securing microservice architectures laura bell m239

53

Upload: logan-greer

Post on 17-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Securing Microservice Architectures Laura Bell M239
Page 2: Securing Microservice Architectures Laura Bell M239

Securing Microservice ArchitecturesLaura Bell M239

Page 3: Securing Microservice Architectures Laura Bell M239
Page 4: Securing Microservice Architectures Laura Bell M239

Modern Architecture Security Series

Page 5: Securing Microservice Architectures Laura Bell M239

caution:fast paced field ahead watch for out of date content

Page 6: Securing Microservice Architectures Laura Bell M239

In this talkMicroservice Fundamentals

Some important points that are worth refreshing

PreventionAvoid common vulnerabilities and avoid mistakes

DetectionPrepare for survival and response

Page 7: Securing Microservice Architectures Laura Bell M239

Microservice fundamentals

Page 8: Securing Microservice Architectures Laura Bell M239
Page 9: Securing Microservice Architectures Laura Bell M239
Page 10: Securing Microservice Architectures Laura Bell M239

to create and deploy new apps fast apps that automatically scale up to handle millions of users and scale down again to be able to make changesto have this be done by smaller teams

Page 11: Securing Microservice Architectures Laura Bell M239

usually 5 to 30 lines of code

many are 100 or so lines some are around 1,000 lines

Page 12: Securing Microservice Architectures Laura Bell M239

Integrity

Availability

Confidentiality

Page 13: Securing Microservice Architectures Laura Bell M239

SpoofingTampering

RepudiationInformation Disclosure

Denial of ServiceEscalation of Privilege

Page 14: Securing Microservice Architectures Laura Bell M239

Prevention

Page 15: Securing Microservice Architectures Laura Bell M239

Service decomposition

Page 16: Securing Microservice Architectures Laura Bell M239

size and complexity shouldn’t vary

Page 17: Securing Microservice Architectures Laura Bell M239

service dependency

cascading failure and fragility

Page 18: Securing Microservice Architectures Laura Bell M239

scaling and resource exhaustion

Page 19: Securing Microservice Architectures Laura Bell M239

Orchestration layer attacks

Page 20: Securing Microservice Architectures Laura Bell M239

attackers like simplewe are lazy

Page 21: Securing Microservice Architectures Laura Bell M239

one component to rule them all?

Page 22: Securing Microservice Architectures Laura Bell M239

Choose appropriate techRestrict accessMonitor aggressivelyConfigure wellChallenge assumptionsTest regularly

Page 23: Securing Microservice Architectures Laura Bell M239

Identity and access management

Page 24: Securing Microservice Architectures Laura Bell M239

principle of least privilege

the lowest set of permissions and accesses required to do your job

Page 25: Securing Microservice Architectures Laura Bell M239

Role based controlsrequire well defined roles

Page 26: Securing Microservice Architectures Laura Bell M239

AuditAuditAutomate and alertAuditAuditAudit

Page 27: Securing Microservice Architectures Laura Bell M239

Cloud Platform as a Servicemay make you more securemature groups and role assistance

Page 28: Securing Microservice Architectures Laura Bell M239

Immutable architectures matter in microservice security

Page 29: Securing Microservice Architectures Laura Bell M239

Auditable host configurations

are a good thing(but you might not be the

right person to audit them)

Page 30: Securing Microservice Architectures Laura Bell M239

Avoids configuration creep(including those changes made by an attacker)

Page 31: Securing Microservice Architectures Laura Bell M239

Attacker accesses become hard to persist

Page 32: Securing Microservice Architectures Laura Bell M239

Heterogeneous language and technology spaces

Page 33: Securing Microservice Architectures Laura Bell M239
Page 34: Securing Microservice Architectures Laura Bell M239

Choose the right tools for the job you are doing

Page 35: Securing Microservice Architectures Laura Bell M239

not all technologies have mature libraries, frameworks and documentation

Page 36: Securing Microservice Architectures Laura Bell M239

vulnerability management

can be challenging inmicroservicearchitectures

Page 37: Securing Microservice Architectures Laura Bell M239
Page 38: Securing Microservice Architectures Laura Bell M239

Testing

Page 39: Securing Microservice Architectures Laura Bell M239

ContinuousAutomated

SecurityTesting

(doesn’t require a specialist third party)

Page 40: Securing Microservice Architectures Laura Bell M239

OWASP Zap Proxyhttps://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_P

roject

Gauntlt http://gauntlt.org/

BDD Securityhttp://www.continuumsecurity.net/bdd-intro.html

Page 41: Securing Microservice Architectures Laura Bell M239

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash

Page 42: Securing Microservice Architectures Laura Bell M239

Detection

Page 43: Securing Microservice Architectures Laura Bell M239

Logging and monitoring

Page 44: Securing Microservice Architectures Laura Bell M239

Log.All.The.Things

Page 45: Securing Microservice Architectures Laura Bell M239

Logs must be stored in a:secure locationimmutable formataway from production

Page 46: Securing Microservice Architectures Laura Bell M239

Poorly managed logs are a simple way to create

denial of service attacks

Page 47: Securing Microservice Architectures Laura Bell M239

Watch your logslike actually, for real, not just when you’re debugging

Page 48: Securing Microservice Architectures Laura Bell M239

Summary

Page 49: Securing Microservice Architectures Laura Bell M239

TL;DRMicroservice Fundamentals

Some important points that are worth refreshing

PreventionAvoid common vulnerabilities and avoid mistakes

DetectionPrepare for survival and response

Page 50: Securing Microservice Architectures Laura Bell M239

Related Ignite NZ Sessions

Security in a Container-based WorldFriday 11:55am

Find me later at… Hub Happy Hour Wed 5:30-6:30pm Hub Happy Hour Thu 5:30-6:30pm Closing drinks Fri 3:00-4:30pm

1

2

3

4

5

6

Page 51: Securing Microservice Architectures Laura Bell M239

Resources

TechNet & MSDN FlashSubscribe to our fortnightly newsletter

http://aka.ms/technetnz http://aka.ms/msdnnz

http://aka.ms/ch9nz

Microsoft Virtual AcademyFree Online Learning

http://aka.ms/mva

Sessions on Demand

Page 52: Securing Microservice Architectures Laura Bell M239

Complete your session evaluation now and be in to win!

Page 53: Securing Microservice Architectures Laura Bell M239

© 2015 Microsoft Corporation. All rights reserved.Microsoft, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or

other countries.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.