Securing Microservice Architectures Laura Bell M239.

53

Transcript of Securing Microservice Architectures Laura Bell M239.

Page 1: Securing Microservice Architectures Laura Bell M239.
Page 2: Securing Microservice Architectures Laura Bell M239.

Securing Microservice ArchitecturesLaura Bell M239

Page 3: Securing Microservice Architectures Laura Bell M239.
Page 4: Securing Microservice Architectures Laura Bell M239.

Modern Architecture Security Series

Page 5: Securing Microservice Architectures Laura Bell M239.

caution:fast paced field ahead watch for out of date content

Page 6: Securing Microservice Architectures Laura Bell M239.

In this talkMicroservice Fundamentals

Some important points that are worth refreshing

PreventionAvoid common vulnerabilities and avoid mistakes

DetectionPrepare for survival and response

Page 7: Securing Microservice Architectures Laura Bell M239.

Microservice fundamentals

Page 8: Securing Microservice Architectures Laura Bell M239.
Page 9: Securing Microservice Architectures Laura Bell M239.
Page 10: Securing Microservice Architectures Laura Bell M239.

to create and deploy new apps fast apps that automatically scale up to handle millions of users and scale down again to be able to make changesto have this be done by smaller teams

Page 11: Securing Microservice Architectures Laura Bell M239.

usually 5 to 30 lines of code

many are 100 or so lines some are around 1,000 lines

Page 12: Securing Microservice Architectures Laura Bell M239.

Integrity

Availability

Confidentiality

Page 13: Securing Microservice Architectures Laura Bell M239.

SpoofingTampering

RepudiationInformation Disclosure

Denial of ServiceEscalation of Privilege

Page 14: Securing Microservice Architectures Laura Bell M239.

Prevention

Page 15: Securing Microservice Architectures Laura Bell M239.

Service decomposition

Page 16: Securing Microservice Architectures Laura Bell M239.

size and complexity shouldn’t vary

Page 17: Securing Microservice Architectures Laura Bell M239.

service dependency

cascading failure and fragility

Page 18: Securing Microservice Architectures Laura Bell M239.

scaling and resource exhaustion

Page 19: Securing Microservice Architectures Laura Bell M239.

Orchestration layer attacks

Page 20: Securing Microservice Architectures Laura Bell M239.

attackers like simplewe are lazy

Page 21: Securing Microservice Architectures Laura Bell M239.

one component to rule them all?

Page 22: Securing Microservice Architectures Laura Bell M239.

Choose appropriate techRestrict accessMonitor aggressivelyConfigure wellChallenge assumptionsTest regularly

Page 23: Securing Microservice Architectures Laura Bell M239.

Identity and access management

Page 24: Securing Microservice Architectures Laura Bell M239.

principle of least privilege

the lowest set of permissions and accesses required to do your job

Page 25: Securing Microservice Architectures Laura Bell M239.

Role based controlsrequire well defined roles

Page 26: Securing Microservice Architectures Laura Bell M239.

AuditAuditAutomate and alertAuditAuditAudit

Page 27: Securing Microservice Architectures Laura Bell M239.

Cloud Platform as a Servicemay make you more securemature groups and role assistance

Page 28: Securing Microservice Architectures Laura Bell M239.

Immutable architectures matter in microservice security

Page 29: Securing Microservice Architectures Laura Bell M239.

Auditable host configurations

are a good thing(but you might not be the

right person to audit them)

Page 30: Securing Microservice Architectures Laura Bell M239.

Avoids configuration creep(including those changes made by an attacker)

Page 31: Securing Microservice Architectures Laura Bell M239.

Attacker accesses become hard to persist

Page 32: Securing Microservice Architectures Laura Bell M239.

Heterogeneous language and technology spaces

Page 33: Securing Microservice Architectures Laura Bell M239.
Page 34: Securing Microservice Architectures Laura Bell M239.

Choose the right tools for the job you are doing

Page 35: Securing Microservice Architectures Laura Bell M239.

not all technologies have mature libraries, frameworks and documentation

Page 36: Securing Microservice Architectures Laura Bell M239.

vulnerability management

can be challenging inmicroservicearchitectures

Page 37: Securing Microservice Architectures Laura Bell M239.
Page 38: Securing Microservice Architectures Laura Bell M239.

Testing

Page 39: Securing Microservice Architectures Laura Bell M239.

ContinuousAutomated

SecurityTesting

(doesn’t require a specialist third party)

Page 40: Securing Microservice Architectures Laura Bell M239.

OWASP Zap Proxyhttps://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_P

roject

Gauntlt http://gauntlt.org/

BDD Securityhttp://www.continuumsecurity.net/bdd-intro.html

Page 41: Securing Microservice Architectures Laura Bell M239.

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash

Page 42: Securing Microservice Architectures Laura Bell M239.

Detection

Page 43: Securing Microservice Architectures Laura Bell M239.

Logging and monitoring

Page 44: Securing Microservice Architectures Laura Bell M239.

Log.All.The.Things

Page 45: Securing Microservice Architectures Laura Bell M239.

Logs must be stored in a:secure locationimmutable formataway from production

Page 46: Securing Microservice Architectures Laura Bell M239.

Poorly managed logs are a simple way to create

denial of service attacks

Page 47: Securing Microservice Architectures Laura Bell M239.

Watch your logslike actually, for real, not just when you’re debugging

Page 48: Securing Microservice Architectures Laura Bell M239.

Summary

Page 49: Securing Microservice Architectures Laura Bell M239.

TL;DRMicroservice Fundamentals

Some important points that are worth refreshing

PreventionAvoid common vulnerabilities and avoid mistakes

DetectionPrepare for survival and response

Page 50: Securing Microservice Architectures Laura Bell M239.

Related Ignite NZ Sessions

Security in a Container-based WorldFriday 11:55am

Find me later at… Hub Happy Hour Wed 5:30-6:30pm Hub Happy Hour Thu 5:30-6:30pm Closing drinks Fri 3:00-4:30pm

1

2

3

4

5

6

Page 51: Securing Microservice Architectures Laura Bell M239.

Resources

TechNet & MSDN FlashSubscribe to our fortnightly newsletter

http://aka.ms/technetnz http://aka.ms/msdnnz

http://aka.ms/ch9nz

Microsoft Virtual AcademyFree Online Learning

http://aka.ms/mva

Sessions on Demand

Page 52: Securing Microservice Architectures Laura Bell M239.

Complete your session evaluation now and be in to win!

Page 53: Securing Microservice Architectures Laura Bell M239.

© 2015 Microsoft Corporation. All rights reserved.Microsoft, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or

other countries.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.