using cloud native technologies to solve complex application … · 2019-12-20 · 2 cequence...

17
Using Cloud Native Technologies to Solve Complex Application Security Challenges in Kubernetes Deployments

Upload: others

Post on 09-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

Using Cloud Native Technologies to Solve Complex Application Security Challenges in Kubernetes

Deployments

Page 2: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

2

Cequence Security: A Cloud Native Approach to Application Security

• Venture-backed start-up bringing much-needed innovation to application security

• Award-winning AI-powered security platform delivered as containers to protect web, mobile, API-based applications from bot attacks and vulnerability exploits

• Built on top of cloud native components like Kubernetes and Prometheus

• Plays well with existing ingress controllers and Sidecars like Envoy and NGINX, without needing to replace them

• Visit us at www.cequence.ai

DATA CENTER

PUBLIC CLOUD

CLOUD NATIVE

Page 3: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

3

Supplier APIPartner API

Web Customer Mobile Customer

Your Public Facing Applications Are Attack Targets

Business Logic Abuse

• Highly automated• Content appears legitimate• Difficult to detect and block

Vulnerability Exploits

• Highly targeted• Exploiting app vulnerabilities• Both known and unknown

Page 4: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

4

Runtime Application Protection for Monolithic Applications

Internet

Load Balancer

MONOLTHICAPPLICATIONS

Frontend

Data Access

Business LogicWAF

Breach

Vulnerability Scan

PUBLIC CLOUDDATA CENTER

Page 5: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

5

Internet

Runtime Application Protection for Monolithic Applications

Load Balancer

Fake AccountsCredential

Stuffing

Fake Likes

Inventory Lockup

Scraping

MONOLTHICAPPLICATIONS

Frontend

Data Access

Business LogicWAF

Breach

Vulnerability Scan

PUBLIC CLOUDDATA CENTER

BOT

Page 6: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

6

Runtime Application Protection for Monolithic Applications

Internet

MONOLTHICAPPLICATIONS

Frontend

Data Access

Business Logic

Load Balancer

Fake AccountsCredential

Stuffing

Fake Likes

Inventory Lockup

Scraping

WAF

Breach

Vulnerability Scan

PUBLIC CLOUDDATA CENTER

BOTApp DDOS

Application Floods

Page 7: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

7

Monolith to Microservices

MONOLTHICAPPLICATIONS

User Interface

Data Access

Business Logic

User Interface

API

</>

API

</>API

</>

API

</>

API</>

USER MANAGEMENTMICROSERVICE

SHOPPING CARTMICROSERVICE

DATA ACCESSMICROSERVICE CUSTOMER REVIEWS

MICROSERVICE

INVENTORY MGMTMICROSERVICE

Page 8: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

8

New Security Challenge: Increased Entry Points

User Interface

API

</>

API

</>API

</>

API

</>

API</>

USER MANAGEMENTMICROSERVICE

SHOPPING CARTMICROSERVICE

DATA ACCESSMICROSERVICE CUSTOMER REVIEWS

MICROSERVICE

INVENTORY MGMTMICROSERVICEInternet

Fake Accounts

Credential Stuffing

Fake Likes

Inventory Lockup

Scraping

WAF

Breach

Vulnerability Scan

BOTApp DDOS

Application Floods

Page 9: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

9

New Security Challenge: Keep up with DevOps Pace

User Interface

API

</>

API

</>API

</>

API

</>

API

</>

USER MANAGEMENTMICROSERVICE

SHOPPING CART v2MICROSERVICE

DATA ACCESSMICROSERVICE CUSTOMER REVIEWS

MICROSERVICE

INVENTORY MGMTMICROSERVICE

API

</>

SHOPPING CART MICROSERVICE

API

</>

CUSTOMER RATINGSMICROSERVICE

Internet

Fake Accounts

Credential Stuffing

Fake Likes

Inventory Lockup

Scraping

WAF

Breach

Vulnerability Scan

BOTApp DDOS

Application Floods

Page 10: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

10

New Security Challenge: Heterogeneous Environments

User Interface

API

</>

API

</>API

</>

API

</>

API

</>

USER MANAGEMENTMICROSERVICE

SHOPPING CARTMICROSERVICE

DATA ACCESSMICROSERVICE CUSTOMER REVIEWS

MICROSERVICE

INVENTORY MGMTMICROSERVICEInternet

Fake Accounts

Credential Stuffing

Fake Likes

Inventory Lockup

Scraping

WAF

Breach

Vulnerability Scan

BOTApp DDOS

Application Floods

Page 11: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

11

New Security Challenge: Multi-Cloud Environments

User Interface

API

</>

API

</>API

</>

API

</>

API

</>

USER MANAGEMENTMICROSERVICE

SHOPPING CARTMICROSERVICE

DATA ACCESSMICROSERVICE CUSTOMER REVIEWS

MICROSERVICE

INVENTORY MGMTMICROSERVICEInternet

Fake Accounts

Credential Stuffing

Fake Likes

Inventory Lockup

Scraping

WAF

Breach

Vulnerability Scan

BOTApp DDOS

Application Floods

Page 12: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

12

New Approach: From Perimeter Defense to Microservices Defense

MONOLTHICAPPLICATIONS

Frontend

Data Access

Business Logic

API</>

App DDoS

Bot

WAF

MICROSERVICES PODS

WAFBOTApp DDOS

Page 13: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

13

Runtime Application Protection for Microservices

User Interface

USER MANAGEMENTMICROSERVICE

SHOPPING CARTMICROSERVICE

DATA ACCESSMICROSERVICE

CUSTOMER REVIEWSMICROSERVICE

InternetINVENTORY MANAGEMENT

MICROSERVICE

API

</>

App DDoS

Bot

WAF

API

</>

App DDoS

Bot

WAF

API

</>

App DDoS

Bot

WAF

API

</>

App DDoS

Bot

WAF

API

</>

App DDoS

Bot

WAF

Page 14: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

14

Must-Haves in Runtime Application Protection for Microservices

• Designed to work with existing applications without making modifications• Non-invasive: no agents, SDK, or JavaScript

• Single pane of glass for all microservices• Protection moves with the microservices to any cloud

• Microservices based protection for protecting other microservices• Co-exist and not replace with existing Ingress Controllers and Sidecars

S I M P L E

R E L E V A N T

E F F E C T I V E

Page 15: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

15

New Security Stack for Microservices

Infrastructure Security

Container Security & Compliance

Runtime Application Protection (WAF, Bot & Application DDoS)

Page 16: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

16

Page 17: Using Cloud Native Technologies to Solve Complex Application … · 2019-12-20 · 2 Cequence Security: A Cloud Native Approach to Application Security •Venture-backed start-up

17

Thank you!