SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Connect Ops and Security with
Flexible Web App and API
Protection
Aneel Dadani
Orlando Barrera II
Agenda
• Introductions
• Security and Visibility
• API and Microservices Protection
• Reduce Friction between DevSecOps
• Demo
Introductions
Orlando Barrera II
Technical Account Manager
Signal Sciences
Aneel Dadani
Technical Account Manager
Signal Sciences
Large enterprises can leverage
applications and APIs running
on premise, in data centers or
cloud. But that scale widens
the attack surface.
THE CHALLENGE:
Protecting Apps
and APIs Across
Infrastructure
IMAGE GOES HERE
API and Microservices
• Where is your application running?
• What APIs do you have?
• Who is accessing your APIs?
• How are your APIs protected?
• What data is your API endpoint
processing?
• Do you have visibility into your
Microservice East to West traffic?
Ask yourself :
Effective Web
and API
Protection
The solution is simple:
developers and operations
staff need application security
that works in production
without maintenance yet
integrates with DevOps tools
and processes.
Signal Sciences Web Application and API Protection (WAAP) Platform
Next-Gen WAF
Complete protection for
your Apps and APIs
RASP
Easy to install Runtime
Application Self-Protection
Bot Protection
Prevent bad bots from
performing malicious
actions
Advanced Rate
Limiting
Control the amount of
requests from potential
threats
API Protection
Stop unauthorized access
to your APIs and
microservices
ATO Protection
Stop account takeover and
credential stuffing
DDoS
Block Denial-of-Service
attacks
Service LayerIntegrated Deployment
Strategic Coverage Across the Enterprise
Advanced Protection at Scale to Match the Velocity of DevOps
Internet
Key Means for
Proactive Web
App and API
Protection
DevOps teams need to
move fast to innovate.
But maintaining release
velocity doesn’t mean
sacrificing security.
Abstract Security, Provide Visibility
Hybrid SaaS Architecture:
Fast Local Decisions Plus
the Power of Cloud
• Optimized local detection via SmartParse,
eliminating false positive decisions
• Decisioning is enriched by Cloud Engine
intelligence – not signatures
• Fail-open design avoids app downtime shut-
downs and blocked access
A New Approach to Web App
and API Protection
Signal Sciences Architecture
Real-time web app protection that scales without impacting performance
Load Balancer
Web Servers
Application
Containers
PaaS
Service Mesh
API Gateway
Hosted Cloud WAF
Reverse Proxy
Slide Title Goes Here on One Deck
• First bulleted copy of point you want to make
• Second bulleted copy point
• Third bulleted copy point etc.
Web Request Volume Protected Per Month
Monolithic Containerization
By 2022, more than 75% of global organizations will be
running containerized applications in production.
Progression to the container world
Servers Monolithic Waterfall
VMs N-Tiered
Systems
Separation
Containers Microservices
DevOps
(DevSecOps)
Monolithic
/catalog
/cart
/reviews
/catalog
/cart
/reviews
• Services must be written in the same language
• Difficult to work on different services in parallel
(“integration hell”)
• Full app needs to be re-deployed with every update
• Scaling requires replicating entire app which can
lead to waste/unnecessary hosting costs
• Services can be in different languages
• Easier to work on services in parallel, add new
services
• Can deploy services individually, enables
continuous deployment.
• Can scale services individually
Microservices
Traditional WAF
• Rules-Based
• Limited Scalability
• Longer Deployment
Next-Gen WAF
• Out-of-the-Box Detection
• Highly Scalable
• Quicker Deployment
sudo apt-get install sigsci-agent
Traditional WAF Next-Gen WAF
Datacenter AWS GCP
Google Cloud Armor
• Different rulesets
• Different UI, feature sets
• Disjointed WAF policy
Datacenter AWS GCP
• Single ruleset
• Single UI, feature set
• Unified WAF Policy
Automated Web Layer Protection Without Rules Tuning
Fast, inline blocking decisions with SmartParse
• Enables our offering to fail open
• Battle tested: inspects and decisions on
250+ billion web requests weekly
• Virtually eliminates false positives
Net result: Web protection that works in production so security
teams can focus on high-value work, not WAF rules maintenance
Cloud Native Application Protection
• Inspects BOTH east-west and north-south
traffic routed via microservices
architectures without code changes
• Increased flexibility to deploy
Layer 7 protection in cloud-native
applications
• Increases Layer 7 visibility with
simplified deployment for
containerized microservices orchestrated
via Kubernetes
• Internal Microservices will be just
internal…
• Since internal Microservices are
internal they don’t need the same
level of security/authentication
• Communication between internal
Microservices should be legitimate
traffic
Assumptions of
Internal Microservices
Because apps are
highly distributed,
70-80% of traffic is
now east-west traffic
in data centers.
North-South and East-
West Traffic
Reduce Friction between DevSecOps
What it Might Look Like in Practice
Ingress / Software
Perimeter
RASP
Service Mesh
Traditional
Perimeter-based
Load Balancer
Deployment Options with Full Feature Parity
Enabling Applications Across Any Architecture
Web Servers Application Reverse Proxy
Containers:
Kubernetes, Docker PaaS
Service MeshCloud WAF:
No Agents to Deploy
API Gateway
As a sidecar
In container
Cloud
WAF
Runs across the Modern Infrastructure Mix
• Major cloud providers
• Containers
• Hardware
• Serverless options
• Platform services
Active Web App and API Protection Everywhere
See, Secure and Scale Across:
Any App
Cloud Containers, PaaS
& Serverless
Web Servers & Languages
Gateways & Proxies
Any Attack
OWASP Injection Attacks
PLUS:
Bad Bots
DDoS
Brute Force Attacks
Application Abuse & Misuse
Request Rate Limiting
Account Takeover
Virtual Patching
Any DevOps Toolchain
INCLUDING:
Generic Webhooks & Any Custom
Tools via Full RESTFul/JSON API
DevOps Tool Integrations Break Down Silos
Feedback Loops Make All Teams Security Stakeholders
Make security visible: Unified
management console provides actionable
data to quickly understand what’s
happening in production
Keep everyone informed: Push security
data to the tools security and DevOps
teams already use: Slack, PagerDuty, Jira,
Datadog, OpsGenie, etc.
Share consistent data: All teams make
decisions from same security data
Correlate and analyze web request data in other tools
API-first: any information
available in our management
console can be accessed via
our API
Import request data into a
data analysis tools like
Splunk, Kibana etc.
Easily correlate collected
web request security data
with external data sources
for further analysis
Example of Signal Sciences flagged IPs and raw request meta data pulled into Splunk
Provide Operations Teams Data to Ensure Uptime
Surface Metrics
that Matter
Client- and server-
side errors to
response errors,
broken links; highly
targeted APIs
Identify Critical
Issues Fast
Metrics can point to
server or application
configuration issues so
teams can triage faster
Share data via API
Pull these metrics into
the systems your
DevOps teams already
use to pinpoint
problematic issue fast
Example of visibility into operational data points like anomalies and application behavior that Signal Sciences surfaces to DevOps teams.
IMAGE GOES HERE
Trust Developers but Verify API Visibility
● Reduced Request volume
~10M RPS
● ~9% reduction in the
quarter
● Dev team modified the API
to improve performance
and reduce request volume
Signal Sciences
One Integrated Platform Delivers:
• Cloud-native protection at lowest TCO
• Protection in any infrastructure: cloud, on
premise, containers, and hybrid
environments
• DevOps and security tooling integrations
• Unified management of all your defenses
Architected for Flexible, Proactive Defense
• Agent-module pair and Cloud Decision Engine
enables easy deployment to
• stop web attacks
• Provides unified view across all your apps
wherever they run
Demo
Monolithic deployment
Docker deployment
Docker Container
Envoy Proxy
Q&A
Thank You!

Contenu connexe

Tendances

Tendances (20)

TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
 
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your doorLFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
 
Security in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps EngineersSecurity in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps Engineers
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Application Security from the Inside Out
Application Security from the Inside OutApplication Security from the Inside Out
Application Security from the Inside Out
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Continuous Security Testing with Devops - OWASP EU 2014
Continuous Security Testing  with Devops - OWASP EU 2014Continuous Security Testing  with Devops - OWASP EU 2014
Continuous Security Testing with Devops - OWASP EU 2014
 
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
 
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
Code-to-Cloud Visibility: An Essential Framework for DevOps SuccessCode-to-Cloud Visibility: An Essential Framework for DevOps Success
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
 
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, CheaperTesting in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
 
8 Tips for Deploying DevSecOps
8 Tips for Deploying DevSecOps8 Tips for Deploying DevSecOps
8 Tips for Deploying DevSecOps
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
What it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps WorldWhat it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps World
 

Similaire à Connect Ops and Security with Flexible Web App and API Protection

Similaire à Connect Ops and Security with Flexible Web App and API Protection (20)

Disruptive Trends in Application Development
Disruptive Trends in Application DevelopmentDisruptive Trends in Application Development
Disruptive Trends in Application Development
 
Infrastructure as Code in Large Scale Organizations
Infrastructure as Code in Large Scale OrganizationsInfrastructure as Code in Large Scale Organizations
Infrastructure as Code in Large Scale Organizations
 
Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
A DevOps Playbook at DraftKings Built with New Relic and AWS
 A DevOps Playbook at DraftKings Built with New Relic and AWS A DevOps Playbook at DraftKings Built with New Relic and AWS
A DevOps Playbook at DraftKings Built with New Relic and AWS
 
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
 
The Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docxThe Rise of Serverless Architecture in Web Development.docx
The Rise of Serverless Architecture in Web Development.docx
 
SoCal DevOps Meetup 1/26/2017 - Habitat by Chef
SoCal DevOps Meetup 1/26/2017 - Habitat by ChefSoCal DevOps Meetup 1/26/2017 - Habitat by Chef
SoCal DevOps Meetup 1/26/2017 - Habitat by Chef
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Reduce Risk with End to End Monitoring of Middleware-based Applications
Reduce Risk with End to End Monitoring of Middleware-based ApplicationsReduce Risk with End to End Monitoring of Middleware-based Applications
Reduce Risk with End to End Monitoring of Middleware-based Applications
 
Innovation with Open Sources and App Modernization for Developers | Ian Y. Choi
Innovation with Open Sources and App Modernization for Developers | Ian Y. ChoiInnovation with Open Sources and App Modernization for Developers | Ian Y. Choi
Innovation with Open Sources and App Modernization for Developers | Ian Y. Choi
 
7 steps to Enterprise PaaS
7 steps to Enterprise PaaS7 steps to Enterprise PaaS
7 steps to Enterprise PaaS
 
Going Reactive in Java with Typesafe Reactive Platform
Going Reactive in Java with Typesafe Reactive PlatformGoing Reactive in Java with Typesafe Reactive Platform
Going Reactive in Java with Typesafe Reactive Platform
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
API and App Ecosystems - Build The Best: a deep dive
API and App Ecosystems - Build The Best: a deep diveAPI and App Ecosystems - Build The Best: a deep dive
API and App Ecosystems - Build The Best: a deep dive
 
Why Microservice
Why Microservice Why Microservice
Why Microservice
 

Plus de DevOps.com

Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 

Plus de DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Connect Ops and Security with Flexible Web App and API Protection

  • 1. Connect Ops and Security with Flexible Web App and API Protection Aneel Dadani Orlando Barrera II
  • 2. Agenda • Introductions • Security and Visibility • API and Microservices Protection • Reduce Friction between DevSecOps • Demo
  • 3. Introductions Orlando Barrera II Technical Account Manager Signal Sciences Aneel Dadani Technical Account Manager Signal Sciences
  • 4. Large enterprises can leverage applications and APIs running on premise, in data centers or cloud. But that scale widens the attack surface. THE CHALLENGE: Protecting Apps and APIs Across Infrastructure
  • 5. IMAGE GOES HERE API and Microservices • Where is your application running? • What APIs do you have? • Who is accessing your APIs? • How are your APIs protected? • What data is your API endpoint processing? • Do you have visibility into your Microservice East to West traffic? Ask yourself :
  • 6. Effective Web and API Protection The solution is simple: developers and operations staff need application security that works in production without maintenance yet integrates with DevOps tools and processes.
  • 7. Signal Sciences Web Application and API Protection (WAAP) Platform Next-Gen WAF Complete protection for your Apps and APIs RASP Easy to install Runtime Application Self-Protection Bot Protection Prevent bad bots from performing malicious actions Advanced Rate Limiting Control the amount of requests from potential threats API Protection Stop unauthorized access to your APIs and microservices ATO Protection Stop account takeover and credential stuffing DDoS Block Denial-of-Service attacks
  • 8. Service LayerIntegrated Deployment Strategic Coverage Across the Enterprise Advanced Protection at Scale to Match the Velocity of DevOps Internet
  • 9. Key Means for Proactive Web App and API Protection DevOps teams need to move fast to innovate. But maintaining release velocity doesn’t mean sacrificing security.
  • 11. Hybrid SaaS Architecture: Fast Local Decisions Plus the Power of Cloud • Optimized local detection via SmartParse, eliminating false positive decisions • Decisioning is enriched by Cloud Engine intelligence – not signatures • Fail-open design avoids app downtime shut- downs and blocked access A New Approach to Web App and API Protection
  • 12. Signal Sciences Architecture Real-time web app protection that scales without impacting performance Load Balancer Web Servers Application Containers PaaS Service Mesh API Gateway Hosted Cloud WAF Reverse Proxy
  • 13. Slide Title Goes Here on One Deck • First bulleted copy of point you want to make • Second bulleted copy point • Third bulleted copy point etc.
  • 14. Web Request Volume Protected Per Month
  • 15. Monolithic Containerization By 2022, more than 75% of global organizations will be running containerized applications in production.
  • 16. Progression to the container world Servers Monolithic Waterfall VMs N-Tiered Systems Separation Containers Microservices DevOps (DevSecOps)
  • 17. Monolithic /catalog /cart /reviews /catalog /cart /reviews • Services must be written in the same language • Difficult to work on different services in parallel (“integration hell”) • Full app needs to be re-deployed with every update • Scaling requires replicating entire app which can lead to waste/unnecessary hosting costs • Services can be in different languages • Easier to work on services in parallel, add new services • Can deploy services individually, enables continuous deployment. • Can scale services individually Microservices
  • 18. Traditional WAF • Rules-Based • Limited Scalability • Longer Deployment Next-Gen WAF • Out-of-the-Box Detection • Highly Scalable • Quicker Deployment sudo apt-get install sigsci-agent
  • 19. Traditional WAF Next-Gen WAF Datacenter AWS GCP Google Cloud Armor • Different rulesets • Different UI, feature sets • Disjointed WAF policy Datacenter AWS GCP • Single ruleset • Single UI, feature set • Unified WAF Policy
  • 20. Automated Web Layer Protection Without Rules Tuning Fast, inline blocking decisions with SmartParse • Enables our offering to fail open • Battle tested: inspects and decisions on 250+ billion web requests weekly • Virtually eliminates false positives Net result: Web protection that works in production so security teams can focus on high-value work, not WAF rules maintenance
  • 21. Cloud Native Application Protection • Inspects BOTH east-west and north-south traffic routed via microservices architectures without code changes • Increased flexibility to deploy Layer 7 protection in cloud-native applications • Increases Layer 7 visibility with simplified deployment for containerized microservices orchestrated via Kubernetes
  • 22. • Internal Microservices will be just internal… • Since internal Microservices are internal they don’t need the same level of security/authentication • Communication between internal Microservices should be legitimate traffic Assumptions of Internal Microservices
  • 23. Because apps are highly distributed, 70-80% of traffic is now east-west traffic in data centers. North-South and East- West Traffic
  • 24.
  • 26. What it Might Look Like in Practice Ingress / Software Perimeter RASP Service Mesh Traditional Perimeter-based
  • 27. Load Balancer Deployment Options with Full Feature Parity Enabling Applications Across Any Architecture Web Servers Application Reverse Proxy Containers: Kubernetes, Docker PaaS Service MeshCloud WAF: No Agents to Deploy API Gateway As a sidecar In container Cloud WAF
  • 28. Runs across the Modern Infrastructure Mix • Major cloud providers • Containers • Hardware • Serverless options • Platform services
  • 29. Active Web App and API Protection Everywhere See, Secure and Scale Across: Any App Cloud Containers, PaaS & Serverless Web Servers & Languages Gateways & Proxies Any Attack OWASP Injection Attacks PLUS: Bad Bots DDoS Brute Force Attacks Application Abuse & Misuse Request Rate Limiting Account Takeover Virtual Patching Any DevOps Toolchain INCLUDING: Generic Webhooks & Any Custom Tools via Full RESTFul/JSON API
  • 30. DevOps Tool Integrations Break Down Silos Feedback Loops Make All Teams Security Stakeholders Make security visible: Unified management console provides actionable data to quickly understand what’s happening in production Keep everyone informed: Push security data to the tools security and DevOps teams already use: Slack, PagerDuty, Jira, Datadog, OpsGenie, etc. Share consistent data: All teams make decisions from same security data
  • 31. Correlate and analyze web request data in other tools API-first: any information available in our management console can be accessed via our API Import request data into a data analysis tools like Splunk, Kibana etc. Easily correlate collected web request security data with external data sources for further analysis Example of Signal Sciences flagged IPs and raw request meta data pulled into Splunk
  • 32. Provide Operations Teams Data to Ensure Uptime Surface Metrics that Matter Client- and server- side errors to response errors, broken links; highly targeted APIs Identify Critical Issues Fast Metrics can point to server or application configuration issues so teams can triage faster Share data via API Pull these metrics into the systems your DevOps teams already use to pinpoint problematic issue fast Example of visibility into operational data points like anomalies and application behavior that Signal Sciences surfaces to DevOps teams.
  • 33. IMAGE GOES HERE Trust Developers but Verify API Visibility ● Reduced Request volume ~10M RPS ● ~9% reduction in the quarter ● Dev team modified the API to improve performance and reduce request volume
  • 34. Signal Sciences One Integrated Platform Delivers: • Cloud-native protection at lowest TCO • Protection in any infrastructure: cloud, on premise, containers, and hybrid environments • DevOps and security tooling integrations • Unified management of all your defenses Architected for Flexible, Proactive Defense • Agent-module pair and Cloud Decision Engine enables easy deployment to • stop web attacks • Provides unified view across all your apps wherever they run
  • 35. Demo
  • 39. Q&A