 5 – Front Door
• Layer 6 – Front Door
• Layer 7 – Front Door (bot protection,
https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/afds-overview
https://learn.microsoft.com/en-us/azure/frontdoor/web-application-firewall
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-ddos
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-ddos
https://learn.microsoft.com/en-us/azure/frontdoor/origin-security?tabs=app-service-
functions&pivots=front-door-standard-premium
DevSecOps Sitecore pipeline
33
Pull Image
Developers
Image
Repository
Container
Registry
System
Admins
DevOps
Engineers
Commit
Listen
Manage
Manage
Store image
DEV SVT PRD
DEV Deployment SVT Deployment PRD Deployment
Container Image Pull
Gitlab CI
Gitlab CD
Gitlab DAST
Selenium UI
Tests
Unit Tests
Quality and SAST
Scans
Upload
Run
Run
Upload Run
Page Speed
Tests
Load Tests
Run Run
Or emphasize with this bold
headline if you want..
” –
Quote somebody on their
brilliance as everybody in our
community deserves a best
friend!
Akshay Sura
• Proin magna enim, hendrerit nec justo non, gravida
efficitur leo. Phasellus pharetra gravida turpis, sed
laoreet dui efficitur nec. Nulla auctor mi et ligula
dignissim, ac consectetur ligula rutrum.
• Sed accumsan mollis consectetur. In et sem eget orci
placerat condimentum. Nunc tortor sapien, pellentesque
eu aliquet vel, gravida eu lorem.
• These are actually valid points.
At some point, add proper content too!
Each presentation must end with the following three
slides. As the conference is a from-the-community-for-the-
community event we find it important that you share your
social channels you feel comfortable with, mainly the Slack
channel and Twitter.
Also, we couldn’t organize this event without our
community sponsors. Please leave them at the end of your
slide deck.
Please don’t change the following 3 slides
Secure
Implementations
How security is created.
Hardening Sitecore headless solutions
Team changes and upskilling
QA
Quality Assurance
and testing
Developer
Front and backend
development.
DevOps Engineer
Release processes
and automation
DevOps Security
Champion
Security automation
Monitoring
Notifications
Development Security
Champion
Code Scanning & Reviews
QA Security Champion
Dynamic application
testing
Security Bridge Team
Specialized Security
Personnel
Software, DevOps,
Forensic Analysis,
etc.
CISO
Security program
development.
Security Team
Development Team

More Related Content

Similar to SUGCON EU 2023 - Secure Composable SaaS.pptx

Stay productive while slicing up the monolith
Stay productive while slicing up the monolithStay productive while slicing up the monolith
Stay productive while slicing up the monolithMarkus Eisele
 
Lesson learns from Japan cloud trend
Lesson learns from Japan cloud trendLesson learns from Japan cloud trend
Lesson learns from Japan cloud trendKimihiko Kitase
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Microsoft Tech Community
 
Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?DevGAMM Conference
 
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Matt Raible
 
Application Centric Microservices from Redhat Summit 2015
Application Centric Microservices from Redhat Summit 2015Application Centric Microservices from Redhat Summit 2015
Application Centric Microservices from Redhat Summit 2015Ken Owens
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Matt Raible
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesVMware Tanzu
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMData Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMmfrancis
 
Microservices Docker Kubernetes Istio Kanban DevOps SRE
Microservices Docker Kubernetes Istio Kanban DevOps SREMicroservices Docker Kubernetes Istio Kanban DevOps SRE
Microservices Docker Kubernetes Istio Kanban DevOps SREAraf Karsh Hamid
 
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Matt Raible
 
Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Matt Raible
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackAymen Mami
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service MeshRam Vennam
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůMarketingArrowECS_CZ
 
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...Juarez Junior
 

Similar to SUGCON EU 2023 - Secure Composable SaaS.pptx (20)

Stay productive while slicing up the monolith
Stay productive while slicing up the monolithStay productive while slicing up the monolith
Stay productive while slicing up the monolith
 
Lesson learns from Japan cloud trend
Lesson learns from Japan cloud trendLesson learns from Japan cloud trend
Lesson learns from Japan cloud trend
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
 
Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?
 
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
 
Application Centric Microservices from Redhat Summit 2015
Application Centric Microservices from Redhat Summit 2015Application Centric Microservices from Redhat Summit 2015
Application Centric Microservices from Redhat Summit 2015
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
 
Ankit Vakil (2)
Ankit Vakil (2)Ankit Vakil (2)
Ankit Vakil (2)
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMData Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
 
Microservices Docker Kubernetes Istio Kanban DevOps SRE
Microservices Docker Kubernetes Istio Kanban DevOps SREMicroservices Docker Kubernetes Istio Kanban DevOps SRE
Microservices Docker Kubernetes Istio Kanban DevOps SRE
 
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020
 
Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
 
Profile_Ahmad2
Profile_Ahmad2Profile_Ahmad2
Profile_Ahmad2
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
 

More from Vasiliy Fomichev

Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptx
Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptxSitecore DX - MVP Summit - SUGCON Updates 10.2023.pptx
Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptxVasiliy Fomichev
 
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptx
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptxSUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptx
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptxVasiliy Fomichev
 
Activating massive omnichannel personalization
Activating massive omnichannel personalizationActivating massive omnichannel personalization
Activating massive omnichannel personalizationVasiliy Fomichev
 
The Road to Amazon and Beyond
The Road to Amazon and BeyondThe Road to Amazon and Beyond
The Road to Amazon and BeyondVasiliy Fomichev
 
LASUG Online: Introduction to Docker and Docker Tools
LASUG Online: Introduction to Docker and Docker ToolsLASUG Online: Introduction to Docker and Docker Tools
LASUG Online: Introduction to Docker and Docker ToolsVasiliy Fomichev
 
SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore Vasiliy Fomichev
 

More from Vasiliy Fomichev (7)

Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptx
Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptxSitecore DX - MVP Summit - SUGCON Updates 10.2023.pptx
Sitecore DX - MVP Summit - SUGCON Updates 10.2023.pptx
 
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptx
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptxSUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptx
SUGCON NA 2023 - Crafting Lightning Fast Composable Experiences.pptx
 
Activating massive omnichannel personalization
Activating massive omnichannel personalizationActivating massive omnichannel personalization
Activating massive omnichannel personalization
 
Blockchain in E-Commerce
Blockchain in E-CommerceBlockchain in E-Commerce
Blockchain in E-Commerce
 
The Road to Amazon and Beyond
The Road to Amazon and BeyondThe Road to Amazon and Beyond
The Road to Amazon and Beyond
 
LASUG Online: Introduction to Docker and Docker Tools
LASUG Online: Introduction to Docker and Docker ToolsLASUG Online: Introduction to Docker and Docker Tools
LASUG Online: Introduction to Docker and Docker Tools
 
SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

SUGCON EU 2023 - Secure Composable SaaS.pptx

  • 1. Crafting secure composable Sitecore SaaS-based applications Vasiliy FOmichev #sugcon
  • 2. Initiate new sections as you shine Kick off specific subjects within your presentation with these section slides.
  • 3. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ • Solution design • DevSecOps • Security reference diagram Agenda
  • 4. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Introductions  Sitecore MVP 2015 – 2023: Technology, Commerce, Ambassador  15 years of Sitecore delivery  9 years of managing Sitecore practices  MarTech enthusiast — Content, Azure, AI, Blockchain Vasiliy Fomichev VP, Digital Solutions, Altudo vasiliy.fomichev@altudo.co @vasiliyfomichev www.altudo.co www.cmsbestpractices.com
  • 5. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ We are a leader in Sitecore for 15+ years 600+ Sitecore Projects Delivered Sitecore Expertise 45+ Fortune 500 Clients Trusted By Top Brands 10+ Awards Worldwide Recognized By The Experts 20+ Partnerships to help you scale Sitecore Ecosystem 450+ Sitecore SMEs Extensive Experience Most innovative partner Global Sitecore expertise Extensive partnerships Coveo Partner 7x
  • 6. Introduction to Secure SaaS-based Web App Design Planning for resilience
  • 7. The only secure system is the one that’s turned off.
  • 8. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ The foundational layers of security Security by design Automation • People • Systems • Processes • Best practices: Networking, Coding • Peer reviews • Threat modeling • OWASP Security Knowledge Framework (SKF) • Unit testing • Integration testing • Code quality scanning • SAST • SCA dependency scanning • Integration testing • DTA container scanning • Network scanning • Performance testing • IAST • RASP • DAST Education • Pair programming • Lunch & learns • Informal knowledge sharing • Experiment • Learn from incidents • Create incidents yourself • Use playgrounds • Certification • Self-paced • Instructor-led • Tutorials • Gamification
  • 9. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ The foundational layers of security Security by design Automation • People • Systems • Processes • Best practices: Networking, Coding • Peer reviews • Threat modeling • OWASP Security Knowledge Framework (SKF) • Unit testing • Integration testing • Code quality scanning • SAST • SCA dependency scanning • Integration testing • DTA container scanning • Network scanning • Performance testing • IAST • RASP • DAST Education • Pair programming • Lunch & learns • Informal knowledge sharing • Experiment • Learn from incidents • Create incidents yourself • Use playgrounds • Certification • Self-paced • Instructor-led • Tutorials • Gamification
  • 10. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ The three pillars of security Confidentiality Integrity Availability • System access control • Data access control • Information exposure limit • System integrity • Data integrity • Behavioral integrity • System SLA • Data accessibility • Application performance and uptime
  • 11. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Layered security model with OSI https://industry40.co.in/networking-osi-layers/ Physical (1) Data Link (2) Network (3) Transport (4) Session (5) Presentation (6) Application (7) Purpose Ensure data is in a usable format (serialization, deserialization, encryption) Maintains connections, responsible for ports and sessions. Transmits data across the network using transmission protocols; TCP and UDP Decides which physical path the data will take; IP routing Defines the format of data on the network; packet structure and frames; MAC address Electrical signal transmission; connections, wiring, fiber optic. Intrusion – network, hardware. Spoofing (MAC, ARP) MAC flooding, VLAN hopping Man-in-the-middle, distributed denial of service (DDoS) Eavesdropping, SYN flood, tampering and message forgery, packet sniffing, port scanning. Sniffing, RPC, NetBios attacks Session hijacking Exploits Human-computer interaction layer, where applications access network services. Threat Layers out in
  • 12. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ The attack surface increase with SaaS Job Job API Job API API API API Virtual Machine Azure SQL XM Cloud SaaS and composable architectures massively increase attack surfaces.
  • 13. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Typical XM Cloud application XM Cloud Vercel Client Azure Services TLS TLS TLS TLS TLS 1 2 3
  • 14. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Secure network topologies https://learn.microsoft.com/en-us/azure/architecture/solution-ideas/articles/protect-backend-apis-azure-management https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/apis/protect-apis Client Front Door Active Directory (B2C) API Management AKS Private Endpoint Function API Services 1 Service Call 2 Authenticate / validate token 4 Service Call JWT 3 JWT 5 Intruder JWT JWT 5 Dead end
  • 15. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Legacy point-to-point communication Data Systems Inventory Service Application Layer Product Service CRM ERP Mobile App Website Kiosk
  • 16. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Service layer abstraction for availability Data Systems Abstraction Layer Inventory Service Application Layer Product Service CRM ERP Inventory API Product API Contact API Order API Mobile App Website Kiosk Service to service communication: mTLS  Zero Trust
  • 17. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Data Plane Securing microservices with zero trust Control Plane Certificate Management Proxy Microservice Authorization Policy Logging & Monitoring Routing Rules Proxy Microservice Proxy Microservice Ingress API Management east - west north - south mTLS OSM The service proxy acts as a policy enforcer. 1 2
  • 18. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ 1. Broken Object Level Authorization 2. Broken User Authentication 3. Excessive Data Exposure 4. Lack of Resources & Rate Limiting 5. Broken Function Level Authorization 6. Mass Assignment 7. Security Misconfiguration 8. Injection 9. Improper Assets Management 10.Insufficient Logging & Monitoring Building secure APIs: OWASP top 10 API OWASP Top 10 1. Create function-level authorization (JWT) 2. MFA, TLS 3. Limit objects and properties exposed via an API 4. Validate object size and rates 5. Ensure proper role and rights assignments 6. Validate objects; filter out properties 7. Restrict raw error exposure, tighten CORS, ensure TLS, implement HSTS, use TLC Cipher String cheet sheet; setup security headers 8. Ensure validation 9. ? 10.Implement an Azure cloud defender Vulnerability Mitigation
  • 19. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Availability • Use edge caching to prevent unnecessary load on the backend • Configure CORS for edge functions • Use logging for observability (console.log) Confidentiality • Use Vercel security features to restrict access to environments • Vercel Authentication to restrict preview (all, needs an account) • Password protection (Enterprise or $150/mon.) • Shareable links (all, needs an account) • Do not store secrets in code Integrity • Use TLS 1.2 or 1.3 First line of defense with Vercel Edge
  • 20. Automating security testing and validation Enforcing security with DevSecOps
  • 21. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Securing Docker and Kubernetes
  • 22. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ “Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language. The use of domain specific languages (DSLs) has become a standard practice for enterprise application development.” Need for more • Governance • Security specialists • Platforms and tools • Templates • Infrastructure Avoid polyglot applications from security perspective. Polyglot applications security
  • 23. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Resourcing your teams based on your strategy Team 1 Team 2 Team 3 Upskilled Team + Agile + Cheaper ? Ability to Scale ? Commitment Team 1 Team 2 Team 3 ++ Center of Excellence ? Customer Focused ? Prioritisation ? Resourcing ? Speed of Turnaround Platform Team - Security champions and evangelists Team 1 Team 2 Team 3 + Customer Focus + Resources secured ? Distributed Knowledge ? Communication ? Overlapping Experiences Shared Resources
  • 24. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Infrastructure as Code (IaC) is the management of infrastructure (networks, virtual machines, load balancers, and connection topology) in a descriptive model, using the same versioning as DevOps team uses for source code. Infrastructure as code for automation • Automates environment setup • Allows repeatability and templatization • Enables infrastructure versioning • Promotes Site Reliability Engineering (SRE) • Promotes standardization, security, consistency, and stability
  • 25. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ • No single test is sufficient • Provide test coverage across units, technology, and system layers • Move the cheaper tests closer to the foundation to reduce the feedback cycle • Container tests should be done at three levels o IDE by developers o During the build process before deploying to the registry o Periodic scans for registry images • Manual testing is good at finding outlier defects, while automated delivers greater testing coverage to identify common weaknesses. Design test automation based on cost IAST/R ASP Performanc e testing Network Scanning DTA Container Scanning Integration testing SCA Dependency Scanning SAST/Unit Testing Cost per test DAST Penetration testing, bug bounties, peer reviews
  • 27. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Composable SaaS security reference Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Implement an Azure Front Door, use TLS, encrypt data in store (Azure SQL default) Turn off, secure password storage, check system for rogue peripherals. Restrict traffic with VLANs, private links. Implement an Azure Front Door; use Load Balancer to send bad requests to dead end, redundancy and traffic offloading. Implement an Azure Front Door Implement an Azure Front Door, setup encryption Implement an Azure Front Door; disable access when employee leaves; set auto-lock in OS, log out of systems, use JWT for authorization, use zero trust with a service mesh pattern, OWASP top Ten Web and API, CWE top 25, Vercel security
  • 28. • Please insert a background image that suits your presentation, or leave it empty. © 2022 Sitecore User Group Conference Europe and its respective speakers. All rights reserved. https://europe.sugcon.events/ Most security breaches happen from inside of organizations.
  • 29. I am a proud community member! Please contact me on the following handles: sitecorechat.slack.com twitter sitecore.stackexchange.com
  • 31. I am a proud community member! Please contact me on the following handles: sitecorechat.slack.com twitter
  • 32. • Layer 1 – port protection of your laptop and hardware; access to systems, login expiration • Layer 2 - VLANS • Layer 3 – Front Door • Layer 4 – Front Door • Layer 5 – Front Door • Layer 6 – Front Door • Layer 7 – Front Door (bot protection, https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/afds-overview https://learn.microsoft.com/en-us/azure/frontdoor/web-application-firewall https://learn.microsoft.com/en-us/azure/frontdoor/front-door-ddos https://learn.microsoft.com/en-us/azure/frontdoor/front-door-ddos https://learn.microsoft.com/en-us/azure/frontdoor/origin-security?tabs=app-service- functions&pivots=front-door-standard-premium
  • 33. DevSecOps Sitecore pipeline 33 Pull Image Developers Image Repository Container Registry System Admins DevOps Engineers Commit Listen Manage Manage Store image DEV SVT PRD DEV Deployment SVT Deployment PRD Deployment Container Image Pull Gitlab CI Gitlab CD Gitlab DAST Selenium UI Tests Unit Tests Quality and SAST Scans Upload Run Run Upload Run Page Speed Tests Load Tests Run Run
  • 34. Or emphasize with this bold headline if you want..
  • 35. ” – Quote somebody on their brilliance as everybody in our community deserves a best friend! Akshay Sura
  • 36. • Proin magna enim, hendrerit nec justo non, gravida efficitur leo. Phasellus pharetra gravida turpis, sed laoreet dui efficitur nec. Nulla auctor mi et ligula dignissim, ac consectetur ligula rutrum. • Sed accumsan mollis consectetur. In et sem eget orci placerat condimentum. Nunc tortor sapien, pellentesque eu aliquet vel, gravida eu lorem. • These are actually valid points. At some point, add proper content too!
  • 37. Each presentation must end with the following three slides. As the conference is a from-the-community-for-the- community event we find it important that you share your social channels you feel comfortable with, mainly the Slack channel and Twitter. Also, we couldn’t organize this event without our community sponsors. Please leave them at the end of your slide deck. Please don’t change the following 3 slides
  • 40. Team changes and upskilling QA Quality Assurance and testing Developer Front and backend development. DevOps Engineer Release processes and automation DevOps Security Champion Security automation Monitoring Notifications Development Security Champion Code Scanning & Reviews QA Security Champion Dynamic application testing Security Bridge Team Specialized Security Personnel Software, DevOps, Forensic Analysis, etc. CISO Security program development. Security Team Development Team