SlideShare a Scribd company logo
From virtual to cloud to
microservices – 10 tips from a
security perspective
Sergio Loureiro, PhD
CEO, Founder at SecludIT
sergio@secludit.com
https://secludit.com
New technology equals New security risks
• Security is an after thought: Embrace change and get over it!
• Virtual and Cloud are mastered, right?
• Virtualization issues vs isolation: Example VENOM
• Cloud Security Alliance Nefarious 12
2
New use case: Shared responsibility
3
Case Study: AWS virtual machines security
• 22% of AMIs had private keys
• 98% of Windows had known
vulnerabilities
• 2 VMs compromised in less of 1 hour
• NEW: data not erased securely
4
The new kid on the block: Microservices
• Applications are composed of small, independent components
• Drop-in and highly decoupled blocks
• Components communicate with each other using APIs
• Drop-in Services are easy to replace
• Developer-friendly
• Nothing new -> A.K.A. SOA (Service Oriented Architecture)
• Recently gained popularity thanks to REST APIs
5
Why Docker?
• Simplifies packaging and deployment
• Guarantees portability, flexibility, isolation (?)
• Minimal requirements
• Ideal for building microservice-based architectures
6
Containers to scale in the Cloud – Automation!
7
What about Container Security?
• Are containers really isolated?
• Are images safe?
• How can we know if a container is vulnerable?
• How can we assess the security of our microservice ecosystem?
8
Top 10 tips: back to the basics in 3 steps (1/3)
• UNDERSTAND and PLAN
1. Audit Regularly your infrastructure, test like you test your code
2. Keep it simple… (KISS) -> containers are a good step to simplify
3. Understand and test attack surface of each technology
9
Top 10 tips: back to the basics in 3 steps (2/3)
TEST and CORRECT: Operations
4. Run trusted (=tested) containers
5. Automate everything to avoid manual errors and cost reduction,
use APIs, no agents
6. Perform often vulnerability assessment
7. Use tools that cope with bare metal, virtual, cloud and containers
(legacy in not going to disappear)
8. Patch and Remediate rapidly or replace containers with updated
versions
10
Top 10 tips: back to the basics in 3 steps (3/3)
REPORT and SHOW
9. Monitor KPIs and risk, not logs and vulnerabilities -> actionable
data
10. Keep C-level informed, your budget depends on that for the next
new technology
11
NEW: Elastic Vulnerability Assessment for Containers
• Portability of containers to improve Vulnerability Assessment
12
CLONE
Further Reading
• CIS Docker Benchmark
• https://docs.docker.com/engine/security/security/
• Tools: Seccomp and AppArmor
• Docker Capabilities
• https://opensource.com/business/14/7/docker-security-selinux
• https://elastic-security.com/2016/04/11/docker-best-security-practices/
13
THANK YOU!
sergio@secludit.com
http://secludit.com
@SecludIT

More Related Content

PPTX
Deploy Secure Cloud-Native Apps Fast
PDF
Introducing a Security Feedback Loop to your CI Pipelines
PDF
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PDF
Securing an NGINX deployment for K8s
PDF
DevSecOps Implementation Journey
PPTX
Leveraging Osquery for DFIR @ Scale _BSidesSF_2020
PDF
Elastic SIEM (Endpoint Security)
Deploy Secure Cloud-Native Apps Fast
Introducing a Security Feedback Loop to your CI Pipelines
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
Palestra de abertura: Evolução e visão do Elastic Security
Securing an NGINX deployment for K8s
DevSecOps Implementation Journey
Leveraging Osquery for DFIR @ Scale _BSidesSF_2020
Elastic SIEM (Endpoint Security)

What's hot (20)

PPTX
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
PDF
RSA 2014: Skybox Security Risk Analytics Overview
PDF
Patterns for Secure Containerized Applications (Docker)
PDF
Automate threat detections and avoid false positives
PPTX
Lacework for AWS Security Overview
PDF
Lacework slides from AWS Meetups
PDF
Security for AWS: Journey to Least Privilege
PDF
Infosec 2014: Who Is Skybox Security?
PPTX
Outpost24 webinar : how to secure your data in the cloud - 06-2018
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PPTX
Soha Systems DevOps Summit New York June 2015
PPTX
Orchestrated - multi tenant architecture at scale with serverless
PDF
Inherent Security Design Patterns for SDN/NFV Deployments
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
PPTX
Risk Analytics: One Intelligent View
PDF
Dev week cloud world conf2021
PPTX
Practical DevSecOps Using Security Instrumentation
PDF
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
PPTX
Equifax cyber attack contained by containers
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
RSA 2014: Skybox Security Risk Analytics Overview
Patterns for Secure Containerized Applications (Docker)
Automate threat detections and avoid false positives
Lacework for AWS Security Overview
Lacework slides from AWS Meetups
Security for AWS: Journey to Least Privilege
Infosec 2014: Who Is Skybox Security?
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Elastic Security: Enterprise Protection Built on the Elastic Stack
Soha Systems DevOps Summit New York June 2015
Orchestrated - multi tenant architecture at scale with serverless
Inherent Security Design Patterns for SDN/NFV Deployments
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Risk Analytics: One Intelligent View
Dev week cloud world conf2021
Practical DevSecOps Using Security Instrumentation
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Equifax cyber attack contained by containers
What's Wrong with Vulnerability Management & How Can We Fix It
Ad

Viewers also liked (14)

DOCX
Elisenia pimentel taller 1
PDF
linkedinresume
PDF
Overcoming Impostor Syndrome in an Agile Environment by Ann Wangari Mwangi
PPT
Bloc opératoire de l'hueh, 6 conseils pour l'améliorer
PDF
Sales director resume page2
PPTX
instruments of levelling
PDF
Insuffler une dynamique positive pour redonner du “sens” au travail et (re)mo...
PDF
Docker en production et la sécurité … _
PPT
відпочинок дітей у пришкільному таборі з денним перебуванням
PDF
Mark VI ST Control Product Overview GEH 6127
PDF
New ICT Trends in CES 2016
PPTX
IBODE et Chirurgie Biliaire - Rappels anatomiques et Indications
PDF
ห่วงโซ่การบันทึกทางธุรกรรม The truth about blockchain
PDF
คำอธิบายเกณฑ์รายหัวข้อ 2016 criteria category and item commentary
Elisenia pimentel taller 1
linkedinresume
Overcoming Impostor Syndrome in an Agile Environment by Ann Wangari Mwangi
Bloc opératoire de l'hueh, 6 conseils pour l'améliorer
Sales director resume page2
instruments of levelling
Insuffler une dynamique positive pour redonner du “sens” au travail et (re)mo...
Docker en production et la sécurité … _
відпочинок дітей у пришкільному таборі з денним перебуванням
Mark VI ST Control Product Overview GEH 6127
New ICT Trends in CES 2016
IBODE et Chirurgie Biliaire - Rappels anatomiques et Indications
ห่วงโซ่การบันทึกทางธุรกรรม The truth about blockchain
คำอธิบายเกณฑ์รายหัวข้อ 2016 criteria category and item commentary
Ad

Similar to Microservices docker-security (20)

PDF
AWS live hack: Docker + Snyk Container on AWS
PPTX
Micro Front-End & Microservices - Plansoft
PPTX
The New Security Practitioner
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
Cloud Native Summit 2019 Summary
PDF
Introduction of Kubernetes - Trang Nguyen
PPTX
Unit No. II Architecture.pptx Cloud Microservices & Application
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
IANS information security forum 2019 summary
PDF
The 6 Critical Cloud-Native Computing Components
PPTX
Think Small To Go Big - Introduction To Microservices
PPTX
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
PPTX
Wavefront-by-VMware-April-2019
PPTX
How Cloud Computing will change how you and your team will run IT
PDF
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
PDF
Docker?!?! But I'm a SysAdmin
PDF
A Guide on What Are Microservices: Pros, Cons, Use Cases, and More
PDF
Serverless security - how to protect what you don't see?
PDF
Why and how are containers the foundation for a hybrid cloud future
AWS live hack: Docker + Snyk Container on AWS
Micro Front-End & Microservices - Plansoft
The New Security Practitioner
AWS live hack: Atlassian + Snyk OSS on AWS
Cloud Native Summit 2019 Summary
Introduction of Kubernetes - Trang Nguyen
Unit No. II Architecture.pptx Cloud Microservices & Application
CSS 17: NYC - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
IANS information security forum 2019 summary
The 6 Critical Cloud-Native Computing Components
Think Small To Go Big - Introduction To Microservices
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Wavefront-by-VMware-April-2019
How Cloud Computing will change how you and your team will run IT
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Docker?!?! But I'm a SysAdmin
A Guide on What Are Microservices: Pros, Cons, Use Cases, and More
Serverless security - how to protect what you don't see?
Why and how are containers the foundation for a hybrid cloud future

More from SecludIT (10)

PDF
Scanner de vulnérabilités : recommandés / obligatoires on vous dit tout !
PDF
Elastic Detector vu par un Ethical Hacker
PPTX
Sophia conf securite microservices - 2017
PDF
Top 10 des meilleures pratiques de sécurité AWS - 2017-06-08
PPTX
Securite docker generique 2017-03-16
PPTX
Cloud workload protection for obs by seclud it
PPTX
Innovations dans la cybersecurite
PPTX
Deployer son propre SOC !
PDF
La seule solution de surveillance continue et adaptative : Elastic Detector
PDF
The real cost of ignoring network security.
Scanner de vulnérabilités : recommandés / obligatoires on vous dit tout !
Elastic Detector vu par un Ethical Hacker
Sophia conf securite microservices - 2017
Top 10 des meilleures pratiques de sécurité AWS - 2017-06-08
Securite docker generique 2017-03-16
Cloud workload protection for obs by seclud it
Innovations dans la cybersecurite
Deployer son propre SOC !
La seule solution de surveillance continue et adaptative : Elastic Detector
The real cost of ignoring network security.

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PPTX
Machine Learning_overview_presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
Machine Learning_overview_presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative analysis of optical character recognition models for extracting...
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
OMC Textile Division Presentation 2021.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding
SOPHOS-XG Firewall Administrator PPT.pptx

Microservices docker-security

  • 1. From virtual to cloud to microservices – 10 tips from a security perspective Sergio Loureiro, PhD CEO, Founder at SecludIT sergio@secludit.com https://secludit.com
  • 2. New technology equals New security risks • Security is an after thought: Embrace change and get over it! • Virtual and Cloud are mastered, right? • Virtualization issues vs isolation: Example VENOM • Cloud Security Alliance Nefarious 12 2
  • 3. New use case: Shared responsibility 3
  • 4. Case Study: AWS virtual machines security • 22% of AMIs had private keys • 98% of Windows had known vulnerabilities • 2 VMs compromised in less of 1 hour • NEW: data not erased securely 4
  • 5. The new kid on the block: Microservices • Applications are composed of small, independent components • Drop-in and highly decoupled blocks • Components communicate with each other using APIs • Drop-in Services are easy to replace • Developer-friendly • Nothing new -> A.K.A. SOA (Service Oriented Architecture) • Recently gained popularity thanks to REST APIs 5
  • 6. Why Docker? • Simplifies packaging and deployment • Guarantees portability, flexibility, isolation (?) • Minimal requirements • Ideal for building microservice-based architectures 6
  • 7. Containers to scale in the Cloud – Automation! 7
  • 8. What about Container Security? • Are containers really isolated? • Are images safe? • How can we know if a container is vulnerable? • How can we assess the security of our microservice ecosystem? 8
  • 9. Top 10 tips: back to the basics in 3 steps (1/3) • UNDERSTAND and PLAN 1. Audit Regularly your infrastructure, test like you test your code 2. Keep it simple… (KISS) -> containers are a good step to simplify 3. Understand and test attack surface of each technology 9
  • 10. Top 10 tips: back to the basics in 3 steps (2/3) TEST and CORRECT: Operations 4. Run trusted (=tested) containers 5. Automate everything to avoid manual errors and cost reduction, use APIs, no agents 6. Perform often vulnerability assessment 7. Use tools that cope with bare metal, virtual, cloud and containers (legacy in not going to disappear) 8. Patch and Remediate rapidly or replace containers with updated versions 10
  • 11. Top 10 tips: back to the basics in 3 steps (3/3) REPORT and SHOW 9. Monitor KPIs and risk, not logs and vulnerabilities -> actionable data 10. Keep C-level informed, your budget depends on that for the next new technology 11
  • 12. NEW: Elastic Vulnerability Assessment for Containers • Portability of containers to improve Vulnerability Assessment 12 CLONE
  • 13. Further Reading • CIS Docker Benchmark • https://docs.docker.com/engine/security/security/ • Tools: Seccomp and AppArmor • Docker Capabilities • https://opensource.com/business/14/7/docker-security-selinux • https://elastic-security.com/2016/04/11/docker-best-security-practices/ 13