SlideShare a Scribd company logo
Microservices –

a security nightmare?
GOTO Nights Zürich - March 3, 2016
Maximilian Schöfmann | @schoefmann
Container Solutions Switzerland
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Microservices (2016) …
Microservices (2016) …
small, hence many services
Microservices (2016) …
small, hence many services
talking over the network
Microservices (2016) …
small, hence many services
talking over the network
built with different technologies
Microservices (2016) …
small, hence many services
talking over the network
built with different technologies
by autonomous teams with end-to-end responsibility
Microservices (2016) …
small, hence many services
talking over the network
built with different technologies
by autonomous teams with end-to-end responsibility
doing DevOps and Continuous Delivery
Microservices (2016) …
small, hence many services
talking over the network
built with different technologies
by autonomous teams with end-to-end responsibility
doing DevOps and Continuous Delivery
using containers
Microservices (2016) …
small, hence many services
talking over the network
built with different technologies
by autonomous teams with end-to-end responsibility
doing DevOps and Continuous Delivery
using containers
Microservices are the result of combining


architectural ideas from lightweight SOA
and Domain Driven Design, 



organisational approaches like DevOps
and Agile Software Development, and 



technology innovations like Containers
and Programmable Infrastructure
Architecture Organisation
Technology
Monolith
“many small services”
Monolith - method calls
Microservices - talking over the network
Java	7	
(1.7.0_03)
Monolith - few technologies
Microservices - built with different technologies
nodejs	
0.9
Ruby	
2.1
Java	7
Go	1.4
Java	8
Security Gates vs…
… autonomous teams 

with end-to-end responsibility
… autonomous teams 

with end-to-end responsibility
dedicated security experts vs…
(ISC)2®
doing DevOps
OWASP	
??
classic “Security Sandwich” vs…
classic “Security Sandwich” vs…
Specification
Implementation Validation
… Continuous Delivery
well isolated “real server” vs…
… using containers
Attack surface - VMs vs containers
XEN	Hypervisor	-	10^5	LOC
Linux	Kernel	-	10^7	LOC
Microservices: A Security Nightmare?
Microservices: A Security Nightmare?
Highly coupled services

No clear boundaries
Loosely coupled services

Clear boundaries
many small services
impact of breach can be contained locally
“Clear service boundaries
limit the impact of breaches”
Keep APIs minimal
payment_
data
(stateless)
cat_

pictures
(stateless)
user_db
Microservices have their own data store
payment_
data
(stateless)
cat_

pictures
(stateless)
user_db
Microservices have their own data store
“Let the need-to-know principle
guide your API design”
payment_
data
(stateless)
cat_

pictures
(stateless)
user_db
different security levels should require different security
properties in services, e.g. encryption, auth, security testing…
“Classify services into distinct
security levels”
API Gateways
API	Gateway
API Gateways
API	Gateway
• Access control
• Rate limiting
• HTTPS termination

. . .
API Gateways
API	Gateway
WAF Payment	Svc.
“Isolate services with different
security levels through gateways”
Authorization & Authentication
Authorization & Authentication
“Use scalable auth techniques
without single points of failure”
Microservices: A Security Nightmare?
Secrets management
vaultproject.io square.github.io/keywhiz
“Manage secrets with special
purpose services”
Microservices: A Security Nightmare?
Freeze image for analysis
payment	
service	
instance	#2
docs	upload	
service	
instance	#1
payment	
service	
instance	#1
cat	picture	
service	
instance	#1
meme	
generator	
instance	#1
bookmark	
manager	
instance	#1
payment	
service	
instance	#1
Or even the running container… (criu.org)
payment	
service	
instance	#2
docs	upload	
service	
instance	#1
payment	
service	
instance	#1
cat	picture	
service	
instance	#1
meme	
generator	
instance	#1
bookmark	
manager	
instance	#1
payment	
service	
instance	#1
“Leverage container features for
forensics”
Scheduling constraints
payment	
service	
instance	#2
docs	upload	
service	
instance	#1
payment	
service	
instance	#1
cat	picture	
service	
instance	#1
meme	
generator	
instance	#1
bookmark	
manager	
instance	#1
“Run services of different security
levels on different hosts”
Replace containers on deploy
payment	
service	
instance	#2
docs	upload	
service	
instance	#1
payment	
service	
instance	#3
cat	picture	
service	
instance	#1
meme	
generator	
instance	#1
bookmark	
manager	
instance	#1
“Embrace immutable infrastructure”
“built with different technologies”
nodejs	
0.9
Ruby	
2.1
Java	7
Go	1.4
Java	8
Monocultures…
Scanning images at rest
Clair	(CoreOS)Nautilus	(Docker	Inc.)
“Scan images already during the
build process”
Container technology…
BSD	Jails	
2000
2001	
Virtuozzo	
Linux-VServer
Solaris	Zones	
2004
LXC	
2008
2013	
Docker
rkt	
2014
1982	
chroot
2007	
cgroups
Docker security hardening…
container-solutions.com/security
•	read-only	containers	
•	minimal	base	images	
•	drop	capabilities	
•	traditional	hardening	

	(AppArmor,	SELinux…)	
.	.	.
“Minimise the attack surface of
images and hosts”
Unify & secure deployment methods
Simple to add…
• TLS
• Authentication
• Authorisation
• Logging & Auditing
• Image verification
scp
rsync
git
“Have a single, hardened 

method to deploy”
Microservices: A Security Nightmare?
…end-to-end responsibility
Gates and Accountability
Security Sandwich and Autonomy
Specification
Implementation Validation
Security Sandwich and Autonomy
Security Sandwich and Autonomy
Trust
Idea	from	A.T.	Kearny	Analysis
Accountability Expertise
Autonomy	&	
Entrepreneurship
Collaboration	&	
Support
Trust
Security aspects must become

part of the Definition of Done…
Rugged Software Manifesto
ruggedsoftware.org


SecDevOps?
SecOps?
DevSec?
Microservices: A Security Nightmare?
The	role	of	IT	Architects	is	already	
changing

Now,	the	role	of	the	Security	Team	
needs	to	change
“Accountability ensures security is
built in, not bolted on”
Avg: 103 days to fix a vulnerability
http://darkmatters.norsecorp.com/2015/06/09/security-vulnerabilities-take-average-of-103-days-to-remediate/
CD reduces reaction time
“Leverage Continuous Delivery as a
security feature”
Test pyramid
Unit	Tests
Service	Tests
UI	tests
faster	feedback
from	“Succeeding	with	Agile”	(Mike	Cohn)
confidence
Security-Test pyramid / AppSec pipeline
static	code	analysis
Vulnerability	
scanning
E2E	
security	tests
faster	feedback
confidence
BDD style
continuumsecurity.net/bdd-intro.htmlgauntlt.org
“Have your test pyramid reflect
security”
Architecture Organisation
Technology
Architecture
Clear	service	boundaries	limit	the	impact	of	breaches	
Let	the	need-to-know	principle	guide	your	API	design	
Classify	services	into	distinct	security	levels,	which	mandate	
different	security	properties	
Use	scalable	auth	techniques	without	single	points	of	failure	
Isolate	services	with	different	security	levels	with	gateways	
Manage	secrets	in	specialised	services
Technology
Run	services	of	different	security	levels	on	different	hosts	
Leverage	container	features	for	forensics	
Embrace	immutable	infrastructure	
Scan	images	as	part	of	the	build	process	
Have	a	single,	hardened	method	to	deploy	
Minimise	the	attack	surface	of	images	and	hosts
Organisation
Leverage	Continuous	Delivery	as	a	security	feature	
Have	your	test	pyramid	reflect	security	
Accountability	ensures	security	is	built	in,	not	bolted	on
Nightmare?
maximilian.schoefmann@container-solutions.com | @schoefmann



container-solutions.com

More Related Content

PPTX
Micro Services in .NET Core and Docker
PDF
Cisco Cloud Networking Workshop
PDF
Introduction to microservices Jornada Microservices
PDF
Comparison of Current Service Mesh Architectures
PPTX
MRA AMA Part 6: Service Mesh Models
PDF
Securing Kubernetes Workloads
PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
PDF
DevSecCon Singapore 2019: Preventative Security for Kubernetes
Micro Services in .NET Core and Docker
Cisco Cloud Networking Workshop
Introduction to microservices Jornada Microservices
Comparison of Current Service Mesh Architectures
MRA AMA Part 6: Service Mesh Models
Securing Kubernetes Workloads
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
DevSecCon Singapore 2019: Preventative Security for Kubernetes

What's hot (20)

PDF
Shifting security left simplifying security for k8s open shift environments
PDF
Credential store using HashiCorp Vault
PPTX
EKS security best practices
PPTX
NGINX, Istio, and the Move to Microservices and Service Mesh
PDF
2017 Microservices Practitioner Virtual Summit: Microservices at Squarespace ...
PPTX
Scaling Security in the Cloud With Open Source
PPTX
Service Discovery and Registration in a Microservices Architecture
PDF
Hyperledger Fabric Technical Deep Dive 20190618
PDF
Practical Guide to Securing Kubernetes
PDF
Using Kubernetes to make cellular data plans cheaper for 50M users
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PDF
Améliorer OpenStack avec les technologies Intel
PPTX
Blockchain, 
Hyperledger fabric & Hyperledger cello
PDF
Securing danish healthcare using cloudnative
PPTX
Building an IoT Cloud for Healthcare: How to Solve Networking Challenges and ...
PDF
ISACA SV Chapter: Securing Software Supply Chains
PPTX
Service Discovery with Consul
PDF
Digital Forensics and Incident Response in The Cloud
PPTX
Web API Management meets the Internet of Things
PDF
Barbican 1.0 - Open Source Key Management for OpenStack
Shifting security left simplifying security for k8s open shift environments
Credential store using HashiCorp Vault
EKS security best practices
NGINX, Istio, and the Move to Microservices and Service Mesh
2017 Microservices Practitioner Virtual Summit: Microservices at Squarespace ...
Scaling Security in the Cloud With Open Source
Service Discovery and Registration in a Microservices Architecture
Hyperledger Fabric Technical Deep Dive 20190618
Practical Guide to Securing Kubernetes
Using Kubernetes to make cellular data plans cheaper for 50M users
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Améliorer OpenStack avec les technologies Intel
Blockchain, 
Hyperledger fabric & Hyperledger cello
Securing danish healthcare using cloudnative
Building an IoT Cloud for Healthcare: How to Solve Networking Challenges and ...
ISACA SV Chapter: Securing Software Supply Chains
Service Discovery with Consul
Digital Forensics and Incident Response in The Cloud
Web API Management meets the Internet of Things
Barbican 1.0 - Open Source Key Management for OpenStack
Ad

Viewers also liked (20)

PDF
Beyond 12 Factor - Developing Cloud Native Applications
PDF
MesosCon 2016 - minimesos, the experimentation and testing tool for Apache Mesos
PPTX
PDF
Crunchies 2015 sponsorship
PDF
Modulo maestria fisico parte 2
PDF
A inclusão e o ensino regular
DOCX
3 fisika
PDF
relaciones uml
PPTX
Microsoft excel
PPTX
El regionalismo y la descentralización del estado carlos ernesto
PDF
Cloud native with kubernetes
PPTX
EL REGIONALISMO Y LA DESCENTRALIZACION DEL ESTADO
PDF
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
PDF
Securing Your Deployment Pipeline With Docker
PDF
Meeting the-mind-report
PDF
Introduction to Docker by Adrian Mouat
PDF
Security enforcement of Microservices with API Management
PDF
Hardening Microservices Security: Building a Layered Defense Strategy
PDF
Security DevOps - Wie Sie in agilen Projekten trotzdem sicher bleiben // DevO...
Beyond 12 Factor - Developing Cloud Native Applications
MesosCon 2016 - minimesos, the experimentation and testing tool for Apache Mesos
Crunchies 2015 sponsorship
Modulo maestria fisico parte 2
A inclusão e o ensino regular
3 fisika
relaciones uml
Microsoft excel
El regionalismo y la descentralización del estado carlos ernesto
Cloud native with kubernetes
EL REGIONALISMO Y LA DESCENTRALIZACION DEL ESTADO
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Securing Your Deployment Pipeline With Docker
Meeting the-mind-report
Introduction to Docker by Adrian Mouat
Security enforcement of Microservices with API Management
Hardening Microservices Security: Building a Layered Defense Strategy
Security DevOps - Wie Sie in agilen Projekten trotzdem sicher bleiben // DevO...
Ad

Similar to Microservices: A Security Nightmare? (20)

PPTX
agile microservices @scaibo
PDF
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
PDF
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
PDF
Operating Microservices at Hyperscale — Tech in Asia PDC 2019
PDF
Microservices: Where do they fit within a rapidly evolving integration archit...
PPTX
Enabling application portability with the greatest of ease!
PPTX
Overview of azure microservices and the impact on integration
PDF
Container Days: Architecting Modern Apps on AWS
PPTX
Serverless is FaaS-tastic - All Things Open Meet-up
PDF
Monoliths, Myths, and Microservices - CfgMgmtCamp
PPTX
Microservices - Peixe Urbano Tech Talks
PDF
Battery Ventures: Simulating and Visualizing Large Scale Cassandra Deployments
PPTX
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
PDF
20160304 blockchain in fsi client ready raymond
PDF
Building Cloud-powered Mobile Apps
PDF
Microservices with Kafka Ecosystem
PPSX
Microservices Architecture, Monolith Migration Patterns
PPTX
Private Apps in the Public Cloud - DevConTLV March 2016
PPTX
API World: The service-mesh landscape
PDF
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
agile microservices @scaibo
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
Operating Microservices at Hyperscale — Tech in Asia PDC 2019
Microservices: Where do they fit within a rapidly evolving integration archit...
Enabling application portability with the greatest of ease!
Overview of azure microservices and the impact on integration
Container Days: Architecting Modern Apps on AWS
Serverless is FaaS-tastic - All Things Open Meet-up
Monoliths, Myths, and Microservices - CfgMgmtCamp
Microservices - Peixe Urbano Tech Talks
Battery Ventures: Simulating and Visualizing Large Scale Cassandra Deployments
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
20160304 blockchain in fsi client ready raymond
Building Cloud-powered Mobile Apps
Microservices with Kafka Ecosystem
Microservices Architecture, Monolith Migration Patterns
Private Apps in the Public Cloud - DevConTLV March 2016
API World: The service-mesh landscape
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Modernizing your data center with Dell and AMD
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Modernizing your data center with Dell and AMD
CIFDAQ's Market Insight: SEC Turns Pro Crypto
GamePlan Trading System Review: Professional Trader's Honest Take
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”

Microservices: A Security Nightmare?