<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microservices Security Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/microservices-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/microservices-security/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Fri, 27 Mar 2020 06:43:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Five security principles developers must follow</title>
		<link>https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/</link>
					<comments>https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 06:43:54 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=7758</guid>

					<description><![CDATA[<p>Source: jaxenter.com Developers and their applications are the backbone of organisations across the world. But in recent years, large scale security breaches have put data protection at the forefront <a class="read-more-link" href="https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/">Five security principles developers must follow</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: jaxenter.com</p>



<p>Developers and their applications are the backbone of organisations across the world.</p>



<p>But in recent years, large scale security breaches have put data protection at the forefront for product development teams. With the likes of the GDPR now in place, security must be a priority.</p>



<p>So who is stepping up to take responsibility for the future and current applications being rolled out on a daily basis by modern IT organisations?</p>



<p>We put these questions to over 1,500 developers and IT decision-makers (ITDM) across Europe. In this post and the zine below, we’ll analyse the findings, unpick the tensions and set some key next steps.</p>



<h3 class="wp-block-heading">What can developers do</h3>



<p>The stakes are higher. Security must be the number one priority. The good news is developers agree.</p>



<p>Developers (92%) and the decision-makers (88%) reassure us that they take appropriate precautions when building new applications.</p>



<p>What’s more, both agree that the security of data is their top concern when procuring new software – 53% of ITDMs and 47% of devs. This is good to see.</p>



<h3 class="wp-block-heading">What about the software we build?</h3>



<p>This alignment, however, splits when it comes to writing software. But why?</p>



<p>It falls down to balancing priorities.</p>



<p>There is no security without first having functionality, so the responsibility is naturally distributed across different organizations. The good news is ITDMs and developers are mostly well aligned on the ratio of responsibilities, which means there is no source of conflict here.</p>



<p>When we asked developers who has the most responsibility for securing an application, just 29% cited themselves while the rest pointed the finger at security specialists (22%), the business leaders who briefed the project (18%), the ops team (16%) and even security members they don’t know (14%).</p>



<p>This compares well with ITDMs. The majority of them (28%) believe a security specialist holds the most responsibility. Yet a further 21% see it to be developers and an additional 21% point at the business leader who briefed the build.</p>



<h3 class="wp-block-heading">So what does it all mean?</h3>



<p>Lena Smart, Chief Information Security Officer at MongoDB articulates the challenges well:</p>



<p> “Control and convenience have long clashed. Developers are under relentless pressure to deliver – on time, to specification, securely and at scale. It’s a challenge that will only continue.” </p>



<p>How do we ensure that we can reconcile strong security with a need to deliver utility quickly to users?</p>



<p>Agile, MicroServices and DevOps are all disciplines that have worked hard to increase the rate at which software can adapt to changing business requirements. How do we bake security into the mix so we don’t end up adding it badly in a rush at the end?</p>



<p>The answer is DevSecOps.</p>



<h3 class="wp-block-heading">Direction in disruption</h3>



<p>Creating a ‘security as code’ culture with ongoing, flexible collaboration between release engineers and security teams will help mitigate the challenges. This is a people, process and technology task across the application delivery pipeline – from design and coding to testing and support.</p>



<p>It will help ensure a working balance between control and convenience where feedback loops give security the priority it deserves.</p>



<p>DevSecOps won’t be a smooth process right off the bat. It will take both skill and culture changes. Which means work and patience.</p>



<p>“When done properly, DevSecOps can provide deeper visibility and a better understanding of how resources are being used. It should become and remain a key part of an organisation’s development strategy,” shared Smart.</p>



<p>Here is how to get started.</p>



<h3 class="wp-block-heading">Five principles of DevSecOps</h3>



<h3 class="wp-block-heading">1. Baked in</h3>



<p>Security must be baked in. Consider any and all negative impacts a new feature may unknowingly cause, rather than just focusing on the positive impact it may generate.</p>



<h4 class="wp-block-heading">2. Get specific</h4>



<p>Determine your own organisation’s needs and goals and choose the right solutions for your situation. Not one size fits all.</p>



<h4 class="wp-block-heading">3. Adopt a people approach</h4>



<p>Infuse security principles at every step, and into every collaborator, including developers. It’s a team sport where skills and culture matter equally.</p>



<h4 class="wp-block-heading">4. Share information</h4>



<p>Open collaboration is essential in DevSecOps. Share, learn and improve constantly by communicating internally to meet your goals.</p>



<h4 class="wp-block-heading">5. Be ambitious</h4>



<p>Don’t put your ambitions on the back burner. Many cloud platforms today offer built-in security controls for all your data. Take the leap to the cloud.</p>



<p>—</p>



<h4 class="wp-block-heading"><strong>About MongoDB</strong></h4>



<p>MongoDB is the leading modern, general-purpose database platform, designed to unleash the power of software and data for developers and the applications they build. Headquartered in New York, MongoDB has more than 15,000 customers in over 100 countries. The MongoDB database platform has been downloaded over 70 million times and there have been more than one million MongoDB University registrations.</p>



<h4 class="wp-block-heading">Data background</h4>



<p>* In June and in partnership with CensusWide, we surveyed 1516 people split evenly across France, Germany and the UK. There were two groups we spoke to – developers and IT decision-makers.</p>



<p>Developers were defined as ‘An individual that builds and creates software applications. Their role includes writing, debugging and executing the code of an application’.</p>



<p>IT Decision Maker, which I know is a slightly made-up industry term, were defined as ‘an employee who is empowered to make strategic IT decisions within a company including (but not limited to): recruitment processes for IT professionals, procurement of new IT software and hardware, technologically-focussed R&amp;D decisions, data management and data security.’</p>
<p>The post <a href="https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/">Five security principles developers must follow</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/five-security-principles-developers-must-follow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to build a layered approach to security in microservices</title>
		<link>https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/</link>
					<comments>https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 21 Jul 2018 05:25:15 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications Security]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Continous Integration]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2635</guid>

					<description><![CDATA[<p>Source &#8211; techtarget.com Despite having brought forth a revolution in application design and deployment, microservices can create profound, even critical, security and compliance problems. To meet microservices-based development and <a class="read-more-link" href="https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/">How to build a layered approach to security in microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; techtarget.com</p>
<p>Despite having brought forth a revolution in application design and deployment, microservices can create profound, even critical, security and compliance problems. To meet microservices-based development and deployment goals, you are often required to step into new areas of application design, including areas that defeat many of the traditional mechanisms for securing applications. Just as microservices possess multidimensional benefits, they also need multidimensional and layered security.</p>
<section class="section main-article-chapter" data-menu-title="Making sense of the network layer">
<h3 class="section-title">Making sense of the network layer</h3>
<p>The first layer of security in microservices is the network layer. Every microservice needs a URL and an IP address, through which it communicates with other components. Restricting the scope of the microservices&#8217; IP address will limit connectivity, which can radically improve security. Two easy address limiting methods are private IP addressing and address translation control.</p>
<p>Most virtualization tools &#8212; including container management software, like Docker, and private cloud software, like OpenStack &#8212; and most public cloud services will deploy applications within a private IP subnetwork. Private IP addresses are visible only on private networks, which means microservices that have private addresses can&#8217;t be accessed from the outside. If these components need access to the outside, you can translate the private address to a public IP address. The size of a private IP domain will depend on the range of applications that use the microservice, but private addresses are available to support millions of components. Even though private addresses are invisible to the outside world, they can see each other. For microservices used within a single application or a limited group of applications, this technique can add considerable security.</p>
<p>Address translation control takes advantage of the fact that users and applications are typically represented by a URL that has to be translated to an address. This translation usually occurs via a DNS server, but other resource registration tools, like service-oriented architecture&#8217;s UDDI (Universal Description, Discovery and Integration) or an API broker, can also be used. You may need specialized tools to support policy control over access to microservice addresses, which can make address translation control more complicated to apply because it won&#8217;t protect against intrusions that already know the microservice IP address and access that address directly. However, it will work with microservices that have public IP addresses.</p>
<p>Microservices that need addresses across multiple applications make address-based security more complicated. For a different approach, you can group applications that share microservices into a common cluster, based on a common private IP address. Through this approach, all the components within the cluster are capable of addressing each other, but you will still need to expose them for communications outside that private network. If a microservice is broadly used across many applications, you should host it in its own cluster, and its address should be exposed to the enterprise virtual private network or the internet, depending on its scope.</p>
</section>
<section class="section main-article-chapter" data-menu-title="Figuring out access control">
<h3 class="section-title">Figuring out access control</h3>
<p>Network-based security reduces the chances of an intruder accessing a microservice API, but it won&#8217;t protect against intrusions launched from within the private network. A Trojan or other hacked application could still gain access at the network level, so you may need to add another another level of security in microservices. This is the access control level.</p>
<p>Access control relies on the microservice recognizing that a request is from an authentic source. One way to support access control is with an API broker or manager. The broker provides an authentic user with the address of a microservice, providing an identity token as well. That token can then be passed to the microservice, which can authenticate it and the user who&#8217;s obtained it. It&#8217;s also possible to use encryption on the message links to microservices, making access to them dependent on having the proper encryption key.</p>
<p>Access control is more difficult for shared microservices, and the more they are shared, the more difficult it becomes. It&#8217;s important to ensure that every valid use of a microservice is covered, and if one use is removed from a composed application, it has to be decertified. Access control is also harder to apply if different users of the same application have different access rights with respect to components and/or data. It&#8217;s difficult in this case because certification will normally verify companion components, not the users of the application. Broader user- or role-based authentication requires the entire workflow to remain user-aware, and it requires that user identity be established firmly and passed on through the API broker.</p>
<p>To help limit the scope of microservices and ease the deployment of both network and access control security, you can replicate a microservice within specific applications or groups, rather than use it as a shared service. While this can reduce the value of microservices, it can also simplify their design and scale by controlling the number of possible parallel users.</p>
<h3 class="section-title">Logging is last up</h3>
<p>The final layer of security in microservices is logging, which should be the final layer for all forms of security. Audit trails don&#8217;t prevent an intrusion directly, but teams can use them proactively to analyze use patterns and reactively to track invalid users.</p>
<p>Microservices use logs will quickly detect all of the valid access patterns, including the source of requests, as well as the time and dates. This information will help auditors or automated analytics processes spot atypical use patterns. If use deviates from a pattern, you always have the option to shut down the requests until the problem is traced and fixed.</p>
<p>Using security layers can present complex interdependencies, and complexity isn&#8217;t exactly a user goal. In order to better manage your complex microservices security environment, Istio &#8212; based on open middleware &#8212; is an emerging management platform. Istio offers an open platform model to control microservices security, networking and load balancing. Istio may not be quite ready for large-scale deployments, but it&#8217;s a tool that teams should explore now and consider for adoption when tests prove its effectiveness at scale. While building a layered security approach is the most reliable option right now, Istio and future microservices management tools will likely help give you an even better handle on your multidimensional microservices security strategy.</p>
<div class="join-discussion-wrapper"></div>
</section>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/">How to build a layered approach to security in microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/how-to-build-a-layered-approach-to-security-in-microservices/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Security in the world of microservices</title>
		<link>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/</link>
					<comments>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 25 Nov 2017 05:41:11 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications Security]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<category><![CDATA[software applications]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=1771</guid>

					<description><![CDATA[<p>Source &#8211; itproportal.com In the world of microservices, the goal is to have a small piece of software that performs a well-defined set of tasks. Microservices are software <a class="read-more-link" href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Security in the world of microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>itproportal.com</strong></p>
<p>In the world of microservices, the goal is to have a small piece of software that performs a well-defined set of tasks. Microservices are software applications that are self-contained. They are small, independently deployable modular services that run a unique process and communicate through a well-defined, lightweight mechanism to serve a specific goal.</p>
<p>Typically, clear boundaries are set with regards to what your microservice can or cannot do. The move to microservices requires not only a change in architecture, but also a solid foundation of trust between the different teams who are working together to develop these microservices. Building this trust gives them the confidence they need to rely on the services’ availability and adherence to the agreed upon service contract for standard APIs.</p>
<p>Without a high level of trust between teams of developers, chaos will quickly ensue in your development organisation. Each team will build whatever they want and/or change APIs without notifying the rest of the organisation. In this state of disarray, functionality will break and your software development will come to a grinding halt.</p>
<p>While trust is extremely important in developing microservices, planning ahead for potential security issues is even more critical. Unfortunately, security considerations are often overlooked in the process of transitioning to microservices. The consequences of security failings can be devastating for your company.</p>
<p>For example, let’s say you are deploying a microservice that accepts input from a user and passes that input to a backend database. If your service is not secure and the input is not validated, hackers will be able to inject malicious code into the system and bring down your service — or perhaps even worse, compromise your entire system.</p>
<h3 id="a-plethora-of-microservices">A plethora of microservices</h3>
<p>As your repertoire of services and applications grows, it is probably safe to assume that the number of available microservices will grow as well. As the number of options increases, more and more security issues are bound to come up. In this post, we will review some of the issues and potential solutions that you should take into consideration before your business makes the shift to using microservices.</p>
<h3 id="reuse-of-code">Reuse of code</h3>
<p>Using shared code and libraries can help you jumpstart your move to microservices, but it can also be a double-edged sword. If you choose to borrow and use something off of the internet (i.e., an open-source solution), you are forever tied to that code and all of its shortcomings.</p>
<p>On one hand, reuse of industry standard technology can be a good thing since it has already been tested and used around the world. On the other hand, widespread usage of standard technology can be problematic. If a component vulnerability surfaces, your company and other companies that are using the technology will need to apply emergency patches to mitigate critical flaws in all of your applications. Imagine what it would be like to have to either deploy all of your services again because of a new security package, or to patch the servers with a whole new binary. Such a scenario sounds like a nightmare, doesn’t it?</p>
<p>Take the Heartbleed bug for example. When the bug was discovered in April of 2014, approximately 66 per cent of the internet’s web servers needed to be patched because the software that included the vulnerable libraries was used on almost all of the world’s web servers. This catastrophe required the patching and rebooting of hundreds of thousands of servers in a very short period of time.</p>
<p>If you happen to have a smaller number of servers, the solutions of deploying everything again or patching with a new binary are doable, either manually or with a basic amount of scripting. But when you scale, these are no longer viable options for solving your problem. In these cases with scaling, you need to have a tried and tested method of orchestration already in place in order for you to perform mass operations quickly to alleviate the problems.</p>
<h3 id="denial-of-service">Denial of service</h3>
<p>Ensuring that your applications are secure is no easy feat, and managing a number of services that have multiple entry points from the outside can be difficult. As the number of services grow, the magnitude of this issue is amplified. Managing security groups appropriately will help you ensure that only the correct ports are exposed. Doing so can help save you and your applications a significant amount of pain and anguish if a malicious party targets your product in an attack.</p>
<p>Setting up a firewall application or an alternative solution in front of your system can correct a problem like this by ensuring that only the appropriate traffic arrives at your application’s front door and that it does not contain malicious codes or threats.</p>
<h3 id="traffic-between-microservices">Traffic between microservices</h3>
<p>Each microservice passes information from one to another. When the traffic is in a segregated part of your own network, it is safe to assume that your risk of having an eavesdropper is decreased since you are usually behind a corporate firewall, which makes you less susceptible to man-in-the-middle attacks.</p>
<p>When you move to the cloud, this assumption is no longer valid. Traffic between your microservices should be encrypted on the cloud. This means that, in addition to your microservices handling encrypted traffic, they will also need to ensure that the performance of your underlying applications does not suffer as a result of the extra work they have to perform with encrypting and decrypting information.</p>
<p>There are a number of methods that you can use to mitigate this problem. One such solution is creating a Virtual Private Cloud (VPC), which will enable you to segregate your workloads in the cloud without allowing a malicious intruder into the system who could eavesdrop on your traffic. However, this is not a foolproof solution, and it still has a number of attack vectors that you will need to address. Another option is offloading the encryption to an external service (e.g., a load balancing service) that will enable traffic protection with minimal disruption or changes to your current system.</p>
<h3 id="secret-sharing">Secret sharing</h3>
<p>In order to make sure that your microservices are not open to the world, we suggest that you add authentication between the services in your system. Doing so will ensure that only the correct pieces are allowed to talk with each other and that they have the proper credentials to do so.</p>
<p>Embedding these secrets into your applications is a very bad idea. Best practices for modern architecture strongly advise against storing any credentials on your servers. Of course, this brings up the question of how you will allow applications to authenticate with each other and third-party services if the credentials cannot be stored locally?</p>
<p>There are a few ways to tackle this problem. One strategy is to use third-party tools or the tools and services that are already available from most cloud providers. The concept is pretty simple. When you initiate an authentication request, you ask another service to request a temporary set of credentials on your behalf, which allows you access for a set period of time. This solves the issue of longevity of credentials because they expire after a certain period of time, and because there are no credentials that are embedded in the microservice itself.</p>
<h3 id="security-across-the-board">Security across the board</h3>
<p>It is highly unlikely that those who are producing the microservice will actually belong to a single team. It makes sense that each team will develop, test, and deploy their own microservice (or set thereof). Therefore, the responsibility of securing the service cannot lie solely with a single, traditional operation security team and organisation—it should lie with all of the teams that are producing the software.</p>
<p>In order to ensure that your company will be protected and secure from outside attackers, we recommend that you consider some sort of partnership between the traditional OPSEC team and the developers. Establishing such a partnership will help the participants work together so that the software they are producing is secure by default, hardened, and continuously tested for compliance against a baseline of security requirements before it goes out the door. When the responsibility also lies with the teams who are creating the service, their level of engagement and awareness will definitely increase.</p>
<h3 id="code-changes">Code changes</h3>
<p>The last issue we will address is the lifecycle of the application. No one writes software that is 100 per cent perfect the first time around — there will always be some bugs to fix before the software runs as efficiently as it is supposed to. For example, the foundation of Agile methodology is reiterated all the time, providing only the minimal viable product and improving as you progress with the project.</p>
<p>When you are dealing with microservices, there can be several changes each day. When you upgrade your application by changing or adding functionality, you will need to ensure that your code is (at minimum) the same as it was before, if not even better. This requires scanning the added code for vulnerabilities and weaknesses before the code is even deployed. You will need to tie this into your continuous integration processes so that this is performed as part of your release process.</p>
<h3 id="summary">Summary</h3>
<p>Maintaining a secure system is usually a daunting task, and with the shift to microservices, there is an additional vector that needs to be addressed. Each microservice has its respective weak points that need to be secured, hardened, and continuously monitored for vulnerabilities.</p>
<p>The scope of this task should not be underestimated — as your use of microservice architecture grows, security issues become more significant and urgent. To protect yourself and your company, you should address these security issues early and often. We encourage you to use the suggestions from this post to help you with the process of securing your microservices.</p>
<p>The post <a href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Security in the world of microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Aqua Security CTO reveals how to secure microservices</title>
		<link>https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/</link>
					<comments>https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Wed, 20 Sep 2017 07:24:15 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[application development]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=1197</guid>

					<description><![CDATA[<p>Source &#8211; techtarget.com he emergence of microservices boosts business agility, enabling rapid application development, deployment and modification. The challenge is baking in microservices security processes. Traditional security processes <a class="read-more-link" href="https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/">Aqua Security CTO reveals how to secure microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>techtarget.com</strong></p>
<p><i>he emergence of microservices boosts business agility, enabling rapid application development, deployment and modification. The challenge is baking in microservices security processes. Traditional security processes can&#8217;t secure microservices, because the latter work in and communicate between both internal and external environments, according to Amir Jerbi, CTO of Aqua Security, a container security platform provider.</i></p>
<p><i>Using </i><i>microservices</i><i> makes security easier for developers or architects in some ways and harder in others. In this Q&amp;A, </i><i>Aqua Security</i><i> Co-founder Jerbi offers advice on avoiding mistakes in setting up microservices security and balancing the often-conflicting needs for steel-trap security and rapid deployment of and communication between microservices.</i></p>
<p><b>What are the security pros and cons of microservices?</b></p>
<p>Amir Jerbi: Before cloud, you deployed your software on premises. You had to use the on-prem mechanism in order to secure your application. You had to use a firewall, host-based intrusion protection and maybe a code analysis tool and/or a tool to test for insecure coding. However, when deploying that app in the cloud, you had to use different tool sets and methodologies and build and deploy on one or separate cloud bases. With the shift to using microservices and containers, you can actually use the same tool set and methodologies to deploy on prem or in the cloud and even on every kind of cloud platform.</p>
<p>Microservices make it easier to develop an app that can run on multiple cloud platforms, because you&#8217;re using the same packaging and the same artifacts, and you can actually secure them exactly the same way. So, microservices can enable greater consistency in the way that you build, deploy and secure software.</p>
<p><b>What are some mistakes that could be made in developing and deploying microservices and building a microservices architecture that could lead to security issues?</b></p>
<p>Jerbi: With the monolithic architecture and application, all of the communications between different parts of apps would be internal. Now, to secure microservices, it&#8217;s more complex than that. You have multiple microservices running either on the same machine or distributed host, and there is a lot of communication between those microservices. Some of the communication can be on the same machine, some between different machines and some between different data centers.</p>
<p>When there are so many communications done between those microservices, it means that the perimeter is not something that is well-defined. You can&#8217;t put everything inside of a box and just protect that box. It&#8217;s not enough just to put a firewall in place, because all those communications must be governed and authenticated.</p>
<p><b>Easier app updating is a benefit of microservices. A developer can just redeploy a single microservice while letting the application run consistently. Doesn&#8217;t that require </b><b>change management</b><b> to be done differently than before in order to secure microservices and apps?</b></p>
<p>Jerbi: Yes. You need to make sure that the change that you&#8217;re adding to your system is controlled, and the software that is added doesn&#8217;t impact overall security of your application. Now, you need to manage so many small pieces, and that will require different mechanisms for authentication.</p>
<p>Microservice systems, many times, are open, allowing communication between the different services without any security control. So, it&#8217;s important to find ways to do strong authentication between microservices.</p>
<p>One way to do microservices authentication well is adopting a well-established authentication framework, like TLS [Transport Layer Security], and implementing two-factor authentication between all of the microservices. But to do that, you need to maintain new methods in order to publish security certificates and maintain those certificates. This is very different from traditional authentication, where they only needed to maintain TLS for the web server, which is much easier.</p>
<p><b>Are there other security perils that come with microservices?</b></p>
<p>Jerbi: There is a friction between the need for diligence in security and the need to make and deploy changes very, very fast because, well, you can and your competitors can, too.</p>
<p>Cloud deployment runs so fast today that Netflix and Google can roll out updates many times a day. Others want to do the same but often proceed without thinking through the security piece. The result can be pushing new changes into production apps without understanding the security impact of the change.</p>
<p>Traditionally, a security process ran slow. It required multiple intervals. It was a process that touched all along the pipeline. Now, people traditionally in charge of testing software and pushing it very fast to production are now also tasked with security &#8212; largely, securing the code. Wisely, many are taking the DevSecOps approach, wherein a group takes charge of security with a standard set of processes, such as two-factor authentication, RASP[runtime application self-protection], threat [modeling, etc.].</p>
<p><b>Which other approaches for securing microservices do you find useful?</b></p>
<p>Jerbi: Shift left testing is more focused on developers, and it allows you to do security analysis of your code or your microservices or your packages. Shift left allows you to fail fast and to fail the build, often to fail due to security issues. It might slow down development processes a bit, but it helps developers understand what&#8217;s needed from them in order to build applications with better security. Over time, the knowledge that comes from doing shift left will increase the level of overall security in the organization and allow faster deployment times. That’s because the code will be secure before deployment, and there won’t be after-deployment bottlenecks.</p>
<p>The post <a href="https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/">Aqua Security CTO reveals how to secure microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/aqua-security-cto-reveals-how-to-secure-microservices/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>The challenges of microservices security and how to handle them</title>
		<link>https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/</link>
					<comments>https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Wed, 02 Aug 2017 07:22:04 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[developers and architects]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<category><![CDATA[security challenges]]></category>
		<category><![CDATA[traditional architectures]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=424</guid>

					<description><![CDATA[<p>Source &#8211; techtarget.com In this Q&#38;A, Daniel Bryant, CTO at SpectoLabs and an independent technical consultant, talks about some of the challenges that come up when addressing microservices <a class="read-more-link" href="https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/">The challenges of microservices security and how to handle them</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>techtarget.com</strong></p>
<p><i>In this Q&amp;A, Daniel Bryant, CTO at SpectoLabs and an independent technical consultant, talks about some of the challenges that come up when addressing microservices security and some of the tools and techniques you can use.</i></p>
<p><b>Compared to more traditional architectures, what new challenges have microservices introduced in terms of security?</b></p>
<p>Daniel Bryant: In the traditional approach, you had one thing. So, if it was compromised, you&#8217;re in trouble. It&#8217;s like putting all your eggs in one basket kind of thing. The flip side of that is, when you break things up, suddenly, you&#8217;ve got to secure many more things. The attack surface gets much bigger. No longer are you doing things like hardening the edges, and then you won&#8217;t look behind it.</p>
<p>The biggest challenge now is that every developer has to be that much more conscious of security. There&#8217;s a lot more things, there&#8217;s a lot more attack surface and there&#8217;s a lot more communication going between all those things that is exposed.</p>
<p><b>What kind of tooling and techniques are important for microservices security?</b></p>
<p>Bryant: There are things like web application firewalls, [which are] very popular. A lot of companies I&#8217;ve worked with use things like F5, and they&#8217;re actually F5 firewalls. Increasingly, we&#8217;re seeing more software firewalls, even with Amazon.</p>
<p>That&#8217;s clearly prevention, but you also need to think about detection. So, basic stuff: logging low bands in traffic, logging the web traffic, logging SSH [Secure Socket Shell] access. [In] any public-facing web server, if you look through the logs, people are constantly probing the edges. [So,] you want to see [if it&#8217;s] only from this IP address or only from this country … you want to be doing sort of some kind of like continual analysis of where stuff is coming from.</p>
<p>[Also,] what attacks are there? What vectors are they trying to probe? If you&#8217;re not patching your systems, they may sort of get lucky one day. So, you definitely need detection and need to make sure everything&#8217;s patched up. [People will say:] &#8216;Yeah, we spend all this money on networks and on compute.&#8217; That&#8217;s all great stuff, but don&#8217;t forget about the application. If the application has a massive vulnerability, all that other stuff is for nothing. It only takes one point of entry for someone to get in and start doing damage.</p>
<p>I definitely think things like threat modeling [are also] super useful. Understand how threats work, what threats there are and model how they might attack your system. And often, I find, a side effect of modeling things properly opens up my eyes to different ways things happen. So, if you start doing attack vectors, you suddenly think, &#8216;Well, I&#8217;m really hardening this thing in the application,&#8217; where you realize there&#8217;s a massive flaw in your email system or something.</p>
<p>[And] OWASP [Open Web Application Security Project], they&#8217;re an awesome organization. They have a bunch of language sort of diagnostic tools for scanning for critical vulnerabilities in dependencies. So, if I&#8217;m using Java or Maven, I can put it in my Maven Palm. If I&#8217;m using Ruby, I can put it in my gems.</p>
<p><b>What&#8217;s the question everyone should be asking when it comes to microservices security?</b></p>
<p>Bryant: How can I contribute? Ask your team, ask your management, your leaders: What can I do? What&#8217;s my job in relation to our security? Should I be following certain standards? Should I be double-checking my work? These kind of things [are] the most critical.</p>
<p>I really think microservices security isn&#8217;t massively different to traditional security. As developers, we&#8217;re taking on more and more &#8230; I&#8217;ve got to be an operations person as well as the developer. You know, front end, back end, all these things. If you&#8217;re not careful, you become like sort of a mile wide and an inch deep.</p>
<p>But at the same time, if you as a developer are really well-educated across the stack but don&#8217;t know too much about security, it&#8217;s very easy to leave massive holes. If you leave some massive security holes, that&#8217;s potentially very bad. So, developing awareness, modeling, documenting, sharing, coming to conferences, chatting with people, learning as much as you can … those are all important.</p>
<p><b>What do you find that experts are still scratching their heads about when it comes to microservices security … the one thing that people still can&#8217;t really seem to get right?</b></p>
<p>Bryant: It&#8217;s not tacked [specifically] to microservices; it&#8217;s more of a case of as the world is getting more and more connected. There are things like bitcoin [that are] more and more attractive for attackers to attack now.</p>
<p>I think, as an industry, we&#8217;re not as responsible as we should be. So, it&#8217;s more of a case it&#8217;s just the human factor again. Are we paying enough attention to it as developers or as architects? Are we doing things like defense in depth? Are we doing things like auditing and logging and then looking back on those things? There&#8217;s some basic stuff like terms of coding which, we again, we don&#8217;t do.</p>
<p><b>When it comes to security, what was better in a traditional architecture like service oriented architecture (SOA) versus a distributed microservices architecture?</b></p>
<p>Bryant: Not much has changed in the principle point of view. The only thing I would say [is that], with SOA, we had a lot more governance. SOA was driven by the vendors&#8217; law … [they] were saying, &#8216;You must use my ESB [enterprise service bus] or my [particular] technology.&#8221; There were a lot of disadvantages to that, but one of the advantages was that someone owned it. So, you have this ESB, this thing [managing] all the connections within your services [and it&#8217;s] their ass on the line basically. So, they really invested in policy and governance and all these kind of things. And if something went wrong, you knew who to call.</p>
<p>Whereas, these days, we go towards more lightweight technologies, but you have to take more responsibility as a developer and as an architect. The governance and policy and stuff, as bad as it sometimes was, there was an upside to it. It&#8217;s even the same with politics: the more control you have, the obviously less freedom you have, but it&#8217;s a balance that&#8217;s somewhere in there.</p>
<p><b>How can DevOps teams best work with security teams to ensure services are secured?</b></p>
<p>Bryant: The whole DevOps philosophy is about joining everyone together. So, a lot of consultancies I worked on we really try and bring in infosec [information security] &#8212; in a classic organization, they&#8217;re often called infosec. Bring them into the project early, because they&#8217;re generally good people, but they&#8217;re not consulted until things are going live. So, you have to get them involved earlier. Their knowledge is super valuable, so getting them involved earlier is great.</p>
<p>The post <a href="https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/">The challenges of microservices security and how to handle them</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/the-challenges-of-microservices-security-and-how-to-handle-them/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Tips for Securing a Modernized Service-Based Architecture</title>
		<link>https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/</link>
					<comments>https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 18 Jul 2017 07:19:27 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[Architecture]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DevSecOps Philosophy]]></category>
		<category><![CDATA[freelancing website]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=135</guid>

					<description><![CDATA[<p>Source &#8211; business2community.com Over the decades, the monolithic, tiered approach to building software has given way to a more distributed, component-based architecture commonly referred to as “microservices,” although some components <a class="read-more-link" href="https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/">Tips for Securing a Modernized Service-Based Architecture</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211;<strong> business2community.com</strong></p>
<p>Over the decades, the monolithic, tiered approach to building software has given way to a more distributed, component-based architecture commonly referred to as “microservices,” although some components aren’t “micro” at all. Separating out an app’s services into isolated, interoperable containers has revolutionized the way developers are able to update, add to, or expand parts of an app.</p>
<p>Microservices aren’t the perfect fit for every scenario, but for many this approach makes it far easier to build out a complex application from loosely coupled, reusable pieces. Whether an app is being run on your server, or within Docker, or on a cloud-based platform like Amazon Web Services (AWS), creating a distributed environment allows developers to divide and conquer without a lot of dependencies.</p>
<p>That said, while microservices have freed us from many of the constraints of the monolith, these benefits come with increased complexity, vulnerabilities, and risks that need to be mitigated with a tailored security strategy.</p>
<h3>Monolith vs. Microservice</h3>
<p>If you’re modernizing your app by making the move to a microservice-based architecture or starting from scratch, here’s a look at some key things to consider when it comes to securing your app from attack.</p>
<p>In a world of rapid iteration and frequent deployments, the monolith approach can be much like a Jenga tower: tinkering with parts of the whole may cause the whole structure to topple. When credentials are compromised, it’s easier to take down the whole app. On the flipside, it can be easier to secure because authentication is global (only one auth request needs to be made per user request), and there’s likely only one type of data store to encrypt.</p>
<p>However, when updates, bug fixes, or failures are being made to isolated components in a microservice-based app, all of a sudden it gets much easier to patch parts and pieces without updating the entire structure. Consider this vs. a traditional, monolithic approach, which is tiered instead of compartmentalized, and securing a microservice-based architecture will look quite different.</p>
<p>Right off the bat, you’re able to create a more diverse, app-specific security strategy and it’s easy to apply access permissions on a component-by-component basis. To implement that strategy well requires strict API management, visibility into each component, and a clear roadmap of how everything works together—and that’s where things get tricky.</p>
<blockquote><p>“Establishing and respecting clear component boundaries is an architectural imperative as system complexity grows. HTTP-based services and service contracts (see below) constitute clear, bright lines that support the separation of logical subsystems and help engineers maintain and evolve these boundaries consciously.”</p></blockquote>
<p>Stratis Karamanlakis, Chief Technology Officer, Upwork, from <em>Upwork Modernization: An Overview</em>.</p>
<p>When it comes to securing an application from hacks, knowing how it’s built and how it works is paramount to knowing how to properly secure it, but getting a bird’s eye view of that many moving parts requires discipline, organization, and foresight.</p>
<h3>The Microservice Security Challenge</h3>
<p>No matter how an application is constructed, security concerns typically reside in one bottleneck: the network. For microservices, this gets exacerbated due to the various network connections and APIs used to forge communication channels between all those components. These create more inroads for attack and interception of in transit data.</p>
<p>With a monolith, there are typically one or more servers within a network, which makes it easier to focus on the exposed ports and APIs, identify an IP address, and configure a perimeter around it. With microservices, this gets much more complex with many exposed ports and API gateways—and authentication becomes a distributed matter, too. At the risk of oversimplifying, all this means that running a distributed system means you need to enforce a distributed security approach, and everyone has to be on board to make it a success.</p>
<h3>The Microservices Culture Shift: Adopting a DevSecOps Philosophy</h3>
<p>Like we mentioned above, microservices aren’t the best solution for every application, but for those that it offers clear benefits, much of getting over that hurdle from monolith to microservices is a shifting of mindset.</p>
<p>You’ve likely heard of DevOps; <em>DevSecOps</em> is the security-specific philosophy that ensures a component’s security doesn’t take a back seat to its logic.</p>
<p>Abby Fuller, a developer advocate with AWS, said the following in a talk with WeaveWorks, a container management company: “To switch from a monolithic network to one comprised of synergistically functioning microservices, a company will need to transform both its culture and its system’s architecture. This process will not simply be a matter of atomizing the monolithic system into microservices. Service partnerships will be required to effectively manage the added complexities of testing, deploying and operating multiple microservices.”</p>
<h3>Leverage the Good; Minimize the Bad</h3>
<p>With your app’s components and services isolated, there are some clear security benefits, not the least of which is a <strong>reduced attack surface area</strong>. The best way to think about this is to picture a bank vault. If all of the money was stored in a large vault, a thief only has to crack one safe door to access all of the money. If it’s stored in many smaller safes, the thief’s job suddenly gets much more difficult. Microservices shrink that attack surface area because you don’t have all of your eggs in one basket.</p>
<p>Other advantages:</p>
<ul>
<li><strong>You can be more granular.</strong> If you think of security as coarse-grained or fine-grained, microservices security can be much more fine-grained, applying service-specific rules to containers, APIs, and firewalls.</li>
<li><strong>You can be more diverse.</strong> Without all of your eggs in one basket, you can apply different rules and layers to different components, mixing up your tactics.</li>
<li><strong>You can tailor access requirements.</strong> Implement a “model of least privilege” on a service-by-service basis to tailor what services can do, e.g. read-only vs. read/write.</li>
<li><strong>You can better distribute responsibility.</strong> Each team can distinctly define precisely how their component should be interacted with. This is an advantage on a larger scale because the people who are closest to the code know its nuances better than a firewall team further upstream.</li>
</ul>
<p>What all of this means for a microservices-based app is that, right off the bat, it’s much easier to protect with a “<strong>defense in depth</strong>” strategy—something that’s more difficult to accomplish with a monolithic architecture. To really capitalize on these benefits, it’s important to adjust the way you think about security for your application—because it’s a big shift from the old way of securing things.</p>
<p>Note that a microservices environment can amplify some existing security issues of the monolith, like network communications. Because services are decentralized and separated, how they communicate with one another is no longer internal, <strong>it’s happening over a network</strong>. The network security bottleneck therefore gets tricky, and access control gets more complex.</p>
<p>Within a microservices architecture, there are bound to be lots of transactions and interactions. Thus, the security of the app hinges on those container interactions, and knowing what they are and when they happen.</p>
<h3>Tips to Approaching Microservices Security</h3>
<p>The keys to securing a microservices environment? Getting into a DevOps state of mind, securing REST API gateways and permissions, and creating plenty of visibility into each service and the way they communicate with one another. Let’s break these down into some actionable tips.</p>
<h4>1. Establish visibility into the entire infrastructure by mapping out each microservice and inter-service communication.</h4>
<p>Having a clear, detailed map of each service, its dependencies, what other services it communicates with, and when and why those interactions happen will not only give you insight into how to best secure them and authenticate their access, it will also be a baseline to compare any aberrations against.</p>
<h4>2. Implement “defense in depth.”</h4>
<p>Layer your network security defenses. System firewalls aren’t enough; you’ll want to go component-by-component, pinpointing the most sensitive functions and data and locking them down with a “defense in depth” approach.</p>
<p>This can include <strong>building fine-grained firewalls between services</strong>. Fine-grained firewalling of containers and services ]creates safe dividers between services, creating and applying sets of firewall rules to each container with host-to-host encryption. Automation becomes a near necessity as this gets incredibly time-consuming and complex with traditional configuration management tools.</p>
<h4>3. Rethink team structures.</h4>
<p>The very philosophy behind microservices—many parts contributing to a greater whole—should also apply to a team structure supporting the development and security of the app. Security shouldn’t be a separate, standalone role from development, especially when there are so many small, moving parts.</p>
<p>Assemble teams whose contributions improve your product, not just a specific project. You want teams to complement one another and be aware of interrelated issues, not be silo-ed. Security isn’t always in the forefront for developers who are more (and rightfully) focused on logic, but making this a part of the team mindset can keep it more top of mind. Sitting them beside a security expert, while a simplified analogy, is a great way to ensure it’s secure from the ground up. This is something Netflix has done with its Platform Security Team, with great results.</p>
<h4>4. Diversify your security tactics.</h4>
<p>Your approaches to security can be varied. Think of each component like a locked room in a house. By applying different locking mechanisms to each door, if a thief breaks into one, they haven’t figured out how to crack every other door. Avoiding uniformity in your microservices security is helpful.</p>
<h4>5. APIs are like communication contracts. Enforce them.</h4>
<p>So how do all those components join forces to become an app as a whole? They have to communicate over the network, and it’s those communications that present the most complexity (and vulnerability) for a microservices-based app. If your application’s services handle sensitive data that require <strong>compliance</strong>, you’ll want to be extra strict about how services communicate with one another.</p>
<p>API gateways are typically how microservices communicate with one another, so protecting those APIs are important. Create rules around these communications so they act like contracts. This means creating very well-built APIs that use features like throttling, authentication, or access tokens from a centralized authorization server.</p>
<p>Protecting the “pipes” should be a priority. AWS customers can use their proprietary API gateway service, which offers the ability to host multiple app versions, safely store API keys, throttle requests to the API, and more.</p>
<h4>6. Find an encryption strategy that works for you.</h4>
<p>Part of any good defense in depth strategy should include encryption measures like HTTPS transport security to protect data <em>in transit</em> and <em>at rest</em>. HTTPS encrypted connections with certificate-based security (like SSL) become especially critical when your data travels externally from the network, and key management should be, too. While it’s a great default, it’s not a solution for all problems. Depending on the overhead it creates for your app, you might also consider other strategies.</p>
<p>Encrypting <em>databases</em> with microservices has its advantages, as well. With a monolith, it’s tricky to encrypt on a by-table basis, but with data stores broken up between microservices, it’s easier to decide on a component-by-component basis what needs encrypting and to what degree.</p>
<h4>7. Code securely from the ground up.</h4>
<p>Of course, writing code from day one that’s designed to be secure is optimal, and microservices are no different from other software in this respect. However, with microservices there’s a decentralized responsibility and accountability for individual components, so each has to be able to stand on its own security-wise.</p>
<h4>8. Align with the “Principle of Least Access.”</h4>
<p>Limit permissions to the bare minimum needed. This is an excellent rule of thumb across all areas of security. Restricting access between microservices is beneficial in the same way restricting access to a human is—the less access, the better.</p>
<p>Like we mentioned before, authentication becomes distributed between components. You can use the Spring Security framework with OAuth 2.0 and OpenID Connect for scalable delegation, access controls, and user identity. For AWS customers, Amazon’s IAM allows for user roles and permissions. By only giving services the permissions they need to function, you’re making things more difficult for hackers.</p>
<h4>9. Automation is your friend!</h4>
<p>There’s a harsh truth that comes along with the convenience of microservices, and that’s how tending to each can be incredibly time-consuming. For deployment, a service like AWS’ Lambda can help with automation during the development process, but automation can also be helpful from a security standpoint, as well. For automated security assessments, AWS offers Amazon Inspector to run audits and assess vulnerabilities and compliance.</p>
<h4>10. Make testing a regular part of the build, update, and maintenance program.</h4>
<p>The beauty of microservices is how it supports Agile development and the rapid deployment of new services, but this means that things are always changing within an app, so the security approach needs to be just as nimble.</p>
<p>Upwork’s CTO, Stratis, also notes “Testing a large distributed system is hard, and continuous delivery makes this harder since the shared runtime environment is changing constantly. We are seeing promising results with contract testing, which is one of the various microservices testing strategies we’ve considered.”</p>
<p>Every time a component is updated, test it and scan it for vulnerabilities. If they’re already running in their own containers, this is a bit easier. Or, you could set up a monitoring platform to keep an eye on the system as a whole, picking up any abnormal communications between microservices that might indicate a problem. Either way, the map we mentioned earlier still plays an important role and needs to remain updated. With everything visualized, anomalies will be easier to spot.</p>
<p><strong>Sidenote: Running on AWS?</strong></p>
<p>AWS is packed with security features that you can pick and choose from to suit your needs, covering everything from key management with CloudHSM and SSL certificates to Identity Access Management (IAM), firewalls, and DDoS protection.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/">Tips for Securing a Modernized Service-Based Architecture</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/tips-for-securing-a-modernized-service-based-architecture/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
	</channel>
</rss>
