SlideShare a Scribd company logo
MTLS in a Microservices 🌍
@diogomonica
- Mobile payments company
- Moving $48 billion annually
- Infra: Java & Ruby, some Go
- Infrastructure Company
- Moving 1+ billion containers annually
- Infra: Go, some python
Microservice Security Goals
- Provide common security infrastructure
- Follow the principle of least-privilege
- Better security monitoring
- Automated end-to-end secure service
deployment
The Security boundary is
the service
Internet
DatabasesServicesFront-end
VS
Internet
Every service call should be
authorized and authenticated
One node, one ID
MTLS in a Microservices World
MTLS in a Microservices World
Your provisioning system is
your Registration Authority
Isolated Network
Provisioning
CSR
Cert
Trust on first use
MTLS
Key-material
stays secret
Supported by
everything
MTLS
Confidentiality
Authentication
Integrity
Key-material
stays secret
Supported by
everything
MTLS
A LOT of Certs!
Confusing
for Engineers Unforgiving
Revocation?
Running a PKI
Confidentiality
Authentication
Integrity
Key-material
stays secret
Supported by
everything
MTLS
A LOT of Certs!
Confusing
for Engineers Unforgiving
Revocation?
Running a PKI
Encryption
Authentication
SWARM
Mutual TLS by default
• First node generates a new
self-signed CA.
Mutual TLS by default
• First node generates a new
self-signed CA.
• New nodes can get a
certificate issued w/ a
token.
Mutual TLS by default
• First node generates a new
self-signed CA.
• New nodes can get a
certificate issued w/ a
token.
• Workers and managers
identified by their
certificate.
Mutual TLS by default
• First node generates a new
self-signed CA.
• New nodes can get a
certificate issued w/ a token.
• Workers and managers
identified by their certificate.
• Communications secured
with Mutual TLS.
The Token
SWMTKN-1-mx8susrv1etsmc8omaom825bet6-cm6zts22rl4hly2
Prefix to allow VCS
searches for leaked
Tokens
Token Version
Cryptographic Hash
of the CA Root Certificate
for bootstrap
Randomly generated
Secret
Bootstrap
1. Retrieve and validate Root CA
Public key material.
2. Submit new CSR along with
secret token.
3. Retrieve the signed
certificate.
Automatic Certificate Rotation
1. Submit new CSR using old
key-pair.
2. Retrieve the new signed
certificate.
Support for External CAs
• Managers support BYO CA.
• Forwards CSRs to external
CA.
Demo
One app, one ID
Your Orchestration System is
your Registration Authority
Orchestration
System
Registration
Authority
CSR Cert
MTLS for service
authentication
CN=api01 CN=db01
MTLS for service
authorization
CN=api01
OU=web-api
O=production
CN=db01
OU=credit-card-db
O=production
[ { "permission":
{ "method": "GET", "resource": "/user" },
"allow": ["web", "fulfillment", "payments"] },
{ "permission":
{ "method": "POST", "resource": "/user" },
"allow": ["signup", "web"] },
{ "permission":
{ "method": "DELETE", "resource": "/user/.*" },
"allow": ["web"]
}]
Sane access to raw secrets
Demo
MTLS in a Microservices World
MTLS in a Microservices World
Thank you
@diogomonica

More Related Content

PDF
Moby SIG Orchestration Security Summit Presentation
PDF
Bletchley
PPTX
Ssl in a nutshell
PDF
SSL Secure socket layer
PDF
SSl/TLS Analysis
PPTX
OpenSSL
Moby SIG Orchestration Security Summit Presentation
Bletchley
Ssl in a nutshell
SSL Secure socket layer
SSl/TLS Analysis
OpenSSL

What's hot (20)

PDF
SSL/TLS
PPT
Sniffing SSL Traffic
PPTX
Introduction to SSL and How to Exploit & Secure
PPT
MQTT security
PPT
PPT
SSL & TLS Architecture short
PDF
Sullivan red october-oscon-2014
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPTX
Botconf ppt
PPT
Secure Socket Layer (SSL)
PPTX
Towards Securing Computer Network Environment By Using Kerberos-based Network...
PPTX
State of the Web
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
PDF
TLS/SSL Protocol Design
PDF
Credential store using HashiCorp Vault
PPT
Secure Socket Layer
PDF
Securing MQTT - BuildingIoT 2016 slides
PDF
Blockchain testing strategy
PPTX
kerberos
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS
Sniffing SSL Traffic
Introduction to SSL and How to Exploit & Secure
MQTT security
SSL & TLS Architecture short
Sullivan red october-oscon-2014
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Botconf ppt
Secure Socket Layer (SSL)
Towards Securing Computer Network Environment By Using Kerberos-based Network...
State of the Web
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
TLS/SSL Protocol Design
Credential store using HashiCorp Vault
Secure Socket Layer
Securing MQTT - BuildingIoT 2016 slides
Blockchain testing strategy
kerberos
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
Ad

Viewers also liked (20)

PDF
PhD Thesis Diogo Mónica
PDF
Cloud conf keynote - Orchestrating Least Privilege
PPTX
Leveraging Honest Users: Stealth Command-and-Control of Botnets
PPTX
Observable Non-Sybil Quorums Construction in One-Hop Wireless Ad Hoc Networks
PDF
ESORICS 2014: Local Password validation using Self-Organizing Maps
PDF
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
PDF
An IDS for browser hijacking
PPTX
WiFiHop - mitigating the Evil twin attack through multi-hop detection
PDF
MultiPath TCP - The path to multipath
PDF
Secure Software Distribution in an Adversarial World
PPTX
Orchestrating Least Privilege by Diogo Monica
PPTX
On the use of radio resource tests in wireless ad hoc networks
PDF
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
DOCX
IPO_Sucess
PDF
Zentral presentation MacAdmins meetup Univ. Utah
PDF
Application Security from the Inside - OWASP
PDF
Docker presentation | Paris Docker Meetup
PDF
Docker 1.12 & Swarm Mode [Montreal Docker Meetup Sept. 2016]
PDF
Docker 1.12 - Swarm Mode
PDF
docker-machine, docker-compose, docker-swarm 覚書
PhD Thesis Diogo Mónica
Cloud conf keynote - Orchestrating Least Privilege
Leveraging Honest Users: Stealth Command-and-Control of Botnets
Observable Non-Sybil Quorums Construction in One-Hop Wireless Ad Hoc Networks
ESORICS 2014: Local Password validation using Self-Organizing Maps
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
An IDS for browser hijacking
WiFiHop - mitigating the Evil twin attack through multi-hop detection
MultiPath TCP - The path to multipath
Secure Software Distribution in an Adversarial World
Orchestrating Least Privilege by Diogo Monica
On the use of radio resource tests in wireless ad hoc networks
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
IPO_Sucess
Zentral presentation MacAdmins meetup Univ. Utah
Application Security from the Inside - OWASP
Docker presentation | Paris Docker Meetup
Docker 1.12 & Swarm Mode [Montreal Docker Meetup Sept. 2016]
Docker 1.12 - Swarm Mode
docker-machine, docker-compose, docker-swarm 覚書
Ad

Similar to MTLS in a Microservices World (20)

PPTX
Microservices Security landscape
PPTX
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
PDF
Dr. Omar Ali Alibrahim - Ssl talk
PPTX
Certificate pinning in android applications
PDF
Alfresco DevCon 2019: Encryption at-rest and in-transit
PPT
Implementing Public-Key-Infrastructures
PPTX
Chapter 2 Overview of Commercial Issues.pptx
PDF
IoT Meets Security
PDF
Kerberos Security in Distributed Systems
PDF
How EverTrust Horizon PKI Automation can help your business?
PPTX
TLS/SSL - Study of Secured Communications
PDF
Technical considerations for Blockchain networks with AWS
PPTX
Toronto MuleSoft Meetup: Virtual Meetup #3
PDF
Nt2580 Final Project Essay Examples
PPT
Secure socket later
PDF
The 5 elements of IoT security
PDF
20160304 blockchain in fsi client ready raymond
PDF
Blockchain Explored: A technical deep-dive
PPTX
Webinar - Loyalty Reward Points Using Blockchain
PPTX
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Microservices Security landscape
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
Dr. Omar Ali Alibrahim - Ssl talk
Certificate pinning in android applications
Alfresco DevCon 2019: Encryption at-rest and in-transit
Implementing Public-Key-Infrastructures
Chapter 2 Overview of Commercial Issues.pptx
IoT Meets Security
Kerberos Security in Distributed Systems
How EverTrust Horizon PKI Automation can help your business?
TLS/SSL - Study of Secured Communications
Technical considerations for Blockchain networks with AWS
Toronto MuleSoft Meetup: Virtual Meetup #3
Nt2580 Final Project Essay Examples
Secure socket later
The 5 elements of IoT security
20160304 blockchain in fsi client ready raymond
Blockchain Explored: A technical deep-dive
Webinar - Loyalty Reward Points Using Blockchain
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
composite construction of structures.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Welding lecture in detail for understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
web development for engineering and engineering
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
R24 SURVEYING LAB MANUAL for civil enggi
composite construction of structures.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Construction Project Organization Group 2.pptx
Lecture Notes Electrical Wiring System Components
Welding lecture in detail for understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
web development for engineering and engineering
UNIT 4 Total Quality Management .pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
additive manufacturing of ss316l using mig welding
OOP with Java - Java Introduction (Basics)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx

MTLS in a Microservices World