SlideShare a Scribd company logo
DESIGN HIGHLY AVAILABLE
AND SECURE SYSTEM
I’M ANDI PANGERAN
@ANDI_PANGERAN
CYBERCODING.WORDPRESS.COM
SOFTWARE CRAFTMANSHIP @ JURNAL.ID
AGENDA
 Security Concepts and Principles
 Common Security Threats and Vulnerabilities
 Security Tactics
 Availability Concept & Principles
 Availability Tactics
SECURITY CONCEPT & PRINCIPLES
SECURITY OVERVIEW
Protecting the
secrecy and
privacy of
information
Ensuring that
system and
data can be
accessed when
Protecting the “accuracy”
of information and data
from improper modification
SECURITY CONCEPT AND PRINCIPLES
Threats Vulnerability
Exploit
Risk
Leads to
Asset
Remaining Risk
Control
Mitigate
Remaining Risk
THREATS AND VULNERABILITIES
OWASP top 10 for 2013
THREATS AND VULNERABILITIES
OWASP top 10 for 2013
THREATS AND VULNERABILITIES
OWASP top 10 for 2013
THREATS AND VULNERABILITIES
Other common threats
• Improper Error Handling
• Environments mismatch problems (ex : dev vs prod)
• Denial Of Service (DOS) and DDOS
• Man-In-The-Middle (MITM)
• Policy, Audit, and Logging Failures
SECURITY CONTROLS
• Authentication
• Something you know
• Something you have
• Something you are
• Authorization & Access Control
• Separation of duties & Limit exposure
• Least Privilege (non root account)
• Maintain data confidentiality at transit, storage and archival
• Maintain data and process integrity
• Secure the weakest link
CRYPTOGRAPHIC TECHNIQUES
• Encoding
• Encryption
• Hashing
• Obfuscation
SYMMETRIC ENCRYPTION
• Stream cipher :
encrypt all stream bit / bit, ex: RC4
• Block cipher
Encrypt block per block, ex: AES, Blowfish, Twofish, DES
Type of block cipher modes : ECB, CBC, CFB OFB, CTR
SYMMETRIC ENCRYPTION
SYMMETRIC ENCRYPTION
ASYMMETRIC ENCRYPTION
Diffie–Hellman key
exchange
DIGITAL CERTIFICATES
Electronic identification and/or encryption system developed for use
over internet.
Typically they contain:
• Certificate holder public key
• Information about the organization to which certificate was issued
• Information about the Certificate Authority (CA), including CA
digital signature
• Date of certificate issued or expired
• Serial number of certificate
OVERVIEW OF SECURE SOCKET LAYER
WEB SECURITY BEST PRACTICES
• Use stateful firewalls
• Keep track of all web tier transmission and protocol sessions.
• Put webservers in a demilitarized zone (DMZ)
• Drop non-HTTP packets
• Configure to allow HTTP and HTTPS only
• Use HTTP POST rather than HTTP GET
• Destroy HTTP sessions upon logout and set timeout
• Validate request data
• Good error reporting
• Do not expose remote system level and naming service specific
exceptions.
WEB SECURITY BEST PRACTICES
• Secure the pipe
• Make sure that the session and data exchanged between server –
client are confidential and tamper proof
• Secure administrative communications
• Make sure all admin task are done using encrypted communication
ex: SSH
WANT MORE ABOUT SECURITY ?
O'Reilly - Introduction to Secure Software
AVAILABILITY CONCEPT & PRINCIPLES
NOT AVAILABLE YET
AVAILABILITY OVERVIEW
Business
Production
Availability
AVAILABILITY OVERVIEW
System
down
System
up
System
downMEAN TIME TO RECOVER
(MTTR)
MEAN TIME
TOFAILURE
(MTTF)
MEAN TIME BETWEEN FAILURE (MTBF)
A = MTBF / (MTBF + MTTR)
TO CALCULATE DOWNTIME :
Downtime per year (min) = (1 – Uptime Ratio) x 365 x 24 x 60
AVAILABILITY OVERVIEW
HOW CAN I MAXIMIZE AVAILIBILITY ?
Maximize MTTF
HOW CAN I MAXIMIZE AVAILIBILITY ?
https://www.slideshare.net/ufried/resilience-reloaded-more-resilience-patterns
WHATS THE PROBLEM ?
Software will fail..
Hardware will fail..
Human will fail..
Time is failure to (low network) :p
DON’T TRY TO AVOID FAILURE,
EMBRACE THEM
AVAILABILITY TACTICS
https://www.slideshare.net/ufried/resilience-reloaded-more-resilience-patterns
https://www.slideshare.net/ufried/resilience-reloaded-more-resilience-patterns
BULKHEADING
Don’t put all your eggs in one basket, and protect your basket from one to another.
Image : Taken from reactive design pattern book – Rolland kuhn
CIRCUIT BREAKER
Image : Taken from reactive design pattern book – Rolland kuhn
WANT MORE ABOUT AVAILIBILITY ?
https://www.slideshare.net/ufried/resilience-reloaded-more-
resilience-patterns
https://www.slideshare.net/ufried/resilient-functional-service-
design
https://www.slideshare.net/ufried/watch-your-communication
PIZZA ?

More Related Content

PDF
The Next Generation Security
PPTX
ISO 27k talk for django meet up
PPTX
Security Kung Fu: SIEM Solutions
PPTX
Content Analysis System and Advanced Threat Protection
PDF
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
PPTX
Segurança da era do ssl everywhere
PPTX
Security Kung Fu: Firewall Logs
PDF
Top 5 Data Security Strategies in QA
The Next Generation Security
ISO 27k talk for django meet up
Security Kung Fu: SIEM Solutions
Content Analysis System and Advanced Threat Protection
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
Segurança da era do ssl everywhere
Security Kung Fu: Firewall Logs
Top 5 Data Security Strategies in QA

What's hot (17)

PDF
HeartBleed Bug, by Megat Muazzam [APNIC 38]
PPSX
SonicWALL Advanced Features
PPTX
Security Kung Fu: Active Directory Changes
PDF
17 palo alto threat prevention concept
PDF
Future of Web Security Opened up by CSP
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PPTX
Preventing Today's Malware
PDF
Intelligent Cybersecurity for the Real World
PDF
Novosco ransomware webinar presentation
PPTX
Add Security Testing Tools to Your Delivery Pipeline
KEY
mod_security introduction at study2study #3
PDF
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
PPTX
Developing A Cyber Security Incident Response Program
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
PPT
Physical data security & security of data over network by team netnepz- A...
PDF
Sprint Secure Portfolio
PPTX
Idc security roadshow may2015 Adrian Aron
HeartBleed Bug, by Megat Muazzam [APNIC 38]
SonicWALL Advanced Features
Security Kung Fu: Active Directory Changes
17 palo alto threat prevention concept
Future of Web Security Opened up by CSP
Ransomware: Why Are Backup Vendors Trying To Scare You?
Preventing Today's Malware
Intelligent Cybersecurity for the Real World
Novosco ransomware webinar presentation
Add Security Testing Tools to Your Delivery Pipeline
mod_security introduction at study2study #3
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Developing A Cyber Security Incident Response Program
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Physical data security & security of data over network by team netnepz- A...
Sprint Secure Portfolio
Idc security roadshow may2015 Adrian Aron
Ad

Similar to Design highly available and secure system (20)

PDF
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
PPTX
Six steps for securing offshore development
DOCX
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PPTX
Understanding Database Encryption & Protecting Against the Insider Threat wit...
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PPTX
00. introduction to app sec v3
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PPTX
Azure Fundamentals Part 3
 
PPT
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
PPTX
Cyber security fundamentals & ethical hacking
PPTX
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
PDF
Securing and Managing the Oracle HTTP Server - White Paper
PDF
Cloud the path forward
PPTX
Starting your Career in Information Security
PDF
Making Security Approachable for Developers and Operators
PDF
Identiverse 2018 nathanael coffing
PDF
How the Cloud Shifts the Burden of Security to Development
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
Six steps for securing offshore development
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Social Distance Your IBM i from Cybersecurity Risk
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
00. introduction to app sec v3
Unit -3.pptx cloud Security unit -3 notes
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Azure Fundamentals Part 3
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
Cyber security fundamentals & ethical hacking
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Securing and Managing the Oracle HTTP Server - White Paper
Cloud the path forward
Starting your Career in Information Security
Making Security Approachable for Developers and Operators
Identiverse 2018 nathanael coffing
How the Cloud Shifts the Burden of Security to Development
Ad

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Getting Started with Data Integration: FME Form 101
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
Getting Started with Data Integration: FME Form 101
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Assigned Numbers - 2025 - Bluetooth® Document
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf

Design highly available and secure system