SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Sysdig Secure DevOps Platform
Eric Tan
Senior Sales Engineer
Server
Virtual Machine
Operating System
Cloud-Native Architecture
Web
Middleware
Database
Storage
MONOLITH
Firewall
Load Balancer
Security
CATALYSTS CLOUD NATIVE
APPLICATIONS MICROSERVICES PERSISTENCE
Cloud-Native Organisation
Change Control
MONOLITH TEAMS
Security
Infrastructure
Operations
CATALYSTS CLOUD NATIVE
Specialists DevSecOps Site Reliability
Engineering
Chapters Ambidextrous
Organizations
Squads Tribes
Cross-functional
Teams
“Pizza” Teams
Development
Networks
Storage
Risk
Backup
Database
Mean Time To Recovery
Insights To Fix Fast
Time To Market
DevSecOps Enabler
Day 2 Operations
Application Assurance
Need Confidence?
Shifting Business Needs
| Sysdig Inc. Proprietary Information5
Cloud native leaves you blind
Security and operations fail without context
Containers disappear and leave no trail
You
can’t
secure
what
you
cannot
see
| Sysdig Inc. Proprietary Information6
• Not container native
• No Kubernetes context
• Not built for DevOps
• Invasive instrumentation
• Limited Kubernetes context
• Lack scale and data depth for
cloud-native forensics
Legacy tools Point solutions
Legacy and Point Solutions Do Not Work
Cloud native requires specific tools
Purpose-built
Introducing Sysdig
Sysdig Secure DevOps for Cloud Native
• Founded by Wireshark
co-creator
• Contributed Falco to CNCF
• Supported open-source
sysdig (10M+ downloads)
• Customer expansion mirrors
cloud-native adoption
• Trusted by the largest
enterprises
• Cloud-native security
and monitoring
• Provides visibility and
control for secure operations
Open by design Strong momentumEcosystem integration
| Sysdig Inc. Proprietary Information9
Embed security Maximize availability Validate compliance
Sysdig Secure DevOps Platform
Converging visibility and security for production deployments
Sysdig Secure DevOps Platform
Sysdig MonitorSysdig Secure
| Sysdig Inc. Proprietary Information10
Sysdig Secure DevOps Platform
RespondRunBuild
Unified Workflow Across the Cloud-Native Lifecycle
CI/CD Security
Registry Security
Apps
Context
Infrastructure
master node node
Alerts
Event Forwarding/Audit/IR
SIEM
Security PoliciesConfigurationVulnerabilities Metrics Events Audit logsAlerts Syscall capturesEvents
SaaSSelf-hosted
SYSDIG
PLATFORM
--
DB, UX & API
SYSDIG AGENT
--
CONTAINER
CONTAINER 3
--
CONTAINER 1
--
CONTAINER 2
--
eBPF / KERNEL INSTRUMENTATION
HOST
DATA
COLLECTION
SECURITY
ENFORCEMENT
IMAGE
DETECTION &
SCANNING
A New Source Of Truth
Giving Data Relevance
HOST HOST HOST HOST
HOST HOST HOST HOST
HOST HOST HOST HOST
HOST HOST HOST HOST
SERVICEVISIONTM
Application Team X
Namespace = Application Team X
Application Team Y
Project = Application Team Y
DB Admin
Deployment contains ‘db’
HOST HOST
HOST
HOST HOST
HOST HOST HOST
Infra Admin
Host contains ‘production’
Leverage existing metadata already in
your Orchestrator to organize your
application and infrastructure views
MULTI-CLOUD / MULTI-CLUSTER
Cloud Native Infrastructure (PaaS)
RHEL / ATOMIC HOST
RHEL / ATOMIC HOST
Host
NODE
POD APP
POD APP
Sysdig Agent
RHEL / ATOMIC HOST
RHEL / ATOMIC HOST
Host
MASTER NODE
Sysdig Agent
CI/CD/GitOps
DevSecOps
Image
Registry
Container
Build
Sysdig UI
Persistent Storage
API / Authentication
Management
Scheduler
Replication
Network Overlay / Service Mesh
Sysdig Monitor
observability &
reliability
Physical & Logical Network
Application Delivery Controller Firewalls
End Users
Sysdig Platform Full-
stack application
assurance, a
combination of ...
Sysdig Secure
protection &
assurance
Secrets
Management
POD APP
Logging
Complementary, For Increased Assurance
SIEM
HIDS
Anti-Virus
| Sysdig Inc. Proprietary Information14
DevOps
Secure DevOps Across Cloud-Native Lifecycle
• Incident Response
• Forensics
• Audit
• Runtime Security
• Vulnerability Reporting
• Troubleshooting• Infrastructure Monitoring
• Application Monitoring
• Image Scanning
Continuous Compliance (PCI, NIST, CIS, etc.)
RespondRunBuild
Unified platform for security and DevOps use cases
Secure
DevOps
• Configuration Validation
Demo

Contenu connexe

Tendances

Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
Volodymyr Shynkar
 
AWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best PracticesAWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best Practices
Amazon Web Services
 

Tendances (20)

Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
 
Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023
Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023
Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
AWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best PracticesAWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best Practices
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Deep Dive into AWS SAM
Deep Dive into AWS SAMDeep Dive into AWS SAM
Deep Dive into AWS SAM
 

Similaire à The Sysdig Secure DevOps Platform

Similaire à The Sysdig Secure DevOps Platform (20)

Frictionless Application Development: Radically Change How You Secure and Mo...
Frictionless Application Development:  Radically Change How You Secure and Mo...Frictionless Application Development:  Radically Change How You Secure and Mo...
Frictionless Application Development: Radically Change How You Secure and Mo...
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
 
Journey to cloud engineering
Journey to cloud engineeringJourney to cloud engineering
Journey to cloud engineering
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Back to the Future: Containerize Legacy Applications - Rob Tanner, Northern T...
Back to the Future: Containerize Legacy Applications - Rob Tanner, Northern T...Back to the Future: Containerize Legacy Applications - Rob Tanner, Northern T...
Back to the Future: Containerize Legacy Applications - Rob Tanner, Northern T...
 
AWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container AdoptionAWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container Adoption
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
 
Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
To the Cloud and beyond (Nantes, Rebuild 2018)
To the Cloud and beyond (Nantes, Rebuild 2018)To the Cloud and beyond (Nantes, Rebuild 2018)
To the Cloud and beyond (Nantes, Rebuild 2018)
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 

Plus de Ashnikbiz

Plus de Ashnikbiz (20)

CloudOps_tool.pptx
CloudOps_tool.pptxCloudOps_tool.pptx
CloudOps_tool.pptx
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptxWebinar_CloudOps final.pptx
Webinar_CloudOps final.pptx
 
Autoscaling in Kubernetes (K8s)
Autoscaling in Kubernetes (K8s)Autoscaling in Kubernetes (K8s)
Autoscaling in Kubernetes (K8s)
 
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Why and how to use Kubernetes  for scaling of your  multi-tier (n-tier) appli...Why and how to use Kubernetes  for scaling of your  multi-tier (n-tier) appli...
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
 
Zero trust in a multi tenant environment
Zero trust in a multi tenant environment  Zero trust in a multi tenant environment
Zero trust in a multi tenant environment
 
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Deploy and automate ‘Secrets Management’ for a multi-cloud environmentDeploy and automate ‘Secrets Management’ for a multi-cloud environment
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
 
Deploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platformsDeploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platforms
 
Deploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platformsDeploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platforms
 
The Best Approach For Multi-cloud Infrastructure Provisioning-2
The Best Approach For Multi-cloud Infrastructure Provisioning-2The Best Approach For Multi-cloud Infrastructure Provisioning-2
The Best Approach For Multi-cloud Infrastructure Provisioning-2
 
The Best Approach For Multi-cloud Infrastructure Provisioning
The Best Approach For Multi-cloud Infrastructure ProvisioningThe Best Approach For Multi-cloud Infrastructure Provisioning
The Best Approach For Multi-cloud Infrastructure Provisioning
 
Which PostgreSQL is right for your multi cloud strategy? P2
Which PostgreSQL is right for your multi cloud strategy? P2Which PostgreSQL is right for your multi cloud strategy? P2
Which PostgreSQL is right for your multi cloud strategy? P2
 
Which PostgreSQL is right for your multi cloud strategy? P1
Which PostgreSQL is right for your multi cloud strategy? P1Which PostgreSQL is right for your multi cloud strategy? P1
Which PostgreSQL is right for your multi cloud strategy? P1
 
Reduce the complexities of managing Kubernetes clusters anywhere 2
Reduce the complexities of managing Kubernetes clusters anywhere 2Reduce the complexities of managing Kubernetes clusters anywhere 2
Reduce the complexities of managing Kubernetes clusters anywhere 2
 
Reduce the complexities of managing Kubernetes clusters anywhere
Reduce the complexities of managing Kubernetes clusters anywhereReduce the complexities of managing Kubernetes clusters anywhere
Reduce the complexities of managing Kubernetes clusters anywhere
 
Enhance your multi-cloud application performance using Redis Enterprise P2
Enhance your multi-cloud application performance using Redis Enterprise P2Enhance your multi-cloud application performance using Redis Enterprise P2
Enhance your multi-cloud application performance using Redis Enterprise P2
 
Enhance your multi-cloud application performance using Redis Enterprise P1
Enhance your multi-cloud application performance using Redis Enterprise P1Enhance your multi-cloud application performance using Redis Enterprise P1
Enhance your multi-cloud application performance using Redis Enterprise P1
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

The Sysdig Secure DevOps Platform

  • 1. Sysdig Secure DevOps Platform Eric Tan Senior Sales Engineer
  • 2. Server Virtual Machine Operating System Cloud-Native Architecture Web Middleware Database Storage MONOLITH Firewall Load Balancer Security CATALYSTS CLOUD NATIVE APPLICATIONS MICROSERVICES PERSISTENCE
  • 3. Cloud-Native Organisation Change Control MONOLITH TEAMS Security Infrastructure Operations CATALYSTS CLOUD NATIVE Specialists DevSecOps Site Reliability Engineering Chapters Ambidextrous Organizations Squads Tribes Cross-functional Teams “Pizza” Teams Development Networks Storage Risk Backup Database
  • 4. Mean Time To Recovery Insights To Fix Fast Time To Market DevSecOps Enabler Day 2 Operations Application Assurance Need Confidence? Shifting Business Needs
  • 5. | Sysdig Inc. Proprietary Information5 Cloud native leaves you blind Security and operations fail without context Containers disappear and leave no trail You can’t secure what you cannot see
  • 6. | Sysdig Inc. Proprietary Information6 • Not container native • No Kubernetes context • Not built for DevOps • Invasive instrumentation • Limited Kubernetes context • Lack scale and data depth for cloud-native forensics Legacy tools Point solutions Legacy and Point Solutions Do Not Work Cloud native requires specific tools Purpose-built
  • 8. Sysdig Secure DevOps for Cloud Native • Founded by Wireshark co-creator • Contributed Falco to CNCF • Supported open-source sysdig (10M+ downloads) • Customer expansion mirrors cloud-native adoption • Trusted by the largest enterprises • Cloud-native security and monitoring • Provides visibility and control for secure operations Open by design Strong momentumEcosystem integration
  • 9. | Sysdig Inc. Proprietary Information9 Embed security Maximize availability Validate compliance Sysdig Secure DevOps Platform Converging visibility and security for production deployments Sysdig Secure DevOps Platform Sysdig MonitorSysdig Secure
  • 10. | Sysdig Inc. Proprietary Information10 Sysdig Secure DevOps Platform RespondRunBuild Unified Workflow Across the Cloud-Native Lifecycle CI/CD Security Registry Security Apps Context Infrastructure master node node Alerts Event Forwarding/Audit/IR SIEM Security PoliciesConfigurationVulnerabilities Metrics Events Audit logsAlerts Syscall capturesEvents SaaSSelf-hosted
  • 11. SYSDIG PLATFORM -- DB, UX & API SYSDIG AGENT -- CONTAINER CONTAINER 3 -- CONTAINER 1 -- CONTAINER 2 -- eBPF / KERNEL INSTRUMENTATION HOST DATA COLLECTION SECURITY ENFORCEMENT IMAGE DETECTION & SCANNING A New Source Of Truth
  • 12. Giving Data Relevance HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST HOST SERVICEVISIONTM Application Team X Namespace = Application Team X Application Team Y Project = Application Team Y DB Admin Deployment contains ‘db’ HOST HOST HOST HOST HOST HOST HOST HOST Infra Admin Host contains ‘production’ Leverage existing metadata already in your Orchestrator to organize your application and infrastructure views MULTI-CLOUD / MULTI-CLUSTER
  • 13. Cloud Native Infrastructure (PaaS) RHEL / ATOMIC HOST RHEL / ATOMIC HOST Host NODE POD APP POD APP Sysdig Agent RHEL / ATOMIC HOST RHEL / ATOMIC HOST Host MASTER NODE Sysdig Agent CI/CD/GitOps DevSecOps Image Registry Container Build Sysdig UI Persistent Storage API / Authentication Management Scheduler Replication Network Overlay / Service Mesh Sysdig Monitor observability & reliability Physical & Logical Network Application Delivery Controller Firewalls End Users Sysdig Platform Full- stack application assurance, a combination of ... Sysdig Secure protection & assurance Secrets Management POD APP Logging Complementary, For Increased Assurance SIEM HIDS Anti-Virus
  • 14. | Sysdig Inc. Proprietary Information14 DevOps Secure DevOps Across Cloud-Native Lifecycle • Incident Response • Forensics • Audit • Runtime Security • Vulnerability Reporting • Troubleshooting• Infrastructure Monitoring • Application Monitoring • Image Scanning Continuous Compliance (PCI, NIST, CIS, etc.) RespondRunBuild Unified platform for security and DevOps use cases Secure DevOps • Configuration Validation
  • 15. Demo