SlideShare a Scribd company logo
Copyright © 2019 HashiCorp
Securing Cloud Native
Communication:
From End User to Service
Daniel Bryant
Product Architect, Datawire
Nic Jackson
Developer Advocate, HashiCorp
Traditional IT approach to
network security
tl;dr
▪ Security is everyone’s responsibility
▪ Application modernisation leads to heterogeneous infra/networks
▪ Defence in depth is vital: edge/service comms security is one part of this
▪ Mind the gap(s)!
▪ All security must have good UX / DevEx
Who are we?
Nic Jackson
Developer Advocate, HashiCorp
@sheriffjackson
Daniel Bryant
Product Architect, Datawire
@danielbryantuk
Security is everyone’s responsibility
So, we don’t want to scare you, but...
214
Records containing personal data are exploited every second
So, we don’t want to scare you, but...
$3,860,000
Is the average cost of a data breach
So, we don’t want to scare you, but...
$350,00,000
Is the cost of a breach containing over 50 million records
So, we don’t want to scare you, but...
72%
Increase in attacks between 2017 and 2018
Gemalto Breach Level Index:
https://breachlevelindex.com/
IBM Cost of a Data Breach Study:
https://www.ibm.com/security/data-breach
Application modernisation: Gift and curse
Defence in depth
Defence in depth is vital
▪ Harden and scan infrastructure
▪ Scan code, dependencies, packages
▪ Encrypt data at rest
▪ Encrypt data in transit
▪ Principle of least privilege
▪ Harden and scan infrastructure
▪ Scan code, dependencies, packages
▪ Encrypt data at rest
▪ Encrypt data in transit
▪ Principle of least privilege
Defence in depth is vital
Exploring end-to-end communication
Exploring end-to-end communication
Exploring end-to-end communication
API Gateway: Edge proxy, ingress, ADC...
▪ Exposes internal services to end-users (via multiple domains)
▪ Encapsulates backends: k8s, VMs, bare metal etc
▪ TLS termination: enforcing minimum TLS version
▪ End-user authentication/authorization (add token/JWT for propagation)
▪ Rate limiting: DDoS protection, etc
Ambassador config
Friends don’t let friends manually issue
TLS certs...
Quick Aside: CDNs
https://www.securitee.org/files/cloudpiercer_ccs2015.pdf
http://bit.ly/2JA0UAh
Exploring end-to-end communication
Service Mesh: Proxy mesh, Fabric model...
▪ Exposes internal services to internal consumers
▪ Encapsulates service infra: across k8s, VMs, bare metal etc
▪ mTLS: service identity and traffic encryption
▪ ACLs and intentions: infra/service identity-based access
▪ Enforce metadata (but apps need to propagate headers/tokens)
Exploring end-to-end communication
Consul config
[London HashiCorp] Securing Cloud Native Communication: From end user to service"
Exploring end-to-end communication
Identity and network segmentation
© 2019 HashiCorp 28
Bypass the perimeter by attacking services
© 2019 HashiCorp 29
We need internal network isolation
© 2019 HashiCorp 30
Network segmentation
© 2019 HashiCorp 31
Service segmentation
© 2019 HashiCorp 32
Problem: Dynamic environments...
© 2019 HashiCorp 33
Network / Service segmentation with
intention-based security
Exploring end-to-end communication
Consul config
Copyright © 2019 HashiCorp
Demo
Conclusion
▪ Security is everyone’s responsibility
▪ Application modernisation leads to heterogeneous infra/networks
▪ Defence in depth is vital: edge/service comms security is one part of this
▪ Mind the gap(s)!
▪ All security must have good UX / DevEx
References
▪ https://www.infoq.com/articles/api-gateway-service-mesh-app-modernisation/
▪ https://www.getambassador.io/resources/strategies-incremental-migration/
▪ https://www.getambassador.io/user-guide/consul-connect-ambassador/
▪ https://www.getambassador.io/user-guide/consul/
▪ https://www.consul.io/docs/platform/k8s/ambassador.html
▪ https://www.hashicorp.com/blog/hashicorp-consul-supports-microsoft-s-new-service-mesh-framework
Experiment in an Instruqt sandbox: https://instruqt.com/hashicorp/tracks/sock-shop-tutorial
Code examples: https://github.com/emojify-app
Copyright © 2019 HashiCorp
Questions?
Copyright © 2019 HashiCorp
Thanks!
@sheriffjackson | @danielbryantuk
Copyright © 2019 HashiCorp
Bonus
Service Mesh: Three Pillars
▪ Observability
– “Golden signals”: latency, errors, traffic, saturation (USE, RED)
– Both global and service-to-service
▪ Reliability
– Abstracting health checks, retries, circuit breakers etc.
– Providing sane default to protect system
▪ Security
– Authn/z propagation, mTLS, network segmentation
Security must have good UX
Exploring end-to-end communication
https://blog.envoyproxy.io/service-mesh-data-plane-vs-control-plane-2774e720f7fc
Control planes and data planes
Data plane
Control plane
Control planes: Differing use cases
▪ North-south
– Unknown / untrusted clients
– Limited exposure of services (Mapping)
– Centralised ops ingress defaults + decentralised product team cfg
▪ East-west
– Dynamic service information update required (multiple sources)
– Identity required for all services (mTLS + ACLs)
– “Sane” internal defaults + decentralised dev cfg
Ambassador + Consul

More Related Content

PPTX
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Bridgera enterprise IoT Software Solutions
PPTX
Blockchain Defined Perimeter for Cloud Security
PPTX
Cyberthreats: causes, consequences, prevention
PDF
Notorious 9 ciso platform moshe
PDF
Embracing the Millennial Tsunami
PPTX
Emerging techonology presentation bw
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Bridgera enterprise IoT Software Solutions
Blockchain Defined Perimeter for Cloud Security
Cyberthreats: causes, consequences, prevention
Notorious 9 ciso platform moshe
Embracing the Millennial Tsunami
Emerging techonology presentation bw

What's hot (20)

PDF
CWIN17 Rome / A holostic cybersecurity
PDF
Don't let wireless_detour_your_pci_compliance
PDF
Rapid Prototyping for IoT
PDF
Vodafone Internet of Things
PDF
Iot tunisia forum 2017 security, confidentiality and privacy in iot
PDF
CWIN17 New-York / Transforming enterprises with blockchain
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PDF
IEEE P1931.1, The Roof Computing
PPTX
SmartSecuritySolution_for_IoT
PDF
Cybersecurity | Meta Networks: Software defined perimeter platform
PPTX
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
PDF
Cert Overview
PPTX
security and privacy-Internet of things
PDF
The role of edge computing
DOCX
It practical file
PDF
Attacks and Risks in Wireless Network Security
PDF
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
PDF
Odoo iot box integration
PPTX
Development of Jisc security programme - Networkshop44
PDF
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
CWIN17 Rome / A holostic cybersecurity
Don't let wireless_detour_your_pci_compliance
Rapid Prototyping for IoT
Vodafone Internet of Things
Iot tunisia forum 2017 security, confidentiality and privacy in iot
CWIN17 New-York / Transforming enterprises with blockchain
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
IEEE P1931.1, The Roof Computing
SmartSecuritySolution_for_IoT
Cybersecurity | Meta Networks: Software defined perimeter platform
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Cert Overview
security and privacy-Internet of things
The role of edge computing
It practical file
Attacks and Risks in Wireless Network Security
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
Odoo iot box integration
Development of Jisc security programme - Networkshop44
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Ad

Similar to [London HashiCorp] Securing Cloud Native Communication: From end user to service" (20)

PPTX
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
PPTX
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
PPTX
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
PDF
Conférence ARBOR ACSS 2018
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PPTX
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...
PDF
Block Armour Zero Trust Cybersecurity Mesh for Telcom
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
Communications Technologies
PPTX
Top 5 predictions webinar
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
PDF
Atelier Technique ARBOR NETWORKS ACSS 2018
PDF
Cisco connect winnipeg 2018 simply powerful networking with meraki
PDF
Secure Your Sky_ Mastering Cloud Web Security.pdf
PPTX
Overcoming the Challenges of Architecting for the Cloud
PDF
Introduction to cloud security
PDF
TEUNO Summit - Presentaciones
PPTX
The why of a cloud ppt
PDF
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
PPTX
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
KubeCon EU 2019 "Securing Cloud Native Communication: From End User to Service"
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...
Conférence ARBOR ACSS 2018
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Communications Technologies
Top 5 predictions webinar
Cloud technology to ensure the protection of fundamental methods and use of i...
Atelier Technique ARBOR NETWORKS ACSS 2018
Cisco connect winnipeg 2018 simply powerful networking with meraki
Secure Your Sky_ Mastering Cloud Web Security.pdf
Overcoming the Challenges of Architecting for the Cloud
Introduction to cloud security
TEUNO Summit - Presentaciones
The why of a cloud ppt
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Ad

More from Daniel Bryant (20)

PDF
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
PDF
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PDF
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
PDF
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
PPTX
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
PDF
Fall 22: "From Kubernetes to PaaS to... err, what's next"
PDF
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
PDF
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
PDF
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
PDF
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
PDF
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
PDF
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
PDF
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
PDF
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
PDF
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
PDF
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
PDF
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
PDF
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
PDF
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
PPTX
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...
ITKonekt 2023: The Busy Platform Engineers Guide to API Gateways
CraftConf 2023 "Microservice Testing Techniques: Mocks vs Service Virtualizat...
PlatformCon 23: "The Busy Platform Engineers Guide to API Gateways"
Java Meetup 23: 'Debugging Microservices "Remocally" in Kubernetes with Telep...
DevRelCon 2022: "Is Product Led Growth (PLG) the “DevOps” of the DevRel World"
Fall 22: "From Kubernetes to PaaS to... err, what's next"
Building Microservice Systems Without Cooking Your Laptop: Going “Remocal” wi...
KubeCrash 22: Debugging Microservices "Remocally" in Kubernetes with Telepres...
JAX London 22: Debugging Microservices "Remocally" in Kubernetes with Telepre...
CloudBuilders 2022: "The Past, Present, and Future of Cloud Native API Gateways"
KubeCon EU 2022: From Kubernetes to PaaS to Err What's Next
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
DevXDay KubeCon NA 2021: "From Kubernetes to PaaS to Developer Control Planes"
JAX London 2021: Jumpstart Your Cloud Native Development: An Overview of Prac...
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
Canadian CNCF: "Emissary-ingress 101: An introduction to the CNCF incubation-...
MJC 2021: "Debugging Java Microservices Running on Kubernetes with Telepresence"
LJC 4/21"Easy Debugging of Java Microservices Running on Kubernetes with Tele...
GOTOpia 2/2021 "Cloud Native Development Without the Toil: An Overview of Pra...
HashiCorp Webinar: "Getting started with Ambassador and Consul on Kubernetes ...

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
Assigned Numbers - 2025 - Bluetooth® Document
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf

[London HashiCorp] Securing Cloud Native Communication: From end user to service"