SlideShare a Scribd company logo
Copyright © 2019 HashiCorp
Securing Cloud Native
Communication:
From End User to Service
Daniel Bryant
Product Architect, Datawire
Nic Jackson
Developer Advocate, HashiCorp
tl;dr
▪ We’re seeing an increase in application modernisation/hybrid platforms
▪ Decoupling apps and infrastructure is key: incrementally and securely
▪ All security must have good UX / DevEx
▪ Defence in depth is vital -- network / service security is one part of this
▪ Mind the gap(s)!
Who are we?
Nic Jackson
Developer Advocate, HashiCorp
@sheriffjackson
Daniel Bryant
Product Architect, Datawire
@danielbryantuk
So, we don’t want to scare you, but...
So, we don’t want to scare you, but...
214
Records containing personal data are exploited every second
So, we don’t want to scare you, but...
2.2%
Of compromised records are protected by encryption
So, we don’t want to scare you, but...
65%
Of cases are linked to identity theft
So, we don’t want to scare you, but...
$3,860,000
Is the average cost of a data breach
So, we don’t want to scare you, but...
$350,00,000
Is the cost of a breach containing over 50 million records
So, we don’t want to scare you, but...
72%
Increase in attacks between 2017 and 2018
Gemalto Breach Level Index:
https://breachlevelindex.com/
IBM Cost of a Data Breach Study:
https://www.ibm.com/security/data-breach
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
We’re assuming that you have
secured your data at rest…
...and hardened compute
But what about data in motion?
Are your comms vulnerable?
And what about during application modernisation?
Network heterogeneity typically increases:
- Private DC, cloud, k8s...
https://www.rgoarchitects.com/Files/fallacies.pdf
Exploring end-to-end communication
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
API Gateway: Edge proxy, ingress, ADC...
▪ Exposes internal services to end-users (via multiple domains)
▪ Encapsulates backends (k8s, VMs, bare metal etc)
▪ TLS termination (enforcing minimum TLS version)
▪ End-user authentication/authorization
▪ Rate limiting (DDoS protection, etc)
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
Service Mesh: Proxy mesh, Fabric model...
▪ Exposes internal services to internal consumers
▪ Encapsulates service infra (across k8s, VMs, bare metal etc)
▪ mTLS: service identity and traffic encryption
▪ ACLs and intentions: who can do what, and to whom
▪ Implements cross-functional concerns (out-of-process)
Service Mesh: Three Pillars
▪ Observability
– “Golden signals”: latency, errors, traffic, saturation (USE, RED)
– Both global and service-to-service
▪ Reliability
– Abstracting health checks, retries, circuit breakers etc.
– Providing sane default to protect system
▪ Security
– Authn/z propagation, mTLS, network segmentation
Exploring end-to-end communication
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
© 2019 HashiCorp 24
Bypass the perimeter by attacking services
© 2019 HashiCorp 25
We need internal network isolation
© 2019 HashiCorp 26
Network segmentation
© 2019 HashiCorp 27
Service segmentation
© 2019 HashiCorp 28
Problem: Dynamic environments...
© 2019 HashiCorp 29
Network / Service segmentation with
intention-based security
Exploring end-to-end communication
https://blog.envoyproxy.io/service-mesh-data-plane-vs-control-plane-2774e720f7fc
Control planes and data planes
Data plane
Control plane
Control planes: Differing use cases
▪ North-south
– Unknown / untrusted clients
– Limited exposure of services (Mapping)
– Centralised ops ingress defaults + decentralised product team cfg
▪ East-west
– Dynamic service information update required (multiple sources)
– Identity required for all services (mTLS + ACLs)
– “Sane” internal defaults + decentralised dev cfg
Ambassador + Consul
Copyright © 2019 HashiCorp
Demo
Conclusion
▪ We’re seeing an increase in application modernisation/hybrid platforms
▪ Decoupling apps and infrastructure is key: incrementally and securely
▪ All security must have good UX / DevEx
▪ Defence in depth is vital -- network / service security is one part of this
▪ Mind the gap(s)!
References
▪ Context:
– https://www.infoq.com/articles/api-gateway-service-mesh-app-modernisation/
▪ Reference:
– https://www.getambassador.io/user-guide/consul-connect-ambassador/
– https://www.getambassador.io/user-guide/consul/
– https://www.consul.io/docs/platform/k8s/ambassador.html
Experiment in an Instruqt sandbox: https://instruqt.com/hashicorp/tracks/sock-shop-tutorial
Code examples: https://github.com/emojify-app
Copyright © 2019 HashiCorp
Questions?
Copyright © 2019 HashiCorp
Thanks!
@sheriffjackson | @danielbryantuk

More Related Content

PDF
Securing Databases with Dynamic Credentials and HashiCorp Vault
PDF
Post quantum cryptography in vault (hashi talks 2020)
PDF
Infrastructure-as-code: bridging the gap between Devs and Ops
PPTX
How ddd, cqrs and event sourcing constitute the architecture of the future
PDF
CloudFlare DDoS attacks 101: what are they and how to protect your site?
PPTX
Meetup Microservices Commandments
PDF
Introduction to Virtual Kubelet
PPTX
DEVNET-1140 InterCloud Mapreduce and Spark Workload Migration and Sharing: Fi...
Securing Databases with Dynamic Credentials and HashiCorp Vault
Post quantum cryptography in vault (hashi talks 2020)
Infrastructure-as-code: bridging the gap between Devs and Ops
How ddd, cqrs and event sourcing constitute the architecture of the future
CloudFlare DDoS attacks 101: what are they and how to protect your site?
Meetup Microservices Commandments
Introduction to Virtual Kubelet
DEVNET-1140 InterCloud Mapreduce and Spark Workload Migration and Sharing: Fi...

What's hot (20)

PDF
Cloud-native applications with Java and Kubernetes - Yehor Volkov
PDF
初探 OpenTelemetry - 蒐集遙測數據的新標準
PPTX
MongoDB World 2018: MongoDB for High Volume Time Series Data Streams
PDF
MongoDB World 2018: Transactions and Durability: Putting the “D” in ACID
PDF
DDS tutorial with connector
PDF
Cloud for Kubernetes : Session3
PDF
MongoDB World 2018: Building a New Transactional Model
PPTX
Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy
PDF
Flowchain: A case study on building a Blockchain for the IoT
PDF
Nats meetup sf 20150826
PDF
Introduction and Overview of OpenStack for IaaS
PDF
Openstack 101
PDF
Google Cloud Platform Kubernetes Workshop IYTE
PPTX
Open stack in sina
PDF
IT Minds Mindblown Networking Event 2016
PDF
Ci/CD - Stop wasting time, Automate your deployments
PDF
Deploying .NET services with Disnix
PPTX
DevOps with Kubernetes and Helm - Jenkins World Edition
PPTX
Orchestration & provisioning
PDF
Let's not rewrite it all
Cloud-native applications with Java and Kubernetes - Yehor Volkov
初探 OpenTelemetry - 蒐集遙測數據的新標準
MongoDB World 2018: MongoDB for High Volume Time Series Data Streams
MongoDB World 2018: Transactions and Durability: Putting the “D” in ACID
DDS tutorial with connector
Cloud for Kubernetes : Session3
MongoDB World 2018: Building a New Transactional Model
Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy
Flowchain: A case study on building a Blockchain for the IoT
Nats meetup sf 20150826
Introduction and Overview of OpenStack for IaaS
Openstack 101
Google Cloud Platform Kubernetes Workshop IYTE
Open stack in sina
IT Minds Mindblown Networking Event 2016
Ci/CD - Stop wasting time, Automate your deployments
Deploying .NET services with Disnix
DevOps with Kubernetes and Helm - Jenkins World Edition
Orchestration & provisioning
Let's not rewrite it all
Ad

Similar to KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service" (20)

PPTX
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
PPTX
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
PPTX
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
PPTX
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PDF
Challenges In Modern Application
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
Red team-view-gaps-in-the-serverless-application-attack-surface
PDF
Docker microservices and the service mesh
PDF
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
PPTX
Role of edge gateways in relation to service mesh adoption
PDF
Making Security Approachable for Developers and Operators
PDF
Presentation of my paper in the IEEE Symposium on Computer and Communications...
PPTX
Service Mesh in the Real World [Raleigh NC Meetup]
PDF
IoT Security and Privacy Considerations
PDF
Move Auth, Policy, and Resilience to the Platform
PDF
Cybersecurity Issues in Emerging Technologies 1st Edition Leandros Maglaras (...
PDF
Application security as crucial to the modern distributed trust model
PDF
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
PPTX
Iot(security)
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
Security and Compliance for Enterprise Cloud Infrastructure
Challenges In Modern Application
Emerging Trends in Cybersecurity by Amar Prusty
Red team-view-gaps-in-the-serverless-application-attack-surface
Docker microservices and the service mesh
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
Role of edge gateways in relation to service mesh adoption
Making Security Approachable for Developers and Operators
Presentation of my paper in the IEEE Symposium on Computer and Communications...
Service Mesh in the Real World [Raleigh NC Meetup]
IoT Security and Privacy Considerations
Move Auth, Policy, and Resilience to the Platform
Cybersecurity Issues in Emerging Technologies 1st Edition Leandros Maglaras (...
Application security as crucial to the modern distributed trust model
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Iot(security)
Ad

More from Daniel Bryant (20)

PDF
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
PDF
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PDF
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
PDF
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
PPTX
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
PDF
Fall 22: "From Kubernetes to PaaS to... err, what's next"
PDF
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
PDF
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
PDF
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
PDF
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
PDF
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
PDF
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
PDF
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
PDF
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
PDF
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
PDF
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
PDF
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
PDF
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
PDF
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
PPTX
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
Fall 22: "From Kubernetes to PaaS to... err, what's next"
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
gpt5_lecture_notes_comprehensive_20250812015547.pdf
MYSQL Presentation for SQL database connectivity

KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"

  • 1. Copyright © 2019 HashiCorp Securing Cloud Native Communication: From End User to Service Daniel Bryant Product Architect, Datawire Nic Jackson Developer Advocate, HashiCorp
  • 2. tl;dr ▪ We’re seeing an increase in application modernisation/hybrid platforms ▪ Decoupling apps and infrastructure is key: incrementally and securely ▪ All security must have good UX / DevEx ▪ Defence in depth is vital -- network / service security is one part of this ▪ Mind the gap(s)!
  • 3. Who are we? Nic Jackson Developer Advocate, HashiCorp @sheriffjackson Daniel Bryant Product Architect, Datawire @danielbryantuk
  • 4. So, we don’t want to scare you, but...
  • 5. So, we don’t want to scare you, but... 214 Records containing personal data are exploited every second
  • 6. So, we don’t want to scare you, but... 2.2% Of compromised records are protected by encryption
  • 7. So, we don’t want to scare you, but... 65% Of cases are linked to identity theft
  • 8. So, we don’t want to scare you, but... $3,860,000 Is the average cost of a data breach
  • 9. So, we don’t want to scare you, but... $350,00,000 Is the cost of a breach containing over 50 million records
  • 10. So, we don’t want to scare you, but... 72% Increase in attacks between 2017 and 2018 Gemalto Breach Level Index: https://breachlevelindex.com/ IBM Cost of a Data Breach Study: https://www.ibm.com/security/data-breach
  • 12. We’re assuming that you have secured your data at rest… ...and hardened compute
  • 13. But what about data in motion? Are your comms vulnerable?
  • 14. And what about during application modernisation? Network heterogeneity typically increases: - Private DC, cloud, k8s...
  • 18. API Gateway: Edge proxy, ingress, ADC... ▪ Exposes internal services to end-users (via multiple domains) ▪ Encapsulates backends (k8s, VMs, bare metal etc) ▪ TLS termination (enforcing minimum TLS version) ▪ End-user authentication/authorization ▪ Rate limiting (DDoS protection, etc)
  • 20. Service Mesh: Proxy mesh, Fabric model... ▪ Exposes internal services to internal consumers ▪ Encapsulates service infra (across k8s, VMs, bare metal etc) ▪ mTLS: service identity and traffic encryption ▪ ACLs and intentions: who can do what, and to whom ▪ Implements cross-functional concerns (out-of-process)
  • 21. Service Mesh: Three Pillars ▪ Observability – “Golden signals”: latency, errors, traffic, saturation (USE, RED) – Both global and service-to-service ▪ Reliability – Abstracting health checks, retries, circuit breakers etc. – Providing sane default to protect system ▪ Security – Authn/z propagation, mTLS, network segmentation
  • 24. © 2019 HashiCorp 24 Bypass the perimeter by attacking services
  • 25. © 2019 HashiCorp 25 We need internal network isolation
  • 26. © 2019 HashiCorp 26 Network segmentation
  • 27. © 2019 HashiCorp 27 Service segmentation
  • 28. © 2019 HashiCorp 28 Problem: Dynamic environments...
  • 29. © 2019 HashiCorp 29 Network / Service segmentation with intention-based security
  • 32. Control planes: Differing use cases ▪ North-south – Unknown / untrusted clients – Limited exposure of services (Mapping) – Centralised ops ingress defaults + decentralised product team cfg ▪ East-west – Dynamic service information update required (multiple sources) – Identity required for all services (mTLS + ACLs) – “Sane” internal defaults + decentralised dev cfg
  • 34. Copyright © 2019 HashiCorp Demo
  • 35. Conclusion ▪ We’re seeing an increase in application modernisation/hybrid platforms ▪ Decoupling apps and infrastructure is key: incrementally and securely ▪ All security must have good UX / DevEx ▪ Defence in depth is vital -- network / service security is one part of this ▪ Mind the gap(s)!
  • 36. References ▪ Context: – https://www.infoq.com/articles/api-gateway-service-mesh-app-modernisation/ ▪ Reference: – https://www.getambassador.io/user-guide/consul-connect-ambassador/ – https://www.getambassador.io/user-guide/consul/ – https://www.consul.io/docs/platform/k8s/ambassador.html Experiment in an Instruqt sandbox: https://instruqt.com/hashicorp/tracks/sock-shop-tutorial Code examples: https://github.com/emojify-app
  • 37. Copyright © 2019 HashiCorp Questions?
  • 38. Copyright © 2019 HashiCorp Thanks! @sheriffjackson | @danielbryantuk