Microservices a security nightmare? GOTO Berlin - Dec 2, 2015 Maximilian Schöfmann Container Solutions Switzerland
|
|
|
- Gabriel Roy Garrett
- 10 years ago
- Views:
Transcription
1
2 Microservices a security nightmare? GOTO Berlin - Dec 2, 2015 Maximilian Schöfmann Container Solutions Switzerland
3
4 Autonomy Security
5 microservices small, hence many services talking over the network built with different technologies by autonomous teams with end-to-end responsibility doing DevOps and Continuous Delivery using containers
6
7 many small services
8
9 talking over the network
10 Java 7 (1.7.0_03)
11 built with different technologies Java 8 nodejs 0.9 Java 7 Ruby 2.1 Go 1.4
12
13 by autonomous teams with end-to-end responsibility
14 (ISC) 2
15 doing DevOps OWASP??
16 Specification Implementation Validation
17 and Continuous Delivery
18
19 using containers
20 using containers XEN Hypervisor - 10^5 LOC Linux Kernel - 10^7 LOC
21
22 many small services
23 talking over the network user_db payment_ data cat_ pictures (stateless) (stateless)
24 talking over the network user_db payment_ data cat_ pictures (stateless) (stateless)
25 Authentication: Basic Auth talking over the network Authorization: Basic c21hcnrhc3muli4ucg==
26 talking over the network Authentication: Client certificates
27 Authentication: API Keys talking over the network X-My-API-Key: YWxsIHVyIGJhc2UgYXJlIGJlbG9uZ3MgMiAgdXMK
28 talking over the network Authentication: HMAC Authorization: AWS FOOBR7EXAMPLE:frJIUN8h81ADYpKg=
29 talking over the network Secrets management vaultproject.io square.github.io/keywhiz
30 talking over the network Single-Sign-On SAML
31 talking over the network Single-Sign-On client SSO service authenticate token request with token verify send response
32 talking over the network Single-Sign-On client SSO service authenticate token request with token send response verify
33 Authorization talking over the network
34 talking over the network Authorization { } "iss":"[email protected]", scope : "aud":" "exp": , "iat":
35 talking over the network ID Tokens { } "sub" : "bob", " " : "[email protected]", "name" : "Bob Example, exp" : , " ["admin", "publisher"]
36 talking over the network Translating ID Tokens Service B JWT dumb token Gateway JWT Service A JWT Service C
37 The Confused Deputy talking over the network
38 talking over the network API Gateways API Gateway Access control Rate limiting HTTPS termination...
39 talking over the network API Gateways API Gateway WAF Payment Svc.
40 built with different technologies
41 by autonomous teams with end-to-end responsibility
42 by autonomous teams with end-to-end responsibility Trust Accountability Expertise Trust Autonomy & Entrepreneurship Collaboration & Support Idea from A.T. Kearny Analysis
43 by autonomous teams with end-to-end responsibility Definition of Done It s not done, before it s fast!
44 by autonomous teams with end-to-end responsibility Definition of Done It s not done, before it s secure!
45 by autonomous teams with end-to-end responsibility Rugged Software Manifesto ruggedsoftware.org
46 doing DevOps SecDevOps? SecOps? DevSec?
47 doing DevOps SecDevOps = Mindset + Tooling
48 and Continuous Delivery
49 and continuous delivery Test pyramid confidence UI tests Service Tests faster feedback Unit Tests from Succeeding with Agile (Mike Cohn)
50 and continuous delivery Security-Test pyramid confidence E2E security tests Vulnerability scanning faster feedback static code analysis
51 and continuous delivery BDD style continuumsecurity.net/bdd-intro.
52 using containers BSD Jails 2000 Solaris Zones 2004 LXC 2008 rkt chroot 2001 Virtuozzo Linux-VServer 2007 cgroups 2013 Docker
53 using containers Defense in depth payment service instance #2 docs upload service instance #1 payment service instance #1 bookmark manager instance #1 cat picture service instance #1 meme generator instance #1
54 using containers Freeze & replace payment service instance #2 docs upload service instance #1 payment service instance #1 payment service instance #1 bookmark manager instance #1 cat picture service instance #1 meme generator instance #1
55 using containers Freeze & replace payment service instance #2 docs upload service instance #1 payment service instance #3 bookmark manager instance #1 cat picture service instance #1 meme generator instance #1
56 using containers Docker security read-only containers minimal base images drop capabilities verify signed images traditional hardening (AppArmor, SELinux )... tinyurl.com/docker-security
57 Scan images for vulnerabilities using containers Nautilus (Docker Inc.) Clair (CoreOS)
58 using containers Secure deployments Docker daemon - just HTTP TLS Authentication Authorisation Logging & Auditing scp git rsync
59 Summary small, distributed services can limit the impact of breaches isolate services with different security requirements use standard mechanisms for auth, but make sure they are scalable consider an API gateway, but don't overuse this pattern
60 Summary monocultures can do harm embrace rugged software principles accountability ensures security is built in, not bolted on invest in automation and tooling around security tools and security testing
61 Summary use containers as additional line of defense use containers as immutable infrastructure if you need to, use containers to do forensics secure your container hosts thoroughly scan images centrally for vulnerabilities abolish obsolete deployment methods
62 Nightmare?
63 Image References (all CC-BY or public domain) Pumpkin: Bill Gates: Anarchy Symbol: Sandwich: Wasp: Whack-a-mole: Rusty container: Server: Rugged vehicle: Certificate: Confused Deputy: Aphid:
64 container-solutions.com
65
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization
Cloud Security with Stackato
Cloud Security with Stackato 1 Survey after survey identifies security as the primary concern potential users have with respect to cloud computing. Use of an external computing environment raises issues
Why Does CA Platform Use OpenShift?
Why Does CA Platform Use OpenShift? The Problem Let s consider an application with a back-end web service. HTTP The service could be Tomcat serving HTML, Jetty serving OData, Node.js serving plain REST
What new with Informix Software as a Service and Bluemix? Brian Hughes IBM
What new with Informix Software as a Service and Bluemix? Brian Hughes IBM 1 Acknowledgements and Disclaimers Availability. References in this presentation to IBM products, programs, or services do not
Building a Continuous Integration Pipeline with Docker
Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites
ISLET: Jon Schipp, Ohio Linux Fest 2015. [email protected]. An Attempt to Improve Linux-based Software Training
ISLET: An Attempt to Improve Linux-based Software Training Jon Schipp, Ohio Linux Fest 2015 [email protected] Project Contributions The Netsniff-NG Toolkit SecurityOnion Bro Team www.open-nsm.net The
Software Defined Everything
Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager [email protected] Joachim Werner Senior Product Manager [email protected] Data Center History - 1970s One (big)
Docker : devops, shared registries, HPC and emerging use cases. François Moreews & Olivier Sallou
Docker : devops, shared registries, HPC and emerging use cases François Moreews & Olivier Sallou Presentation Docker is an open-source engine to easily create lightweight, portable, self-sufficient containers
Containers, Docker, and Security: State of the Union
Containers, Docker, and Security: State of the Union 1 / Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California Joined Docker (dotcloud) more than 4 years ago (I was at Docker
DevOps with Containers. for Microservices
DevOps with Containers for Microservices DevOps is a Software Development Method Keywords Communication, collaboration, integration, automation, measurement Goals improved deployment frequency faster time
Gregory Chomatas @gchomatas. PaaS team
Mesos + Singularity: PaaS automation for mortals Gregory Chomatas @gchomatas PaaS team 120 meters: My shortest travel to a Conference Miletus Thales of Miletus - 624 BC Those who can, do, the others philosophise...
WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security
Introduction to Container Security Table of Contents Executive Summary 3 The Docker Platform 3 Linux Best Practices and Default Docker Security 3 Process Restrictions 4 File & Device Restrictions 4 Application
Practical Guide to Platform as a Service. http://cloud-council.org/resource-hub.htm#practical-guide-to-paas
Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas October, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! Provide
DevOps. Josh Preston Solutions Architect Stardate 69094.1
DevOps Josh Preston Solutions Architect Stardate 69094.1 I keep hearing about DevOps What is it? FOR MANY ORGANIZATIONS, WHAT IS I.T. LIKE TODAY? WATERFALL AND SILOS Application Version X DEVELOPMENT OPERATIONS
Type-C Hypervisors. @DustinKirkland Ubuntu Product & Strategy Canonical Ltd.
Type-C Hypervisors @DustinKirkland Ubuntu Product & Strategy Canonical Ltd. Canonical is the company behind Ubuntu 2004 600+ FOUNDATION EMPLOYEES 30+ COUNTRIES London Beijing Boston Shanghai Taipei What
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
The Bro Network Security Monitor
The Bro Network Security Monitor Bro Live!: Training for the Future Jon Schipp NCSA [email protected] BroCon14 NCSA, Champaign-Urbana, IL Issues Motivations Users: Too much time is spent passing around,
Connectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
How Bigtop Leveraged Docker for Build Automation and One-Click Hadoop Provisioning
How Bigtop Leveraged Docker for Build Automation and One-Click Hadoop Provisioning Evans Ye Apache Big Data 2015 Budapest Who am I Apache Bigtop PMC member Software Engineer at Trend Micro Develop Big
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 What do the experts say? 3 4 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Use Cases for Docker in Enterprise Linux Environment CloudOpen North America, 2014 Linda Wang Sr. Software Engineering Manager Red Hat, Inc.
Use Cases for Docker in Enterprise Linux Environment CloudOpen North America, 2014 Linda Wang Sr. Software Engineering Manager Red Hat, Inc. 1 2 Containerize! 3 Use Cases for Docker in the Enterprise Linux
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
Using Vagrant for Magento development. Alexander Turiak, @HexBrain
Using Vagrant for Magento development Alexander Turiak, @HexBrain $ whoami - Magento developer since 2011 - (Tries to be) Active in Magento community - Co-founded HexBrain in 2013 Key points - What is
Microservices on AWS
Microservices on AWS AWS Summit Berlin 2016 Matthias Jung, Solutions Architect Julien Simon, Evangelist April, 12 th, 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
This release bulletin relates to Version 3.10.4 build 2701 of the Swivel Authentication Platform and other new capabilities.
Swivel Authentication Version 3.10.4 Release Bulletin Introduction This release bulletin relates to Version 3.10.4 build 2701 of the Swivel Authentication Platform and other new capabilities. This latest
Requirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
RED HAT CLOUD SUITE FOR APPLICATIONS
RED HAT CLOUD SUITE FOR APPLICATIONS DATASHEET AT A GLANCE Red Hat Cloud Suite: Provides a single platform to deploy and manage applications. Offers choice and interoperability without vendor lock-in.
An Analysis of Container-based Platforms for NFV
An Analysis of Container-based Platforms for NFV Sriram Natarajan, Deutsche Telekom Inc. Ramki Krishnan, Dell Inc. Anoop Ghanwani, Dell Inc. Dilip Krishnaswamy, IBM Research Peter Willis, BT Plc Ashay
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
The AppSec How-To: Achieving Security in DevOps
The AppSec How-To: Achieving Security in DevOps How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
Reaching for the cloud: the potential and the reality of using cloud-based platforms. Speaker: Michael Michaelides October 22, 2015
Reaching for the cloud: the potential and the reality of using cloud-based platforms Speaker: Michael Michaelides October 22, 2015 Within today s financial services (FS) marketplace, speed to market, agility
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Linux A first-class citizen in Windows Azure. Bruno Terkaly [email protected] Principal Software Engineer Mobile/Cloud/Startup/Enterprise
Linux A first-class citizen in Windows Azure Bruno Terkaly [email protected] Principal Software Engineer Mobile/Cloud/Startup/Enterprise 1 First, I am software developer (C/C++, ASM, C#, Java, Node.js,
IBM Bluemix. The Digital Innovation Platform. Simon Moser ([email protected]) @mosersd
IBM Bluemix The Digital Innovation Platform Simon Moser ([email protected]) @mosersd Who am I? - Senior Technical Staff Member at IBM Research & Development Lab in Böblingen, Germany - Bluemix Application
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Single-sign-on between MWS custom portlets and IS services
Community TechNote Single-sign-on between MWS custom portlets and IS services Abstract Version 2 Updated 22 Sep 2009 This article describes how to use Single- Sign-On in the authentication of MWS portlets
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
The Cloud to the rescue!
The Cloud to the rescue! What the Google Cloud Platform can make for you Aja Hammerly, Developer Advocate twitter.com/thagomizer_rb So what is the cloud? The Google Cloud Platform The Google Cloud Platform
The Software Container pattern
The Software Container pattern Madiha H. Syed and Eduardo B. Fernandez Dept. of Computer and Elect. Eng. and Computer Science Florida Atlantic University, Boca Raton, FL 33431, USA [email protected], [email protected]
Introduction to Openstack, an Open Cloud Computing Platform. Libre Software Meeting
Introduction to Openstack, an Open Cloud Computing Platform Libre Software Meeting 10 July 2012 David Butler BBC Research & Development [email protected] Introduction: Libre Software Meeting 2012
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors Soltesz, et al (Princeton/Linux-VServer), Eurosys07 Context: Operating System Structure/Organization
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS
Automated deployment of a microservice-based monitoring infrastructure. Augusto Ciuffoletti. 6 ottobre 2015
Automated deployment of a microservice-based monitoring infrastructure 6 ottobre Introducing two topics The title: Automated deployment of a microservice-based monitoring infrastructure Microservices Monitoring
RED HAT CONTAINER STRATEGY
RED HAT CONTAINER STRATEGY An introduction to Atomic Enterprise Platform and OpenShift 3 Gavin McDougall Senior Solution Architect AGENDA Software disrupts business What are Containers? Misconceptions
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Architecture Overview
Qubell Adaptive Platform-as-a-Service, Enterprise Edition Architecture Overview 4600 Bohannon Drive, Menlo Park, CA 94025 T 888 855-8940 http://qubell.com Introduction Introduction Qubell Adaptive Platform-as-a-Service
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Considerations for Adopting PaaS (Platform as a Service)
Considerations for Adopting PaaS (Platform as a Service) Michael Dolan ([email protected]) Senior Field Engineer April 2015 1 Becoming The Agile Enterprise To effectively achieve its missions, the Department
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Docker for Sysadmins: what's in it for me?
Docker for Sysadmins: what's in it for me? 1 / 76 Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California Joined Docker (dotcloud) more than 4 years ago (I was at Docker before
OpenShift. Marek Jelen, OpenShift, Red Hat
OpenShift Marek Jelen, OpenShift, Red Hat The problem Ever growing pressure on IT IT becoming the most integral part of most organizations The budgets do not grow as the requirements do Engineers demanding
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Cyber Security for Start-ups: An Affordable 10-Step Plan
SESSION ID: ECO-W03 Cyber Security for Start-ups: An Affordable 10-Step Plan David Cowan Partner Bessemer Venture Partners @davidcowan Acknowledgements Startups don't like friction to get their job done.
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Platform as a Service and Container Clouds
John Rofrano Senior Technical Staff Member, Cloud Automation Services, IBM Research [email protected] or [email protected] Platform as a Service and Container Clouds using IBM Bluemix and Docker for Cloud
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
BDD FOR AUTOMATING WEB APPLICATION TESTING. Stephen de Vries
BDD FOR AUTOMATING WEB APPLICATION TESTING Stephen de Vries www.continuumsecurity.net INTRODUCTION Security Testing of web applications, both in the form of automated scanning and manual security assessment
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Operating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
VMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
A Sumo Logic White Paper. Harnessing Continuous Intelligence to Enable the Modern DevOps Team
A Sumo Logic White Paper Harnessing Continuous Intelligence to Enable the Modern DevOps Team As organizations embrace the DevOps approach to application development they face new challenges that can t
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
