SlideShare a Scribd company logo
Copyright © 2019 HashiCorp
Securing Cloud Native
Communication:
From End User to Service
Daniel Bryant
Product Architect, Datawire
“Traditional IT"
network security
tl;dr
▪ Security is everyone’s responsibility
▪ Application modernisation leads to heterogeneous infra/networks
▪ Defence in depth is vital: edge/service comms security is one part of this
▪ Mind the gap(s)!
▪ All security must have good UX / DevEx
Who are we?
Nic Jackson
Developer Advocate, HashiCorp
@sheriffjackson
Daniel Bryant
Product Architect, Datawire
@danielbryantuk
Security is everyone’s responsibility
So, we don’t want to scare you, but...
214
Records containing personal data are exploited every second
So, we don’t want to scare you, but...
$3,860,000
Is the average cost of a data breach
So, we don’t want to scare you, but...
$350,00,000
Is the cost of a breach containing over 50 million records
So, we don’t want to scare you, but...
72%
Increase in attacks between 2017 and 2018
Gemalto Breach Level Index:
https://breachlevelindex.com/
IBM Cost of a Data Breach Study:
https://www.ibm.com/security/data-breach
Application modernisation: Gift and curse
Defence in depth
Defence in depth is vital
▪ Harden and scan infrastructure
▪ Scan code, dependencies, packages
▪ Encrypt data at rest
▪ Encrypt data in transit
▪ Principle of least privilege
▪ Harden and scan infrastructure
▪ Scan code, dependencies, packages
▪ Encrypt data at rest
▪ Encrypt data in transit
▪ Principle of least privilege
Defence in depth is vital
Exploring end-to-end communication
Exploring end-to-end communication
Exploring end-to-end communication
API Gateway: Edge proxy, ingress, ADC...
▪ Exposes internal services to end-users (via multiple domains)
▪ Encapsulates backends: k8s, VMs, bare metal etc
▪ TLS termination: enforcing minimum TLS version
▪ End-user authentication/authorization (add token/JWT for propagation)
▪ Rate limiting: DDoS protection, etc
Ambassador config
API Gateway: Edge proxy, ingress, ADC...
▪ Exposes internal services to end-users (via multiple domains)
▪ Encapsulates backends: k8s, VMs, bare metal etc
▪ TLS termination: enforcing minimum TLS version
▪ End-user authentication/authorization (add token/JWT for propagation)
▪ Rate limiting: DDoS protection, etc
https://docs.cert-manager.io/en/latest/
https://www.getambassador.io/user-guide/cert-manager/
Quick Aside: CDNs
https://cloudpiercer.org/paper/CloudPiercer.pdf
https://bit.ly/2JA0UAh
Exploring end-to-end communication
Service Mesh: Proxy mesh, Fabric model...
▪ Exposes internal services to internal consumers
▪ Encapsulates service infra: across k8s, VMs, bare metal etc
▪ mTLS: service identity and traffic encryption
▪ ACLs and intentions: infra/service identity-based access
▪ Enforce metadata (but apps need to propagate headers/tokens)
Exploring end-to-end communication
Consul config
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
Exploring end-to-end communication
Identity and network segmentation
© 2019 HashiCorp 29
Bypass the perimeter by attacking services
© 2019 HashiCorp 30
We need internal network isolation
© 2019 HashiCorp 31
Network segmentation
© 2019 HashiCorp 32
Service segmentation
© 2019 HashiCorp 33
Problem: Dynamic environments...
© 2019 HashiCorp 34
Network / Service segmentation with
intention-based security
Exploring end-to-end communication
Consul config
Copyright © 2019 HashiCorp
Demo
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
Conclusion
▪ Security is everyone’s responsibility
▪ Application modernisation leads to heterogeneous infra/networks
▪ Defence in depth is vital: edge/service comms security is one part of this
▪ Mind the gap(s)!
▪ All security must have good UX / DevEx
References
▪ Context:
– https://www.infoq.com/articles/api-gateway-service-mesh-app-modernisation/
▪ Reference:
– https://www.getambassador.io/user-guide/consul-connect-ambassador/
– https://www.getambassador.io/user-guide/consul/
– https://www.consul.io/docs/platform/k8s/ambassador.html
– https://www.hashicorp.com/blog/hashicorp-consul-supports-microsoft-s-new-service-mesh-framework
Experiment in an Instruqt sandbox: https://instruqt.com/hashicorp/tracks/sock-shop-tutorial
Code examples: https://github.com/emojify-app
Copyright © 2019 HashiCorp
Questions?
Copyright © 2019 HashiCorp
Thanks!
@sheriffjackson | @danielbryantuk
Copyright © 2019 HashiCorp
Bonus
Service Mesh: Three Pillars
▪ Observability
– “Golden signals”: latency, errors, traffic, saturation (USE, RED)
– Both global and service-to-service
▪ Reliability
– Abstracting health checks, retries, circuit breakers etc.
– Providing sane default to protect system
▪ Security
– Authn/z propagation, mTLS, network segmentation
Security must have good UX
Exploring end-to-end communication
https://blog.envoyproxy.io/service-mesh-data-plane-vs-control-plane-2774e720f7fc
Control planes and data planes
Data plane
Control plane
Control planes: Differing use cases
▪ North-south
– Unknown / untrusted clients
– Limited exposure of services (Mapping)
– Centralised ops ingress defaults + decentralised product team cfg
▪ East-west
– Dynamic service information update required (multiple sources)
– Identity required for all services (mTLS + ACLs)
– “Sane” internal defaults + decentralised dev cfg
Ambassador + Consul

More Related Content

PPTX
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
PDF
Cyber security providers adopt strategic defences
PPTX
Blockchain in cyber security
DOCX
Cloud keybank privacy and owner authorization
PDF
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Cyber security providers adopt strategic defences
Blockchain in cyber security
Cloud keybank privacy and owner authorization
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM

What's hot (20)

PPTX
Aligning Risk with Growth - Cloud Security for startups
PDF
Infographic - Why DDoS Mitigation Solutions are important
PDF
Industrial Control Cybersecurity USA Cyber Senate conference
PDF
Conférence ARBOR ACSS 2018
PDF
2019 cou kolokotronis_nicholas - nicholas kolokotronis
PDF
DDoS Protection For Top 4 Industries | MazeBolt Technologies
RTF
Review of internet denial of service attack and defense mechanisms
PDF
Security Issues Of Virtual Private Networks: A Survey
PPTX
How could Smart Contracts affect the Insurance Industry?
PPTX
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
PPTX
Cloud security training, certified cloud security professional
PDF
What to look for in a hosted supplier
ODP
ChaosVPN 5mof
DOCX
Bound maxima as a traffic feature under d do s flood attacks.
PDF
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
PPTX
Cubeitz 1 Million Bit Encryption
PPTX
Cloud computing security
PPTX
FOSSCOM - Synaphea presentations
PPTX
OTTO - Internet2 TechX 2017
PPTX
What is a secure enterprise architecture roadmap?
Aligning Risk with Growth - Cloud Security for startups
Infographic - Why DDoS Mitigation Solutions are important
Industrial Control Cybersecurity USA Cyber Senate conference
Conférence ARBOR ACSS 2018
2019 cou kolokotronis_nicholas - nicholas kolokotronis
DDoS Protection For Top 4 Industries | MazeBolt Technologies
Review of internet denial of service attack and defense mechanisms
Security Issues Of Virtual Private Networks: A Survey
How could Smart Contracts affect the Insurance Industry?
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Cloud security training, certified cloud security professional
What to look for in a hosted supplier
ChaosVPN 5mof
Bound maxima as a traffic feature under d do s flood attacks.
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Cubeitz 1 Million Bit Encryption
Cloud computing security
FOSSCOM - Synaphea presentations
OTTO - Internet2 TechX 2017
What is a secure enterprise architecture roadmap?
Ad

Similar to [HashiConf EU] Securing Cloud Native Communication, From End User to Service (20)

PPTX
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
PPTX
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
PPTX
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
PPTX
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
PPTX
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...
PDF
Communications Technologies
PDF
Atelier Technique ARBOR NETWORKS ACSS 2018
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
PDF
Block Armour Zero Trust Cybersecurity Mesh for Telcom
PDF
Secure Your Sky_ Mastering Cloud Web Security.pdf
PPT
ICRTITCS-2012 Conference Publication
PPTX
Cyber security fundamentals (Cantonese)
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
PDF
Introduction to cloud security
PDF
Introduction of Cloudflare Solution for Mobile Payment
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PPTX
Cloud security for financial services
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...
Communications Technologies
Atelier Technique ARBOR NETWORKS ACSS 2018
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Secure Your Sky_ Mastering Cloud Web Security.pdf
ICRTITCS-2012 Conference Publication
Cyber security fundamentals (Cantonese)
Cloud technology to ensure the protection of fundamental methods and use of i...
Introduction to cloud security
Introduction of Cloudflare Solution for Mobile Payment
MIST Effective Masquerade Attack Detection in the Cloud
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Cloud security for financial services
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Ad

More from Daniel Bryant (20)

PDF
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
PDF
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PDF
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
PDF
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
PPTX
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
PDF
Fall 22: "From Kubernetes to PaaS to... err, what's next"
PDF
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
PDF
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
PDF
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
PDF
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
PDF
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
PDF
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
PDF
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
PDF
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
PDF
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
PDF
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
PDF
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
PDF
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
PDF
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
PPTX
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
Fall 22: "From Kubernetes to PaaS to... err, what's next"
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”

[HashiConf EU] Securing Cloud Native Communication, From End User to Service