SlideShare a Scribd company logo
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Enterprise security in the era of containers and
Kubernetes
• Karthikeyan VK
• Twitter: @Karthik3030
• Blogs.karthikeyanvk.in
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is a Container?
Windows Containers provide operating system virtualization that allows
multiple isolated applications to be run on a single system.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Difference between Containers and VMs
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Difference between Containers and VMs
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Why Containers ?
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Why Containers?
• Transforming existing applications into cloud Is Hard!
• Building Hybrid Cloud applications Is Hard!
• Think about building solutions that should be deployed in Azure, AWS
& GCP at the same time
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Docker ?
• Docker is an open platform for developing, shipping, and running
applications
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
DEMO !!!
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Kubernetes ?
• Kubernetes is an open-source system for automating deployment, scaling,
and management of containerized applications.
• Orchestrator for Containers
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Kubectl ?
• Kubectl is a command line interface for running commands against
Kubernetes clusters.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Pod?
• A Kubernetes pod is a group of containers that are deployed together on
the same host.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Kubernetes Service?
• A Kubernetes Service is an abstraction which defines a logical set of Pods and a
policy by which to access them
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
What is Kubernetes Replica Sets?
• Replica Set ensures how many replica of pod should be running. It can be
considered as a replacement of replication controller.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
DEMO !!!
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Why Enterprise Level Security
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Enterprise Level Security Features in AKS
• Private Load Balancer
• Virtual Network
• L4 & L7 Capabilities
• Control Egress Traffic
• Control Ingress Traffic
• East-West Traffic Policies
• Whitelisting IP Addresses
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
L4 & L7 Security
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
L4 & L7 Security
• L4 denotes TCP/UDP layer, where the network is flooded with packets of
unnecessary data to enable Denial of Service Attack
• L7 Denotes Application layer, where the API call is bombarded with unnecessary
GET, POST.
• Can be mitigated using application gateway or web application firewall of azure.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Ingress Traffic
• Traffic originating from external network
• Limit the traffic with ingress policies
• Controlled by setting which domain or which ip is allowed inside the network
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Ingress Traffic
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Egress Traffic
• Traffic originating from internal network to Internet
• Limit the traffic with 3rd party firewall
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
East-west Traffic
• Traffic between containers
• Think of one pod or container has been exploited.
• East-West traffic control is very important.
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
Whitelisting IP Addresses
• Control who should access
• Http routing is disabled by default
• Helps in avoiding unnecessary access and port scanning
Twitter: @Karthik3030
Blogs.karthikeyanvk.in
DEMO !!!

More Related Content

PDF
Elasticsearch on Azure
PDF
Advanced Event Brokers
PPTX
Advanced Event Brokers
PPTX
Application Load Balancer and Network Load Balancer end-to-end IPv6 support
PPTX
Running Azure PaaS Anywhere using Kubernetes
PDF
Elasticsearch on Azure
PDF
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
PPTX
Sumo Logic AWS CloudTrail Application
Elasticsearch on Azure
Advanced Event Brokers
Advanced Event Brokers
Application Load Balancer and Network Load Balancer end-to-end IPv6 support
Running Azure PaaS Anywhere using Kubernetes
Elasticsearch on Azure
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
Sumo Logic AWS CloudTrail Application

What's hot (18)

PPTX
Microsoft Ignite 2019 - API management for microservices in a hybrid and mult...
PDF
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
PPTX
IglooConf 2020 - API management for microservices in a hybrid and multi-cloud...
PPTX
The user s identities
PPTX
Shift Left - How to improve your security with checkov before it’s going to p...
PPTX
Amazon CloudWatch RUM for monitoring applications’ client-side performance
PPTX
modeveast 2012 Appcelerator Alloy & Cloud Services Presentation
PDF
Building serverless integration solutions with Microsoft Azure
PPTX
Gearing up for mobile push notifications
PPTX
Using cloud providers in new light for the brave new API-first world of devel...
PDF
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
PPTX
Bevywise IoT Platform
PPTX
Amazon Virtual Private Cloud (VPC) customers can now create IPv6-only subnets...
PPTX
Axway's Journey to the Cloud
PDF
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
PPTX
Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...
PDF
WSO2Con ASIA 2016: Understanding the WSO2 API Management Platform
PPTX
Azure Logic Apps
Microsoft Ignite 2019 - API management for microservices in a hybrid and mult...
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
IglooConf 2020 - API management for microservices in a hybrid and multi-cloud...
The user s identities
Shift Left - How to improve your security with checkov before it’s going to p...
Amazon CloudWatch RUM for monitoring applications’ client-side performance
modeveast 2012 Appcelerator Alloy & Cloud Services Presentation
Building serverless integration solutions with Microsoft Azure
Gearing up for mobile push notifications
Using cloud providers in new light for the brave new API-first world of devel...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
Bevywise IoT Platform
Amazon Virtual Private Cloud (VPC) customers can now create IPv6-only subnets...
Axway's Journey to the Cloud
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...
WSO2Con ASIA 2016: Understanding the WSO2 API Management Platform
Azure Logic Apps
Ad

Similar to Enterprise security kubernetes (20)

PPTX
Azure container instances
PPTX
Azure devspaces
PDF
ADDO 2020: "The past, present, and future of cloud native API gateways"
PDF
Attacking and Defending Kubernetes - Nithin Jois
PDF
Service Discovery: From Classic to VPC
PPTX
Nodeless and serverless kubernetes
PDF
SFSCON23 - Andrea Alfonsi - Kubernetes for IoT
PDF
Breaking The Cloud Kill Chain
PDF
GOTOpia 2020: "The Past, Present, and Future of Cloud Native API Gateways"
PDF
From Containerized Application to Secure and Scaling With Kubernetes
PDF
Top 10 real life WebSocket use cases & experiences - Devoxx UK 2015
PDF
IT Camp 19: Top Azure security fails and how to avoid them
PDF
Serverless Security: Doing Security in 100 milliseconds
PDF
One Kubernetes to rule them all (ZEUS 2019 Keynote)
PDF
Monolithic to microservices migration journey with spring cloud
PDF
Monolithic to Microservices Migration Journey of iyzico with Spring Cloud
PDF
Bringing Docker to the Cloud
PDF
Technical Introduction to Hyperledger Fabric v1.0
PDF
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
PPTX
Manage your kubernetes cluster with cluster api, azure and git ops
Azure container instances
Azure devspaces
ADDO 2020: "The past, present, and future of cloud native API gateways"
Attacking and Defending Kubernetes - Nithin Jois
Service Discovery: From Classic to VPC
Nodeless and serverless kubernetes
SFSCON23 - Andrea Alfonsi - Kubernetes for IoT
Breaking The Cloud Kill Chain
GOTOpia 2020: "The Past, Present, and Future of Cloud Native API Gateways"
From Containerized Application to Secure and Scaling With Kubernetes
Top 10 real life WebSocket use cases & experiences - Devoxx UK 2015
IT Camp 19: Top Azure security fails and how to avoid them
Serverless Security: Doing Security in 100 milliseconds
One Kubernetes to rule them all (ZEUS 2019 Keynote)
Monolithic to microservices migration journey with spring cloud
Monolithic to Microservices Migration Journey of iyzico with Spring Cloud
Bringing Docker to the Cloud
Technical Introduction to Hyperledger Fabric v1.0
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
Manage your kubernetes cluster with cluster api, azure and git ops
Ad

More from Karthikeyan VK (20)

PPTX
GCD ChatGPT.pptx
PPTX
DataScience-101
PPTX
How to become a Software Architect.pptx
PPTX
Blockchain workshop 101
PPTX
Event Streaming Architecture - Deep Dive
PPTX
Anti patterns
PPTX
Tips & Tricks to build software architecture document
PPTX
How to double your productivity as a developer
PPTX
How to be an expert in Debugging .Net Applications
PPTX
Cloud Design Patterns
PPTX
Pillars of great Azure Architecture
PPTX
Monolithic to Microservices - Handson
PPTX
Chat bot LUIS
PPTX
Cloud design pattern using azure
PPTX
Save Azure Cost
PPTX
Learning graphql .Net
PPTX
Azure Event Grid
PPTX
Machine Learning Basics using Azure ML
PPTX
Convert monolithic .Net Applications to microservices With Principles
PPTX
Cognitive Intelligence using azure search
GCD ChatGPT.pptx
DataScience-101
How to become a Software Architect.pptx
Blockchain workshop 101
Event Streaming Architecture - Deep Dive
Anti patterns
Tips & Tricks to build software architecture document
How to double your productivity as a developer
How to be an expert in Debugging .Net Applications
Cloud Design Patterns
Pillars of great Azure Architecture
Monolithic to Microservices - Handson
Chat bot LUIS
Cloud design pattern using azure
Save Azure Cost
Learning graphql .Net
Azure Event Grid
Machine Learning Basics using Azure ML
Convert monolithic .Net Applications to microservices With Principles
Cognitive Intelligence using azure search

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Transform Your Business with a Software ERP System
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
top salesforce developer skills in 2025.pdf
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
assetexplorer- product-overview - presentation
PPTX
history of c programming in notes for students .pptx
PDF
System and Network Administration Chapter 2
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Reimagine Home Health with the Power of Agentic AI​
VVF-Customer-Presentation2025-Ver1.9.pptx
Transform Your Business with a Software ERP System
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
top salesforce developer skills in 2025.pdf
Upgrade and Innovation Strategies for SAP ERP Customers
2025 Textile ERP Trends: SAP, Odoo & Oracle
Operating system designcfffgfgggggggvggggggggg
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
L1 - Introduction to python Backend.pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
wealthsignaloriginal-com-DS-text-... (1).pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Which alternative to Crystal Reports is best for small or large businesses.pdf
PTS Company Brochure 2025 (1).pdf.......
assetexplorer- product-overview - presentation
history of c programming in notes for students .pptx
System and Network Administration Chapter 2
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Design an Analysis of Algorithms II-SECS-1021-03
Reimagine Home Health with the Power of Agentic AI​

Enterprise security kubernetes

Editor's Notes

  • #2: https://www.facebook.com/aspiringDotnetArchitects
  • #5: Containers : Containers include the application and all of its dependencies– but share the kernel with other containers, running as isolated processes in user space on the host operating system. Containers are not tied to any specific infrastructure: they run on any computer, on any infrastructure and in any cloud. Virtual Machines : Virtual Machines include the application, the necessary binaries and libraries, and an entire operating system.