SlideShare a Scribd company logo
Microsegmentation – a
perfect fit for
Microservices security
Anthony Chow
@vCloudernBeer
http://cloudn1n3.blogspot.com
VMworld 2015 vBrownBag TechTalk
What is Microservices?
 It is an architecture for application
deployment
 Monolithic -> small and autonomous
 Deployed as separate service/entity
 Communicate via network calls
 A new trend to deploy application
 Agile
 Scalable
 High Availability
Monolithic vs Microservices (Star Wars
version)
Microservices companion
technologies
 DevOps – share same idea with
Microservices
 Agile
 Scalable
Microservices companion
technologies
 Docker – enables streamlined
Microservices architecture
 Minimum overhead
 Quick provisioning
Cloud Native Application
 Microservices part of the equation
along with DevOps and Linux
Containers for building Cloud Native
Application
 Application that takes full advantage of
the cloud platform.
 Agile
 Scalable
 High Availability
 Not a “One Size fit All” solution
Microservices – opens up
security risk
 Frequent and short life span
 Increase east-west traffic
 Services are not as isolated
What is Microsegmentation?
 A security feature
 Group entities within a network into one unit
and to apply rules/polices to control the traffic
in and out of the segment.
 Concept is not new
 Miro level not feasible to implement before
network virtualization
 Supporting principles
 Apply security policy to the smallest
granular level
 Zero trust security model
Major component for effective
Microsegmentation
 From an article by Scott Lowe
 Network independent policy definition
 Centralized policy repository
 Distributed policy enforcement
How does Microsegmentation fit
into Microservices security?
 Network independent definition
 Security rule tailor to Microservices
 Centralized policy repository and
distributed enforcement
 Able to adapt to dynamic and elastic
nature of Microservices
VMware - NSX
 An networking and security solution
 Security is supported inherently by its
architecture/design:
 Isolation
 Segmentation
 Segmentation with Advanced Services
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
Cisco – ACI (Application Centric
Infrastructure)
 Policy definition separating segments
from the broadcast domain
 “tags” or “attributes” that identify an
endpoint regardless of its IP address
 End-point Groups as
Microsegmenations
Micro segmentation – a perfect fit for microservices
A new chapter in Docker
networking - libnetwork
 Still under development
◦ Docker 1.7 (libnetwork rev 0.3)
◦ Docker 1.8 (libnetwork rev 1.0)
 Container Network Model
 A plugin model – able to take
advantage 3rd party well developed
networking and security infrastructure.
libnetwork- a pluggable
interface
 Container Network Model (CNM)
 Sandbox
 Endpoint
 Network

More Related Content

PDF
Microservices: Notes From The Field
PDF
Apcera: Agility and Security in Docker Delivery
PDF
Scaling towards a thousand micro services
PPTX
Cloud security what to expect (introduction to cloud security)
PPTX
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
PPTX
Architect secure cloud services.
PPTX
Transforming cloud security into an advantage
PDF
Open faas and linkerd
Microservices: Notes From The Field
Apcera: Agility and Security in Docker Delivery
Scaling towards a thousand micro services
Cloud security what to expect (introduction to cloud security)
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
Architect secure cloud services.
Transforming cloud security into an advantage
Open faas and linkerd

What's hot (18)

PPTX
What the auditor need to know about cloud computing
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PPTX
Modern Security Pain Points with Application Modernization - With Jermaine Ed...
PPTX
Best Practices to Secure Your Kubernetes Cluster
PPTX
Cloud of tomorrow
PPTX
Infrastructure Saturday - Level Up to DevSecOps
PPT
OpenStack - Security Professionals Information Exchange
PDF
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PDF
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
PPTX
Cloud security for financial services
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PDF
Launching a Highly-regulated Startup in the Public Cloud
PPT
Richard Chang Uvp
PDF
Cloud Native Security: New Approach for a New Reality
PDF
Evident io Continuous Compliance - Mar 2017
PPTX
Alert Logic: Realities of Security in the Cloud
PPTX
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
What the auditor need to know about cloud computing
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Modern Security Pain Points with Application Modernization - With Jermaine Ed...
Best Practices to Secure Your Kubernetes Cluster
Cloud of tomorrow
Infrastructure Saturday - Level Up to DevSecOps
OpenStack - Security Professionals Information Exchange
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
#ALSummit: Alert Logic & AWS - AWS Security Services
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
Cloud security for financial services
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Launching a Highly-regulated Startup in the Public Cloud
Richard Chang Uvp
Cloud Native Security: New Approach for a New Reality
Evident io Continuous Compliance - Mar 2017
Alert Logic: Realities of Security in the Cloud
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Ad

Viewers also liked (8)

PPTX
Secure rest api on microservices vws2016
PDF
Netflix Container Runtime - Titus - for Container Camp 2016
PPTX
Steel Industry
PDF
Industrial mkt segmentation
PPTX
Marketing Management - Industrial Market Segmentation OR B2B Market Segmentation
PDF
B2B Strategy Making and Planning
PPTX
Nested approach to the segmentation of B2B markets
PPT
Business to business marketing ppt
Secure rest api on microservices vws2016
Netflix Container Runtime - Titus - for Container Camp 2016
Steel Industry
Industrial mkt segmentation
Marketing Management - Industrial Market Segmentation OR B2B Market Segmentation
B2B Strategy Making and Planning
Nested approach to the segmentation of B2B markets
Business to business marketing ppt
Ad

Similar to Micro segmentation – a perfect fit for microservices (20)

PDF
Microservices in Practice
PPTX
Design and Deploy Secure Clouds for Financial Services Use Cases
PDF
Microservices: A Security Nightmare?
PDF
A Gentle introduction to microservices
PPTX
Containers & Microservices
PDF
Protecting microservices using secure design patterns 1.0
PDF
Monitoring & Securing Microservices in Kubernetes
PPTX
Containers and workload security an overview
PDF
Microservices Security: dos and don'ts
PDF
Building Microservices Software practics
PDF
Service Mesh Talk for CTO Forum
PDF
Securing Microservices in Containerized Environments
PDF
Microsegmentation for enterprise data centers
PDF
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
PPTX
NSX 9 Core Use Cases
PDF
VMware Developer-Ready Transformation
PPTX
M11 ACI Security.pptx
PDF
Andy Kennedy - Scottish VMUG April 2016
PDF
Kenzan: Architecting for Microservices
PDF
Production-Ready_Microservices_excerpt.pdf
Microservices in Practice
Design and Deploy Secure Clouds for Financial Services Use Cases
Microservices: A Security Nightmare?
A Gentle introduction to microservices
Containers & Microservices
Protecting microservices using secure design patterns 1.0
Monitoring & Securing Microservices in Kubernetes
Containers and workload security an overview
Microservices Security: dos and don'ts
Building Microservices Software practics
Service Mesh Talk for CTO Forum
Securing Microservices in Containerized Environments
Microsegmentation for enterprise data centers
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
NSX 9 Core Use Cases
VMware Developer-Ready Transformation
M11 ACI Security.pptx
Andy Kennedy - Scottish VMUG April 2016
Kenzan: Architecting for Microservices
Production-Ready_Microservices_excerpt.pdf

More from Anthony Chow (14)

PPTX
Build your own Blockchain with the right tool for your application
PPT
Container security
PPT
MQTT security
PPTX
Understanding gRPC Authentication Methods
PPTX
Api security with o auth2
PPTX
Container security
PPT
Container security
PPTX
V brownbag sept-14-2016
PPTX
Understanding the container landscape and it associated projects
PPTX
Getting over the barrier and start contributing to OpenStack
PPT
Introduction to go
PPTX
An overview of OpenStack for the VMware community
PPTX
VXLAN in the contemporary data center
PPT
What a Beginner Should Know About OpenStack
Build your own Blockchain with the right tool for your application
Container security
MQTT security
Understanding gRPC Authentication Methods
Api security with o auth2
Container security
Container security
V brownbag sept-14-2016
Understanding the container landscape and it associated projects
Getting over the barrier and start contributing to OpenStack
Introduction to go
An overview of OpenStack for the VMware community
VXLAN in the contemporary data center
What a Beginner Should Know About OpenStack

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity

Micro segmentation – a perfect fit for microservices

  • 1. Microsegmentation – a perfect fit for Microservices security Anthony Chow @vCloudernBeer http://cloudn1n3.blogspot.com VMworld 2015 vBrownBag TechTalk
  • 2. What is Microservices?  It is an architecture for application deployment  Monolithic -> small and autonomous  Deployed as separate service/entity  Communicate via network calls  A new trend to deploy application  Agile  Scalable  High Availability
  • 3. Monolithic vs Microservices (Star Wars version)
  • 4. Microservices companion technologies  DevOps – share same idea with Microservices  Agile  Scalable
  • 5. Microservices companion technologies  Docker – enables streamlined Microservices architecture  Minimum overhead  Quick provisioning
  • 6. Cloud Native Application  Microservices part of the equation along with DevOps and Linux Containers for building Cloud Native Application  Application that takes full advantage of the cloud platform.  Agile  Scalable  High Availability  Not a “One Size fit All” solution
  • 7. Microservices – opens up security risk  Frequent and short life span  Increase east-west traffic  Services are not as isolated
  • 8. What is Microsegmentation?  A security feature  Group entities within a network into one unit and to apply rules/polices to control the traffic in and out of the segment.  Concept is not new  Miro level not feasible to implement before network virtualization  Supporting principles  Apply security policy to the smallest granular level  Zero trust security model
  • 9. Major component for effective Microsegmentation  From an article by Scott Lowe  Network independent policy definition  Centralized policy repository  Distributed policy enforcement
  • 10. How does Microsegmentation fit into Microservices security?  Network independent definition  Security rule tailor to Microservices  Centralized policy repository and distributed enforcement  Able to adapt to dynamic and elastic nature of Microservices
  • 11. VMware - NSX  An networking and security solution  Security is supported inherently by its architecture/design:  Isolation  Segmentation  Segmentation with Advanced Services
  • 15. Cisco – ACI (Application Centric Infrastructure)  Policy definition separating segments from the broadcast domain  “tags” or “attributes” that identify an endpoint regardless of its IP address  End-point Groups as Microsegmenations
  • 17. A new chapter in Docker networking - libnetwork  Still under development ◦ Docker 1.7 (libnetwork rev 0.3) ◦ Docker 1.8 (libnetwork rev 1.0)  Container Network Model  A plugin model – able to take advantage 3rd party well developed networking and security infrastructure.
  • 18. libnetwork- a pluggable interface  Container Network Model (CNM)  Sandbox  Endpoint  Network