SlideShare une entreprise Scribd logo
1  sur  56
Télécharger pour lire hors ligne
1
Trusted Application
Delivery: Achieving
Ultimate Security
1
Leonardo Murillo
Principal Partner Solutions Architect, Weaveworks
@murillodigital
leonardo@weave.works
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Amazon EKS Security
– Best Practices
Arindam Chatterji
Senior Solution Architect
AWS
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Arindam Chatterji
• Senior Solution Architect at AWS
• Passionate about sports 🏈 🏀 ⚽ 🏏
2
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Agenda
• Amazon Shared Responsibility Model
• Compliance for AWS services
• EKS Security best practices
• Weave GitOps and EKS deep dive
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Managed container services
Deployment, scheduling,
scaling, and management of
containerized applications
Where the containers run
Amazon Elastic
Container Service
Amazon Elastic
Container Service
for Kubernetes
Amazon EC2 AWS Fargate
Container image repository
Amazon Elastic
Container Registry
Orchestration
Compute Engine
Image registry
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
AWS Shared Responsibility
Model
5
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
EKS with self-managed workers
CONTAINER IMAGES, SOURCE CODE, IAM
EKS CLUSTER CONFIGURATION
CUSTOMER DATA
NETWORK
POLICIES
RBAC
BINDINGS
QUOTAS
&
LIMIT
RANGES
HPA
&
VPA
QOS
AND
POD
PRIORITY
POD
SECURITY
POLICIES
POD
DISRUPTION
BUDGETS
CLUSTER
ADD-ONS
VPC CONFIGURATION
WORKER NODE SCALING
OS, KUBELET, CRI & AMI CONFIGURATION
KUBERNETES
CONTROL
PLANE
API
SERVER
CONTROLLER
MANAGER
SCHEDULER
ETCD
AWS
RESPONSIBLITY
CUSTOMER
RESPONSIBILITY
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
EKS with managed node groups
CONTAINER IMAGES, SOURCE CODE, IAM
EKS CLUSTER CONFIGURATION
CUSTOMER DATA
NETWORK
POLICIES
RBAC
BINDINGS
QUOTAS
&
LIMIT
RANGES
HPA
&
VPA
QOS
AND
POD
PRIORITY
POD
SECURITY
POLICIES
POD
DISRUPTION
BUDGETS
CLUSTER
ADD-ONS
VPC CONFIGURATION
WORKER NODE SCALING
OS, KUBELET, CRI & AMI CONFIGURATION*
KUBERNETES
CONTROL
PLANE
API
SERVER
CONTROLLER
MANAGER
SCHEDULER
ETCD
AWS
RESPONSIBLITY
CUSTOMER
RESPONSIBILITY
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
EKS Fargate
CONTAINER IMAGES, SOURCE CODE, IAM
EKS CLUSTER CONFIGURATION
CUSTOMER DATA
NETWORK
POLICIES
RBAC
BINDINGS
QUOTAS
&
LIMIT
RANGES
HPA
&
VPA
QOS
AND
POD
PRIORITY
POD
SECURITY
POLICIES
POD
DISRUPTION
BUDGETS
CLUSTER
ADD-ONS
VPC CONFIGURATION
WORKER NODE SCALING
OS, KUBELET, CRI & AMI CONFIGURATION
KUBERNETES
CONTROL
PLANE
API
SERVER
CONTROLLER
MANAGER
SCHEDULER
ETCD
AWS
RESPONSIBLITY
CUSTOMER
RESPONSIBILITY
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Security benefits of AWS Fargate
We do more, you do less.
• Patching (OS, Container runtime, kubelet, etc.)
• Pod isolation (via separate kernel, ENI, CPU,
memory)
• No --privileged mode for containers
• No runtime access for users (ssh or interactive
Docker)
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Inherit global security and compliance controls
FERPA
SOC 1 SOC 2 SOC 3 CJIS
https://aws.amazon.com/compliance/services-in-scope/
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Identity and Access
Management
11
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
K8s action allowed/denied
EKS: IAM Authentication + kubectl
Authorization of AWS Identity
against Kubernetes RBAC
K8s API
Passes AWS Identity
Verifies AWS Identity
kubectl
AWS IAM
Authentication
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Identity and Access Management (IAM)
General guidelines
• Practice the principle of least
privilege for AWS IAM and k8s
RBAC
• Periodically audit access to the
cluster
• Run the application as a non-root
user
• Create the cluster with a
dedicated IAM role
• User authentication for Amazon
EKS clusters from an OpenID
Connect (OIDC) Identity Provider
IAM
• Use IRSA to assign AWS
identities to pods
• Block access to EC2
metadata
Kubernetes
• Use separate services
accounts for each
application
• Disable auto-mounting of
the default service account
token
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Host, Container Image Hardening
and Runtime Security
14
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Host Security
• Use an OS that is optimized for running containers
EKS Optimized Amazon Linux 2 & Bottlerocket (preview)
Alternatives: Atomic, Flatcar Linux, RancherOS
• Deploy workers onto private subnets
• Immutable infrastructure
• Run Amazon Inspector to continually assess alignment with best
practices and compliance requirements
kube-bench for EKS CIS benchmark
https://aws.amazon.com/blogs/containers/introducing-cis-
amazon-eks-benchmark
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Securing container images
• Scan container images
ECR, Anchore, Clair, Trivy
• Use Scratch or a slim base layer
• De-fang your images
Remove files with the SETUID and SETGID bits from the image
• Always run as a non-root user
Lint your Dockerfiles
• Use endpoint policies and private endpoints with Elastic Container Registry
(ECR)
• Protect the supply-chain
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
• Use PSPs or Kyverno or OPA/Gatekeeper to implement runtime security
measures:
ü Deny privileged escalation
ü Deny running as root
ü Deny mounting hostPath
ü Drop Linux capabilities
• Compliment PSPs with AppArmor or Seccomp profiles (if necessary)
• Use 3rd party solutions
Aqua, Stackrox, Sysdig Falco, Twistlock etc.
Pod and runtime security
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Network Segmentation –
Network and Firewall
Configuration
18
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Installing a network policy provider on Kubernetes
• You first need to add a network policy provider to Amazon EKS /
Kubernetes in order to use network policies. A popular one covered in
our documentation is Calico.
https://docs.aws.amazon.com/eks/latest/userguide/calico.html
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
• Start with a deny-all global policy and incrementally add policies
• Use k8s network policies for restricting E-W traffic within the cluster
• Log Network Traffic metadata for analysis
• Restrict outbound traffic from pods that don’t need to connect to external
services
SGs for pods & Cilium (L7 policies)
• Encrypt service-to-services traffic with a mesh
Alternatives: Select CNI plug-ins & Nitro instances
Network Security
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Auditing and Logging
21
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Logging and Monitoring
Logging
• Amazon CloudWatch Logs/awslogs
• Log routing (Fluentd, Fluent Bit, ELK)
• VPC Flow Log
Monitoring
• Amazon CloudWatch Events & Container insights
• Amazon Managed Prometheus and Grafana
• Periodically audit Kubernetes control plane and AWS CloudTrail
logs for suspicious activity
– Search for the annotations authorization.k8s.io/decision and
authorization.k8s.io/reason to ascertain why a call was allow/denied
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Data Encryption and Secrets
Management
23
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Data Protection
• Encryption at rest for EBS,EFS and
FSx for Lustre
• Leverage AWS KMS for service
managed key or customer master
key (CMK)
• Encryption in transit
• Rotate your CMKs periodically
• Use EFS access points to simplify
access to shared datasets
Parameter
Store
AWS Secrets Manager AWS KMS
Container
apiVersion: v1
kind: PersistentVolume
metadata:
name: efs-pv
spec:
capacity:
storage: 5Gi
volumeMode: Filesystem
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy:
Retain
storageClassName: efs-sc
mountOptions:
- tls
csi:
driver: efs.csi.aws.com
volumeHandle:
<file_system_id>
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
How do you manage secrets?
• Use AWS KMS for envelope encryption
of Kubernetes secrets
• Audit the use of secrets and rotate
them periodically
• Use volume mounts instead of
environment variables
• Leverage AWS Secrets Manager or SSM
Parameter Store to store secrets
Parameter
Store
AWS Secrets Manager AWS KMS
Container
/prod/rds/secret-username
/prod/rds/secret-password
aws secretsmanager create-secret --name <SECRETNAME> --description ”rds/secret" --
secret-string [{"testkey1":"testvalue1"}] --region <REGION>
…
env:
- name: ENDPOINT
value: "https://secretsmanager.us-west-2.amazonaws.com"
- name: REGION
value: "us-west-2"
- name: SECRETNAME
value: "sm-demo-secret”
…
SSM Parameter
Store
AWS Secrets
Manager
Encryption AWS KMS AWS KMS
Authentication/
authorization
AWS Identity
and Access
Management
(IAM)
IAM
Secret rotation Static Dynamic
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Closing Thoughts..
26
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Summing Up
The customer has many responsibilities in running containers
securely in AWS.
The key areas to delve into include:
• Identity and Access Management
• Network Topology and Firewalling
• Logging and Auditing
• Encryption and Mutual Authentication between Tasks/Pods
• Patching (container images, container hosts and the Kubernetes
control plane)
• Secrets Management
• What is in, and what isn’t in, each container image you run
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Reference -EKS Best Practices for Security
https://aws.github.io/aws-eks-best-practices/
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark.
Thank you!
Arindam Chatterji
Senior Solutions
Architect
1
EKS & Weave GitOps
Security at the speed of
cloud native
1
Leonardo Murillo
Principal Partner Solutions Architect, Weaveworks
@murillodigital
leonardo@weave.works
2
2
Leo brings wide-ranging industry perspective, with over 20 years
of experience building technology and leading teams all the way
from Startups to Fortune 500s.
He is passionate about cloud native technologies, organizational
transformation and the open source community.
As former CTO he led worldwide teams building cloud native
software for large enterprises. In his role as Principal Partner
Solutions Architect at Weaveworks, he focuses on helping solve
application and infrastructure delivery challenges on Kubernetes
at scale.
Leonardo Murillo
Principal Partner Solutions Architect, Weaveworks
@murillodigital ⬝ leonardo@weave.works
3
3
Weaveworks is backed by solid investors
Weaveworks is a key partner with all the
major infrastructure and Kubernetes vendors
Weaveworks: the GitOps company
Weaveworks is deeply committed
to the Open Source Community
4
Financial Services
Weaveworks Customers
Technology Other Industries
5
5
The Goal: Go faster, securely
6
6
DevOps and Cloud Native: A combination for speed
Improve DORA metrics
DevOps:
Remove silos
and reduce
handoffs
Cloud Native:
Decoupled and
immutable
Lead time for changes
Deployment frequency
Time to restore service
Change failure rate
7
7
AWS, EKS and Weave GitOps simplify
and secure Cloud Native DevOps
Foundational Security Highly Secure Kubernetes Platform
and container image registry
● OIDC Integration
● Pod Security Groups
● RBAC / IAM Integration
● Container Image Scanning
● Immutable Tags
Declarative and secure
continuous delivery
● Policy as Code
● Declarative Configuration
● Pull Based Continuous
Reconciliation
● Trusted Delivery
AWS Shared Responsibility EKS +ECR Weave GitOps
8
8
The foundation of velocity is CI/CD
Continuous
Going faster and getting to Continuous
Deployment is a matter of trust
Produce a trustable artifact:
● Test (application and all dependencies / SBOM)
● Sign
● Securely and uniquely store
Guarantee workloads and configuration can be trusted
during delivery and runtime (over time):
● Immutable Configuration
● Declarative Policy
● Continuous compliance
Integration Delivery/Deployment
9
9
CI/CD is all about pipelines and artifacts
Weave GitOps enhances security by creating an immutable barrier between CI and CD,
and guarantee trusted artifacts and configuration at runtime.
CodePipeline
Performs integration
tasks and pushes a
verified, uniquely
tagged and signed
container image
CodeCommit
Stores declarative configuration
for the entire system, including
integration steps
ECR
Scans and stores
immutable container
images
Weave GitOps
Pulls configuration,
continuously reconciles
and guarantees
compliance through
policy as code
EKS
Securely pulls container artifacts
using integrated IAM
authentication
10
10
Securing the Pipeline is Critical
11
11
Securing pipelines is critical
● Detect pipeline hijacking
● Eliminate access from CI systems into target runtime environments
● Reduce the risk of pipeline intrusion by removing the imperative element
of delivery
● Guarantee artifact integrity
● Integrate with RBAC and enforce authentication and authorization throughout
● Keep privileged and sensitive build and runtime information securely stored
and isolated
12
12
Technologies towards trusted delivery
● Detect pipeline hijacking
● Guaranteed artifact integrity All pipelines should be stored following GitOps
principles: Declarative, Versioned and Immutable.
Pipelines code versions should be uniquely hashed,
and CI systems should use specific pipeline versions
and be validated against the expected version hash.
13
13
Technologies towards trusted delivery
● Detect pipeline hijacking
● Guaranteed artifact integrity A trusted pipeline should produce a
verifiable artifact.
Use container image signing to identify guaranteed
artifacts. Use policies to validate the admission of
artifacts, and reject any artifact that does not match
the expected signature.
14
14
Technologies towards trusted delivery
● Detect pipeline hijacking
● Guaranteed artifact integrity
https://www.cisa.gov/sbom
Use SBOM as part of your artifact build
and validation process. The security of your
artifact is as strong as its weakest dependency.
Artifacts should not be signed unless SBOM validations
passes.
15
15
Technologies towards trusted delivery
● Eliminate access from CI
systems into target runtime
environments
● Reduce the risk of pipeline
intrusion by removing the
imperative element of delivery
Weave GitOps follows all four principles of GitOps,
thus delegating and abstracting deployment
complexity to agents running in the target environment,
removing the need for access into target runtime
environments from CI or less privileged systems.
Do not push instructions from CI systems and disable
direct access into target runtime environments from
central continuous integration platforms.
16
16
Technologies towards trusted delivery
● Integrate with RBAC and
enforce authentication and
authorization throughout
● Keep privileged and sensitive
build and runtime information
securely stored and isolated
EKS offers unique capabilities that integrate
Kubernetes primitives with AWS authentication
and authorization capabilities. These capabilities
together with Weave GitOps declarative deployment
Declare your Pod Security Groups, OIDC and Secrets
Manager integration, and deploy and validate during
runtime with Weave GitOps continuous reconciliation
and policy engine.
17
17
The AWS Security Maturity Model
https://maturitymodel.security.aws.dev/en/model/
A model that helps organizations prioritize and learn towards
overcoming the many challenges related to security faced by
enterprises today.
Built and validated by a team of AWS Security Specialists
https://maturitymodel.security.aws.dev/en/model/
18
18
https://maturitymodel.security.aws.dev/en/model/
How does EKS and Weave GitOps Trusted
Delivery help achieve Security Maturity
https://maturitymodel.security.aws.dev/en/model/
19
19
EKS + Weave GitOps Secure Runtime Environment
20
20
Policy Driven Continuous Compliance
The policies that declare and validate compliance, should be
treated just as everything else: be code, that is versioned,
and immutable.
21
21
Policy Driven Continuous Compliance
Reconcile:
aka: deploy!
Test SBOM Sign Publish
Continuous Integration Continuous Deployment
Policy:
Admit or
Reject
22
22
PRODUCTION
QA
INTEGRATION
Trust increases across stages
DEVELOPMENT
Each stage uses a pipeline to promote, increasing the scope
of validation, therefore increasing the level of trust required
and validated through policy in the next stage, eventually
reaching production
23
23
EKS Capabilities for mature, integrated runtime security
EKS Secrets Store CSI Driver for AWS
https://github.com/aws/secrets-store-csi-driver-provider-aws
Security Groups for Pods
https://docs.aws.amazon.com/eks/latest/userguide/security-groups-for-pods.html
https://aws.amazon.com/blogs/containers/introducing-oidc-identity-provider-authentication-amazon-eks/
OIDC Integrated Federation
24
24
Pipeline technologies to validate and produce
a verified artifact
https://github.com/kubernete
s-sigs/bom
https://github.com/sigstore/
cosign
https://in-toto.io/
Weave GitOps
Continuously validate and deploy
trusted artifacts built and signed as
expected
Secure the integrity of the supply
chain Produce a SPDX compliant BOM
for the built artifact
Sign the artifact
25
25
Check out our latest White Paper
Best Practices for Hybrid Cloud Kubernetes with EKS and
Weave GitOps
Request a demo of Weave GitOps Enterprise
www.weave.works/contact
Take advantage of EKS Blueprints and GitOps
Best Practices
Weaveworks & AWS EKS Accelerator Program
Thank You
26
Thank you
https://weave.works
26

Contenu connexe

Similaire à Trusted Application Delivery: Achieving Ultimate Security

Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Amazon Web Services
 
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...Amazon Web Services
 
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Amazon Web Services
 
Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Amazon Web Services
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDayAmazon Web Services
 
Getting started building your first serverless web application on AWS
Getting started building  your first serverless web application on AWSGetting started building  your first serverless web application on AWS
Getting started building your first serverless web application on AWSIoannis Polyzos
 
Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Jean-François LOMBARDO
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Amazon Web Services
 
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018Amazon Web Services
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day OneAmazon Web Services
 
SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfJean-François LOMBARDO
 
Amazon EKS multi-cluster gitops-bridge
Amazon EKS multi-cluster gitops-bridgeAmazon EKS multi-cluster gitops-bridge
Amazon EKS multi-cluster gitops-bridgeCarlos Santana
 
Scaling production grade EKS Multi-Cluster environments using GitOps
Scaling production grade EKS Multi-Cluster environments using GitOpsScaling production grade EKS Multi-Cluster environments using GitOps
Scaling production grade EKS Multi-Cluster environments using GitOpsCarlos Santana
 
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...Amazon Web Services
 
利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統Amazon Web Services
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewEagleDream Technologies
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersAmazon Web Services
 

Similaire à Trusted Application Delivery: Achieving Ultimate Security (20)

Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
 
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
 
AWS for VMware Admins
AWS for VMware AdminsAWS for VMware Admins
AWS for VMware Admins
 
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
 
Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDay
 
Getting started building your first serverless web application on AWS
Getting started building  your first serverless web application on AWSGetting started building  your first serverless web application on AWS
Getting started building your first serverless web application on AWS
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
 
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018
Expert Tips for Successful Kubernetes Deployment - AWS Summit Sydney 2018
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdf
 
Amazon EKS multi-cluster gitops-bridge
Amazon EKS multi-cluster gitops-bridgeAmazon EKS multi-cluster gitops-bridge
Amazon EKS multi-cluster gitops-bridge
 
Scaling production grade EKS Multi-Cluster environments using GitOps
Scaling production grade EKS Multi-Cluster environments using GitOpsScaling production grade EKS Multi-Cluster environments using GitOps
Scaling production grade EKS Multi-Cluster environments using GitOps
 
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
 
利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 

Plus de Weaveworks

Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)Weaveworks
 
Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)Weaveworks
 
Webinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for YouWebinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for YouWeaveworks
 
Six Signs You Need Platform Engineering
Six Signs You Need Platform EngineeringSix Signs You Need Platform Engineering
Six Signs You Need Platform EngineeringWeaveworks
 
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdfSRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdfWeaveworks
 
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWebinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWeaveworks
 
Flux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCIFlux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCIWeaveworks
 
Automated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes ClustersAutomated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes ClustersWeaveworks
 
How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesWeaveworks
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsWeaveworks
 
GitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdfGitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdfWeaveworks
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdWeaveworks
 
Implementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancyImplementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancyWeaveworks
 
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSAccelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSWeaveworks
 
The Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCFThe Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCFWeaveworks
 
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Weaveworks
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Weaveworks
 
Flux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdfFlux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdfWeaveworks
 
Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension Weaveworks
 
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOpsDeploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOpsWeaveworks
 

Plus de Weaveworks (20)

Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)
 
Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)
 
Webinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for YouWebinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for You
 
Six Signs You Need Platform Engineering
Six Signs You Need Platform EngineeringSix Signs You Need Platform Engineering
Six Signs You Need Platform Engineering
 
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdfSRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
 
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWebinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
 
Flux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCIFlux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCI
 
Automated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes ClustersAutomated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes Clusters
 
How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy Catastrophes
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOps
 
GitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdfGitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdf
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and Linkerd
 
Implementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancyImplementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancy
 
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSAccelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
 
The Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCFThe Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCF
 
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
 
Flux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdfFlux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdf
 
Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension
 
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOpsDeploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
 

Dernier

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Dernier (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Trusted Application Delivery: Achieving Ultimate Security

  • 1. 1 Trusted Application Delivery: Achieving Ultimate Security 1 Leonardo Murillo Principal Partner Solutions Architect, Weaveworks @murillodigital leonardo@weave.works
  • 2. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Amazon EKS Security – Best Practices Arindam Chatterji Senior Solution Architect AWS
  • 3. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Arindam Chatterji • Senior Solution Architect at AWS • Passionate about sports 🏈 🏀 ⚽ 🏏 2
  • 4. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Agenda • Amazon Shared Responsibility Model • Compliance for AWS services • EKS Security best practices • Weave GitOps and EKS deep dive
  • 5. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Managed container services Deployment, scheduling, scaling, and management of containerized applications Where the containers run Amazon Elastic Container Service Amazon Elastic Container Service for Kubernetes Amazon EC2 AWS Fargate Container image repository Amazon Elastic Container Registry Orchestration Compute Engine Image registry
  • 6. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. AWS Shared Responsibility Model 5
  • 7. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. EKS with self-managed workers CONTAINER IMAGES, SOURCE CODE, IAM EKS CLUSTER CONFIGURATION CUSTOMER DATA NETWORK POLICIES RBAC BINDINGS QUOTAS & LIMIT RANGES HPA & VPA QOS AND POD PRIORITY POD SECURITY POLICIES POD DISRUPTION BUDGETS CLUSTER ADD-ONS VPC CONFIGURATION WORKER NODE SCALING OS, KUBELET, CRI & AMI CONFIGURATION KUBERNETES CONTROL PLANE API SERVER CONTROLLER MANAGER SCHEDULER ETCD AWS RESPONSIBLITY CUSTOMER RESPONSIBILITY
  • 8. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. EKS with managed node groups CONTAINER IMAGES, SOURCE CODE, IAM EKS CLUSTER CONFIGURATION CUSTOMER DATA NETWORK POLICIES RBAC BINDINGS QUOTAS & LIMIT RANGES HPA & VPA QOS AND POD PRIORITY POD SECURITY POLICIES POD DISRUPTION BUDGETS CLUSTER ADD-ONS VPC CONFIGURATION WORKER NODE SCALING OS, KUBELET, CRI & AMI CONFIGURATION* KUBERNETES CONTROL PLANE API SERVER CONTROLLER MANAGER SCHEDULER ETCD AWS RESPONSIBLITY CUSTOMER RESPONSIBILITY
  • 9. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. EKS Fargate CONTAINER IMAGES, SOURCE CODE, IAM EKS CLUSTER CONFIGURATION CUSTOMER DATA NETWORK POLICIES RBAC BINDINGS QUOTAS & LIMIT RANGES HPA & VPA QOS AND POD PRIORITY POD SECURITY POLICIES POD DISRUPTION BUDGETS CLUSTER ADD-ONS VPC CONFIGURATION WORKER NODE SCALING OS, KUBELET, CRI & AMI CONFIGURATION KUBERNETES CONTROL PLANE API SERVER CONTROLLER MANAGER SCHEDULER ETCD AWS RESPONSIBLITY CUSTOMER RESPONSIBILITY
  • 10. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Security benefits of AWS Fargate We do more, you do less. • Patching (OS, Container runtime, kubelet, etc.) • Pod isolation (via separate kernel, ENI, CPU, memory) • No --privileged mode for containers • No runtime access for users (ssh or interactive Docker)
  • 11. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Inherit global security and compliance controls FERPA SOC 1 SOC 2 SOC 3 CJIS https://aws.amazon.com/compliance/services-in-scope/
  • 12. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Identity and Access Management 11
  • 13. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. K8s action allowed/denied EKS: IAM Authentication + kubectl Authorization of AWS Identity against Kubernetes RBAC K8s API Passes AWS Identity Verifies AWS Identity kubectl AWS IAM Authentication
  • 14. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Identity and Access Management (IAM) General guidelines • Practice the principle of least privilege for AWS IAM and k8s RBAC • Periodically audit access to the cluster • Run the application as a non-root user • Create the cluster with a dedicated IAM role • User authentication for Amazon EKS clusters from an OpenID Connect (OIDC) Identity Provider IAM • Use IRSA to assign AWS identities to pods • Block access to EC2 metadata Kubernetes • Use separate services accounts for each application • Disable auto-mounting of the default service account token
  • 15. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Host, Container Image Hardening and Runtime Security 14
  • 16. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Host Security • Use an OS that is optimized for running containers EKS Optimized Amazon Linux 2 & Bottlerocket (preview) Alternatives: Atomic, Flatcar Linux, RancherOS • Deploy workers onto private subnets • Immutable infrastructure • Run Amazon Inspector to continually assess alignment with best practices and compliance requirements kube-bench for EKS CIS benchmark https://aws.amazon.com/blogs/containers/introducing-cis- amazon-eks-benchmark
  • 17. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Securing container images • Scan container images ECR, Anchore, Clair, Trivy • Use Scratch or a slim base layer • De-fang your images Remove files with the SETUID and SETGID bits from the image • Always run as a non-root user Lint your Dockerfiles • Use endpoint policies and private endpoints with Elastic Container Registry (ECR) • Protect the supply-chain
  • 18. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. • Use PSPs or Kyverno or OPA/Gatekeeper to implement runtime security measures: ü Deny privileged escalation ü Deny running as root ü Deny mounting hostPath ü Drop Linux capabilities • Compliment PSPs with AppArmor or Seccomp profiles (if necessary) • Use 3rd party solutions Aqua, Stackrox, Sysdig Falco, Twistlock etc. Pod and runtime security
  • 19. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Network Segmentation – Network and Firewall Configuration 18
  • 20. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Installing a network policy provider on Kubernetes • You first need to add a network policy provider to Amazon EKS / Kubernetes in order to use network policies. A popular one covered in our documentation is Calico. https://docs.aws.amazon.com/eks/latest/userguide/calico.html
  • 21. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. • Start with a deny-all global policy and incrementally add policies • Use k8s network policies for restricting E-W traffic within the cluster • Log Network Traffic metadata for analysis • Restrict outbound traffic from pods that don’t need to connect to external services SGs for pods & Cilium (L7 policies) • Encrypt service-to-services traffic with a mesh Alternatives: Select CNI plug-ins & Nitro instances Network Security
  • 22. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Auditing and Logging 21
  • 23. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Logging and Monitoring Logging • Amazon CloudWatch Logs/awslogs • Log routing (Fluentd, Fluent Bit, ELK) • VPC Flow Log Monitoring • Amazon CloudWatch Events & Container insights • Amazon Managed Prometheus and Grafana • Periodically audit Kubernetes control plane and AWS CloudTrail logs for suspicious activity – Search for the annotations authorization.k8s.io/decision and authorization.k8s.io/reason to ascertain why a call was allow/denied
  • 24. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Data Encryption and Secrets Management 23
  • 25. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Data Protection • Encryption at rest for EBS,EFS and FSx for Lustre • Leverage AWS KMS for service managed key or customer master key (CMK) • Encryption in transit • Rotate your CMKs periodically • Use EFS access points to simplify access to shared datasets Parameter Store AWS Secrets Manager AWS KMS Container apiVersion: v1 kind: PersistentVolume metadata: name: efs-pv spec: capacity: storage: 5Gi volumeMode: Filesystem accessModes: - ReadWriteOnce persistentVolumeReclaimPolicy: Retain storageClassName: efs-sc mountOptions: - tls csi: driver: efs.csi.aws.com volumeHandle: <file_system_id>
  • 26. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. How do you manage secrets? • Use AWS KMS for envelope encryption of Kubernetes secrets • Audit the use of secrets and rotate them periodically • Use volume mounts instead of environment variables • Leverage AWS Secrets Manager or SSM Parameter Store to store secrets Parameter Store AWS Secrets Manager AWS KMS Container /prod/rds/secret-username /prod/rds/secret-password aws secretsmanager create-secret --name <SECRETNAME> --description ”rds/secret" -- secret-string [{"testkey1":"testvalue1"}] --region <REGION> … env: - name: ENDPOINT value: "https://secretsmanager.us-west-2.amazonaws.com" - name: REGION value: "us-west-2" - name: SECRETNAME value: "sm-demo-secret” … SSM Parameter Store AWS Secrets Manager Encryption AWS KMS AWS KMS Authentication/ authorization AWS Identity and Access Management (IAM) IAM Secret rotation Static Dynamic
  • 27. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Closing Thoughts.. 26
  • 28. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Summing Up The customer has many responsibilities in running containers securely in AWS. The key areas to delve into include: • Identity and Access Management • Network Topology and Firewalling • Logging and Auditing • Encryption and Mutual Authentication between Tasks/Pods • Patching (container images, container hosts and the Kubernetes control plane) • Secrets Management • What is in, and what isn’t in, each container image you run
  • 29. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Reference -EKS Best Practices for Security https://aws.github.io/aws-eks-best-practices/
  • 30. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. © 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Confidential and Trademark. Thank you! Arindam Chatterji Senior Solutions Architect
  • 31. 1 EKS & Weave GitOps Security at the speed of cloud native 1 Leonardo Murillo Principal Partner Solutions Architect, Weaveworks @murillodigital leonardo@weave.works
  • 32. 2 2 Leo brings wide-ranging industry perspective, with over 20 years of experience building technology and leading teams all the way from Startups to Fortune 500s. He is passionate about cloud native technologies, organizational transformation and the open source community. As former CTO he led worldwide teams building cloud native software for large enterprises. In his role as Principal Partner Solutions Architect at Weaveworks, he focuses on helping solve application and infrastructure delivery challenges on Kubernetes at scale. Leonardo Murillo Principal Partner Solutions Architect, Weaveworks @murillodigital ⬝ leonardo@weave.works
  • 33. 3 3 Weaveworks is backed by solid investors Weaveworks is a key partner with all the major infrastructure and Kubernetes vendors Weaveworks: the GitOps company Weaveworks is deeply committed to the Open Source Community
  • 35. 5 5 The Goal: Go faster, securely
  • 36. 6 6 DevOps and Cloud Native: A combination for speed Improve DORA metrics DevOps: Remove silos and reduce handoffs Cloud Native: Decoupled and immutable Lead time for changes Deployment frequency Time to restore service Change failure rate
  • 37. 7 7 AWS, EKS and Weave GitOps simplify and secure Cloud Native DevOps Foundational Security Highly Secure Kubernetes Platform and container image registry ● OIDC Integration ● Pod Security Groups ● RBAC / IAM Integration ● Container Image Scanning ● Immutable Tags Declarative and secure continuous delivery ● Policy as Code ● Declarative Configuration ● Pull Based Continuous Reconciliation ● Trusted Delivery AWS Shared Responsibility EKS +ECR Weave GitOps
  • 38. 8 8 The foundation of velocity is CI/CD Continuous Going faster and getting to Continuous Deployment is a matter of trust Produce a trustable artifact: ● Test (application and all dependencies / SBOM) ● Sign ● Securely and uniquely store Guarantee workloads and configuration can be trusted during delivery and runtime (over time): ● Immutable Configuration ● Declarative Policy ● Continuous compliance Integration Delivery/Deployment
  • 39. 9 9 CI/CD is all about pipelines and artifacts Weave GitOps enhances security by creating an immutable barrier between CI and CD, and guarantee trusted artifacts and configuration at runtime. CodePipeline Performs integration tasks and pushes a verified, uniquely tagged and signed container image CodeCommit Stores declarative configuration for the entire system, including integration steps ECR Scans and stores immutable container images Weave GitOps Pulls configuration, continuously reconciles and guarantees compliance through policy as code EKS Securely pulls container artifacts using integrated IAM authentication
  • 41. 11 11 Securing pipelines is critical ● Detect pipeline hijacking ● Eliminate access from CI systems into target runtime environments ● Reduce the risk of pipeline intrusion by removing the imperative element of delivery ● Guarantee artifact integrity ● Integrate with RBAC and enforce authentication and authorization throughout ● Keep privileged and sensitive build and runtime information securely stored and isolated
  • 42. 12 12 Technologies towards trusted delivery ● Detect pipeline hijacking ● Guaranteed artifact integrity All pipelines should be stored following GitOps principles: Declarative, Versioned and Immutable. Pipelines code versions should be uniquely hashed, and CI systems should use specific pipeline versions and be validated against the expected version hash.
  • 43. 13 13 Technologies towards trusted delivery ● Detect pipeline hijacking ● Guaranteed artifact integrity A trusted pipeline should produce a verifiable artifact. Use container image signing to identify guaranteed artifacts. Use policies to validate the admission of artifacts, and reject any artifact that does not match the expected signature.
  • 44. 14 14 Technologies towards trusted delivery ● Detect pipeline hijacking ● Guaranteed artifact integrity https://www.cisa.gov/sbom Use SBOM as part of your artifact build and validation process. The security of your artifact is as strong as its weakest dependency. Artifacts should not be signed unless SBOM validations passes.
  • 45. 15 15 Technologies towards trusted delivery ● Eliminate access from CI systems into target runtime environments ● Reduce the risk of pipeline intrusion by removing the imperative element of delivery Weave GitOps follows all four principles of GitOps, thus delegating and abstracting deployment complexity to agents running in the target environment, removing the need for access into target runtime environments from CI or less privileged systems. Do not push instructions from CI systems and disable direct access into target runtime environments from central continuous integration platforms.
  • 46. 16 16 Technologies towards trusted delivery ● Integrate with RBAC and enforce authentication and authorization throughout ● Keep privileged and sensitive build and runtime information securely stored and isolated EKS offers unique capabilities that integrate Kubernetes primitives with AWS authentication and authorization capabilities. These capabilities together with Weave GitOps declarative deployment Declare your Pod Security Groups, OIDC and Secrets Manager integration, and deploy and validate during runtime with Weave GitOps continuous reconciliation and policy engine.
  • 47. 17 17 The AWS Security Maturity Model https://maturitymodel.security.aws.dev/en/model/ A model that helps organizations prioritize and learn towards overcoming the many challenges related to security faced by enterprises today. Built and validated by a team of AWS Security Specialists https://maturitymodel.security.aws.dev/en/model/
  • 48. 18 18 https://maturitymodel.security.aws.dev/en/model/ How does EKS and Weave GitOps Trusted Delivery help achieve Security Maturity https://maturitymodel.security.aws.dev/en/model/
  • 49. 19 19 EKS + Weave GitOps Secure Runtime Environment
  • 50. 20 20 Policy Driven Continuous Compliance The policies that declare and validate compliance, should be treated just as everything else: be code, that is versioned, and immutable.
  • 51. 21 21 Policy Driven Continuous Compliance Reconcile: aka: deploy! Test SBOM Sign Publish Continuous Integration Continuous Deployment Policy: Admit or Reject
  • 52. 22 22 PRODUCTION QA INTEGRATION Trust increases across stages DEVELOPMENT Each stage uses a pipeline to promote, increasing the scope of validation, therefore increasing the level of trust required and validated through policy in the next stage, eventually reaching production
  • 53. 23 23 EKS Capabilities for mature, integrated runtime security EKS Secrets Store CSI Driver for AWS https://github.com/aws/secrets-store-csi-driver-provider-aws Security Groups for Pods https://docs.aws.amazon.com/eks/latest/userguide/security-groups-for-pods.html https://aws.amazon.com/blogs/containers/introducing-oidc-identity-provider-authentication-amazon-eks/ OIDC Integrated Federation
  • 54. 24 24 Pipeline technologies to validate and produce a verified artifact https://github.com/kubernete s-sigs/bom https://github.com/sigstore/ cosign https://in-toto.io/ Weave GitOps Continuously validate and deploy trusted artifacts built and signed as expected Secure the integrity of the supply chain Produce a SPDX compliant BOM for the built artifact Sign the artifact
  • 55. 25 25 Check out our latest White Paper Best Practices for Hybrid Cloud Kubernetes with EKS and Weave GitOps Request a demo of Weave GitOps Enterprise www.weave.works/contact Take advantage of EKS Blueprints and GitOps Best Practices Weaveworks & AWS EKS Accelerator Program Thank You