Securing Cloud-native Workloads
with Aporeto and InfluxDB
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with InfluxData
Stronger Security.
Simpler Operations.
Zero Touch for Developers.
What DevSecOps want from Cloud-native Security
3. One consistent model
(span sites and clouds)
4. No changes to source code
(don’t slow us down)
6. Codify Security
(Integrate into my CI/CD toolset)
2. Protect application components
(assume zero internal or external trust)
1. No IP address range gymnastics
(Over 50% of rules could be obsolete)
7. Clear security visibility
(real-time & historical for debug)
8. Zero touch end-end encryption
(applied with a security rule)
5. Auto-generate Security Policies
(observe running application)
Uniquely identify each application component, use enforcers, and auto-generated security policies
Host Host
Root CA Security Policies
How Aporeto Works
Management
Why a Time Series Database
Database Requirements:
Secure history of events
• Events type:
○ Process//Container events
○ Flow // Connection events
Nginx
container
External
client
Database
process
Container up event (t=1s)
Container down event (t=4s)
Container up event (t=5s)
Process up event (t=1s)
Allow flow event (t= 1.5s)
Allow flow event (t=3s)
Allow flow event (t= 1s)
Deny flow event (t= 3s)
• Cassandra
• MongoDB
• HBase
Metrics Database Selection Criteria
• Time-series with fast
ingestion rate
• High Availability
• Easy to Use
• High Availability
model
• Performance
• Low Complexity
• Licensing Model
• Extensibility
• As a service and on
prem
Database Requirements What We Looked At Why InfluxDB
Let’s Have a Beer
https://github.com/aporeto-inc/apobeer.git
Web Server
Pick a Beer
Price a Beer
Beer
Database
Buy a Beer Block Diagram
Random
Number
NGINX
Containers
ZONE 1 ZONE 3ZONE 2
Redis
Browser
Constant
Traffic
Python Script
Internet
Price
Database
Redis
Web Server
Pick a Beer
Price a Beer
Beer
Database
Price
Database
IP Address based Security Does not Work
Numerable Unintended Access Routes – Zero Visibility
Hard to Figure Out which IP-Address Rules Need to Be Changed
Random
Number
NGINX
Containers Redis
ZONE 1 ZONE 3ZONE 2
Redis
Browser
Constant
Traffic
Python Script
Internet
Web Server
Pick a Beer
Price a Beer
Beer
Database
Price
Database
Fine-grained security for each application component, wherever it runs
Stronger, Always Current, No Unintended Access Paths
Easy to Administer, Zero Changes to Code
Random
Number
NGINX
Containers Redis
Redis
Browser
Constant
Traffic
Python Script
Private
Pod
Container Container
Pod
Container Container
NetworkPolicy NetworkPolicy
Network Plugin
Linux iptables or BPF
Node
Kubernetes Network Access Control
Bernard
Feature Kubernetes
Kubernetes with
Aporeto
Compatible with Kubernetes NetworkPolicy resources Y Y
Control ingress & egress traffic Y Y
Control Traffic based on TCP/IP addresses and ports Y Y
Control traffic based on strong component identities N Y
Easily request data encryption between pods N Y
Automatically generate editable security policies N Y
Uses a highly scalable Kubernetes network plugin N Y
Easiest way to set up and keep security settings current N Y
Real-time and historical visibility of security & alerts N Y
Span Kubernetes and non-Kubernetes Environments N Y
Consistent security across Kubernetes Clusters N Y
Better Kubernetes Network Access Control with Aporeto
Summary: InfluxDB & Aporeto
InfluxDB Aporeto
• Secure history of all
flows and workload
events
• High Availability cluster
• Performance
• Low Complexity
• Licensing Model
• Extensibility
• Based on Identities of Application Components
• Enforced by Aporeto Enforcer + Access Policies
• One consistent security model
• Fine-grained security for individual services
• Access based on multiple factors beyond User-ID
• Easy to administer and keep current
• Unrivaled security posture visibility
Private
Thank You
aporeto.com

More Related Content

PDF
Your Resolution for 2018: Five Principles For Securing DevOps
PDF
Practical DevSecOps - Arief Karfianto
PPTX
Implementing Fast IT Deploying Applications at the Pace of Innovation
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
PDF
Extending GitHub to Meet your Open Source Policy
PDF
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
PPT
Bio IT World 2015 - DevOps Security and Transparency
Your Resolution for 2018: Five Principles For Securing DevOps
Practical DevSecOps - Arief Karfianto
Implementing Fast IT Deploying Applications at the Pace of Innovation
AWS live hack: Atlassian + Snyk OSS on AWS
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
Extending GitHub to Meet your Open Source Policy
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
Bio IT World 2015 - DevOps Security and Transparency

What's hot (20)

PDF
API Security - Everything You Need to Know To Protect Your APIs
PPTX
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PPTX
Deep Visibility: Logging From Distributed Microservices
PDF
SACON - Immutable architecture (Nilanjan De)
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PDF
DevSecOps, The Good, Bad, and Ugly
PDF
PIACERE - DevSecOps Automated
PPTX
José Vila - ¿Otro parche más? No, por favor. [rooted2018]
PDF
Keynote: Puppet camp compliance
PPTX
Are your DevOps and Security teams friends or foes?
PDF
Check Point and Accenture Webinar
PDF
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PDF
DevSecOps Everything You Need To Know
PPTX
Chefdevseccon2015
PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PDF
DevSecOps: Putting the Sec into the DevOps
API Security - Everything You Need to Know To Protect Your APIs
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
A New View of Your Application Security Program with Snyk and ThreadFix
Deep Visibility: Logging From Distributed Microservices
SACON - Immutable architecture (Nilanjan De)
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
DevSecOps, The Good, Bad, and Ugly
PIACERE - DevSecOps Automated
José Vila - ¿Otro parche más? No, por favor. [rooted2018]
Keynote: Puppet camp compliance
Are your DevOps and Security teams friends or foes?
Check Point and Accenture Webinar
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
DevSecOps Everything You Need To Know
Chefdevseccon2015
Connect Ops and Security with Flexible Web App and API Protection
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
DevSecOps: Putting the Sec into the DevOps
Ad

Similar to How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with InfluxData (20)

PDF
Network Security and Visibility through NetFlow
PDF
Bridging The Cloud and Application Security Gaps Meetup 15102024
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Flight East 2018 Presentation–Black Duck at Docusign
PPTX
Netflix Cloud Architecture and Open Source
PDF
Zephyr-Overview-20230124.pdf
PDF
NGINX DevSecOps Workshop
PDF
Cncf checkov and bridgecrew
PPTX
Cisco connect winnipeg 2018 a look at network assurance in dna center
PPTX
Securing broker less publish subscribe systems using identity-based encryption
PPTX
Data as a_service_1.1_anup
PPTX
Data center webinar_v2_1
PPTX
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
PPTX
Código Seguro
PDF
Cilium: Seattle Kubernetes MeetUp Dec 2017
PPTX
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
PDF
Using Cisco pxGrid for Security Platform Integration: a deep dive
PDF
Secure Application Development in the Age of Continuous Delivery
Network Security and Visibility through NetFlow
Bridging The Cloud and Application Security Gaps Meetup 15102024
CyberCrime in the Cloud and How to defend Yourself
Flight East 2018 Presentation–Black Duck at Docusign
Netflix Cloud Architecture and Open Source
Zephyr-Overview-20230124.pdf
NGINX DevSecOps Workshop
Cncf checkov and bridgecrew
Cisco connect winnipeg 2018 a look at network assurance in dna center
Securing broker less publish subscribe systems using identity-based encryption
Data as a_service_1.1_anup
Data center webinar_v2_1
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Código Seguro
Cilium: Seattle Kubernetes MeetUp Dec 2017
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
Using Cisco pxGrid for Security Platform Integration: a deep dive
Secure Application Development in the Age of Continuous Delivery
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PPTX
most interesting chapter in the world ppt
PDF
Guide to Food Delivery App Development.pdf
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
E-Commerce Website Development Companyin india
PPTX
Python is a high-level, interpreted programming language
PPTX
CNN LeNet5 Architecture: Neural Networks
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PPTX
GSA Content Generator Crack (2025 Latest)
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Microsoft Office 365 Crack Download Free
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PDF
AI Guide for Business Growth - Arna Softech
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
Workplace Software and Skills - OpenStax
most interesting chapter in the world ppt
Guide to Food Delivery App Development.pdf
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
E-Commerce Website Development Companyin india
Python is a high-level, interpreted programming language
CNN LeNet5 Architecture: Neural Networks
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Practical Indispensable Project Management Tips for Delivering Successful Exp...
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
GSA Content Generator Crack (2025 Latest)
iTop VPN Crack Latest Version Full Key 2025
Microsoft Office 365 Crack Download Free
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Airline CRS | Airline CRS Systems | CRS System
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
AI Guide for Business Growth - Arna Softech
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
Workplace Software and Skills - OpenStax

How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with InfluxData

  • 4. What DevSecOps want from Cloud-native Security 3. One consistent model (span sites and clouds) 4. No changes to source code (don’t slow us down) 6. Codify Security (Integrate into my CI/CD toolset) 2. Protect application components (assume zero internal or external trust) 1. No IP address range gymnastics (Over 50% of rules could be obsolete) 7. Clear security visibility (real-time & historical for debug) 8. Zero touch end-end encryption (applied with a security rule) 5. Auto-generate Security Policies (observe running application)
  • 5. Uniquely identify each application component, use enforcers, and auto-generated security policies Host Host Root CA Security Policies How Aporeto Works Management
  • 6. Why a Time Series Database Database Requirements: Secure history of events • Events type: ○ Process//Container events ○ Flow // Connection events Nginx container External client Database process Container up event (t=1s) Container down event (t=4s) Container up event (t=5s) Process up event (t=1s) Allow flow event (t= 1.5s) Allow flow event (t=3s) Allow flow event (t= 1s) Deny flow event (t= 3s)
  • 7. • Cassandra • MongoDB • HBase Metrics Database Selection Criteria • Time-series with fast ingestion rate • High Availability • Easy to Use • High Availability model • Performance • Low Complexity • Licensing Model • Extensibility • As a service and on prem Database Requirements What We Looked At Why InfluxDB
  • 8. Let’s Have a Beer https://github.com/aporeto-inc/apobeer.git
  • 9. Web Server Pick a Beer Price a Beer Beer Database Buy a Beer Block Diagram Random Number NGINX Containers ZONE 1 ZONE 3ZONE 2 Redis Browser Constant Traffic Python Script Internet Price Database Redis
  • 10. Web Server Pick a Beer Price a Beer Beer Database Price Database IP Address based Security Does not Work Numerable Unintended Access Routes – Zero Visibility Hard to Figure Out which IP-Address Rules Need to Be Changed Random Number NGINX Containers Redis ZONE 1 ZONE 3ZONE 2 Redis Browser Constant Traffic Python Script Internet
  • 11. Web Server Pick a Beer Price a Beer Beer Database Price Database Fine-grained security for each application component, wherever it runs Stronger, Always Current, No Unintended Access Paths Easy to Administer, Zero Changes to Code Random Number NGINX Containers Redis Redis Browser Constant Traffic Python Script Private
  • 12. Pod Container Container Pod Container Container NetworkPolicy NetworkPolicy Network Plugin Linux iptables or BPF Node Kubernetes Network Access Control Bernard
  • 13. Feature Kubernetes Kubernetes with Aporeto Compatible with Kubernetes NetworkPolicy resources Y Y Control ingress & egress traffic Y Y Control Traffic based on TCP/IP addresses and ports Y Y Control traffic based on strong component identities N Y Easily request data encryption between pods N Y Automatically generate editable security policies N Y Uses a highly scalable Kubernetes network plugin N Y Easiest way to set up and keep security settings current N Y Real-time and historical visibility of security & alerts N Y Span Kubernetes and non-Kubernetes Environments N Y Consistent security across Kubernetes Clusters N Y Better Kubernetes Network Access Control with Aporeto
  • 14. Summary: InfluxDB & Aporeto InfluxDB Aporeto • Secure history of all flows and workload events • High Availability cluster • Performance • Low Complexity • Licensing Model • Extensibility • Based on Identities of Application Components • Enforced by Aporeto Enforcer + Access Policies • One consistent security model • Fine-grained security for individual services • Access based on multiple factors beyond User-ID • Easy to administer and keep current • Unrivaled security posture visibility Private