SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Scaling security across the enterprise
Secure by design
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
What is Security by Design?
2
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
What is it really?
3
• Bake security into your design
• Follow a standard set of principals
• Think in Layers
• Make it part of your culture
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Is there an issue?
4
• OWASP Top 10 Update for 2017
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Security Goals
5
• Digitization of Business Capabilities
• Multiple digital channels
• Confidentiality
• Integrity
• Availability
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Security Design Principles
6
• Targeted
• Minimalized
• Locked
• Multi-keyed
• Elastic
• Reliable
• Standardized
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Targeted: Profile your APIs
7
Public APIsSemi-public APIs
Private APIs
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Minimalized: Be stingy with capabilities
8
• Domain-driven Design
• Business Entities
• Single responsibility principle
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Locked: Authenticate and Authorize every call
9
• Token based Access Control
• TLS
• Tokenization
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Multi-keyed: Use OpenID Connect and OAuth 2.0
10
ImplicitAuthorization Code
Authorization Code
Client Credentials
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Multi-keyed: Use TLS, Mutual TLS, SAML, and JWT
11
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Elastic: Use Containerization & Container Scheduling
12
• Each Microservice has distinct scalability requirements
• Container scheduling makes scaling easy
• PaaS frameworks schedule containers based on traffic
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Reliable: Use Domain Events
13
My Shopping Microservice
Order Fulfillment Microservice
Credit Card Microservice
Inventory Microservice
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Reliable: Use Circuit Breaker Pattern
14
My Shopping Microservice
Customer Profile Microservice
Loyalty Microservice
Order History Microservice
Order History Microservice
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Standardized: Choose the best Technologies
15
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
All contents © MuleSoft Inc.
Speed. Agility. API Security. Innovation.
16
• Emerges bottoms-up via self-service
• Provides visibility, security and
governability at every API node
• Is recomposable: it bends, not
breaks – built for change
An application network
As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to WSO2 Integration Platform
Introduction to WSO2 Integration PlatformIntroduction to WSO2 Integration Platform
Introduction to WSO2 Integration Platform
WSO2
 

Was ist angesagt? (20)

Raleigh MuleSoft Meetup - October
Raleigh MuleSoft Meetup  - October Raleigh MuleSoft Meetup  - October
Raleigh MuleSoft Meetup - October
 
Creating an OData-Enabled API
Creating an OData-Enabled APICreating an OData-Enabled API
Creating an OData-Enabled API
 
10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration
 
Mulesoft Meetups - Salesforce & Mulesoft Integrations, Anypoint Security Poli...
Mulesoft Meetups - Salesforce & Mulesoft Integrations, Anypoint Security Poli...Mulesoft Meetups - Salesforce & Mulesoft Integrations, Anypoint Security Poli...
Mulesoft Meetups - Salesforce & Mulesoft Integrations, Anypoint Security Poli...
 
Lessons from the Trenches: Building an API-Centric Architecture
Lessons from the Trenches: Building an API-Centric ArchitectureLessons from the Trenches: Building an API-Centric Architecture
Lessons from the Trenches: Building an API-Centric Architecture
 
API Security using Mulesoft
API Security using MulesoftAPI Security using Mulesoft
API Security using Mulesoft
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform Management
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
API Security Lifecycle
API Security LifecycleAPI Security Lifecycle
API Security Lifecycle
 
Tips and Tricks for the Advanced Mule Developer with Tesla and Twitter
Tips and Tricks for the Advanced Mule Developer with Tesla and Twitter Tips and Tricks for the Advanced Mule Developer with Tesla and Twitter
Tips and Tricks for the Advanced Mule Developer with Tesla and Twitter
 
Introduction to Mulesoft
Introduction to MulesoftIntroduction to Mulesoft
Introduction to Mulesoft
 
MuleSoft Meetup Singapore - Reliable Messaging & RTF Operations
MuleSoft Meetup Singapore - Reliable Messaging & RTF OperationsMuleSoft Meetup Singapore - Reliable Messaging & RTF Operations
MuleSoft Meetup Singapore - Reliable Messaging & RTF Operations
 
Applying UX principles and methods to APIs
Applying UX principles and methods to APIs Applying UX principles and methods to APIs
Applying UX principles and methods to APIs
 
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
 
The RAML 1.0 Ecosystem
The RAML 1.0 EcosystemThe RAML 1.0 Ecosystem
The RAML 1.0 Ecosystem
 
Introduction to WSO2 Integration Platform
Introduction to WSO2 Integration PlatformIntroduction to WSO2 Integration Platform
Introduction to WSO2 Integration Platform
 
Developing Docs for OpenDaylight
Developing Docs for OpenDaylightDeveloping Docs for OpenDaylight
Developing Docs for OpenDaylight
 
Sydney MuleSoft meetup #11 28 November 2019 - all slides
Sydney MuleSoft meetup #11   28 November 2019 - all slidesSydney MuleSoft meetup #11   28 November 2019 - all slides
Sydney MuleSoft meetup #11 28 November 2019 - all slides
 
Using APIs
Using APIsUsing APIs
Using APIs
 
WSO2 API Manager : Going beyond the just API Management
WSO2 API Manager : Going beyond the just API ManagementWSO2 API Manager : Going beyond the just API Management
WSO2 API Manager : Going beyond the just API Management
 

Ähnlich wie Secure by design: Scaling security across the enterprise

Ähnlich wie Secure by design: Scaling security across the enterprise (20)

Governing and Sharing your Integration Assets
Governing and Sharing your Integration AssetsGoverning and Sharing your Integration Assets
Governing and Sharing your Integration Assets
 
CloudHub and other Cloud Deployment Options
CloudHub and other Cloud Deployment OptionsCloudHub and other Cloud Deployment Options
CloudHub and other Cloud Deployment Options
 
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentationJustin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
KoprowskiT-Difinify2017-SQL_Security_In_The_Cloud
KoprowskiT-Difinify2017-SQL_Security_In_The_CloudKoprowskiT-Difinify2017-SQL_Security_In_The_Cloud
KoprowskiT-Difinify2017-SQL_Security_In_The_Cloud
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: Presidio
 
Migrating DataPower to IBM's API Connect Using Custom Policies//DataPower Wee...
Migrating DataPower to IBM's API Connect Using Custom Policies//DataPower Wee...Migrating DataPower to IBM's API Connect Using Custom Policies//DataPower Wee...
Migrating DataPower to IBM's API Connect Using Custom Policies//DataPower Wee...
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Synectiks Microservice Platform
Synectiks Microservice PlatformSynectiks Microservice Platform
Synectiks Microservice Platform
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
 
Driving Digital Transformation through Big Data Analytics and Machine Learning
Driving Digital Transformation through Big Data Analytics and Machine LearningDriving Digital Transformation through Big Data Analytics and Machine Learning
Driving Digital Transformation through Big Data Analytics and Machine Learning
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
 
How to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-EndHow to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-End
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 

Mehr von MuleSoft

Mehr von MuleSoft (18)

The CIO's Guide to Digital Transformation
The CIO's Guide to Digital TransformationThe CIO's Guide to Digital Transformation
The CIO's Guide to Digital Transformation
 
How to Get Unstuck
How to Get Unstuck How to Get Unstuck
How to Get Unstuck
 
How API Enablement Drives Legacy Modernization
How API Enablement Drives Legacy ModernizationHow API Enablement Drives Legacy Modernization
How API Enablement Drives Legacy Modernization
 
Gathering Operational Intelligence in Complex Environments at Splunk
Gathering Operational Intelligence in Complex Environments at SplunkGathering Operational Intelligence in Complex Environments at Splunk
Gathering Operational Intelligence in Complex Environments at Splunk
 
MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes
 
Troubleshooting Anypoint Platform
Troubleshooting Anypoint PlatformTroubleshooting Anypoint Platform
Troubleshooting Anypoint Platform
 
Relevancy in a Rapidly Changing World (Yvonne Wassenaar)
Relevancy in a Rapidly Changing World (Yvonne Wassenaar)Relevancy in a Rapidly Changing World (Yvonne Wassenaar)
Relevancy in a Rapidly Changing World (Yvonne Wassenaar)
 
Leveraging APIs and the Cloud to Transform Veteran Care (Steve Rushing)
Leveraging APIs and the Cloud to Transform Veteran Care (Steve Rushing)Leveraging APIs and the Cloud to Transform Veteran Care (Steve Rushing)
Leveraging APIs and the Cloud to Transform Veteran Care (Steve Rushing)
 
Role of Technology in the Evolution of P&C Insurance (Marcus Ryu)
Role of Technology in the Evolution of P&C Insurance (Marcus Ryu)Role of Technology in the Evolution of P&C Insurance (Marcus Ryu)
Role of Technology in the Evolution of P&C Insurance (Marcus Ryu)
 
Industry Stories: How Application Networks are Delivering Agility (Ross Mason)
Industry Stories: How Application Networks are Delivering Agility (Ross Mason)Industry Stories: How Application Networks are Delivering Agility (Ross Mason)
Industry Stories: How Application Networks are Delivering Agility (Ross Mason)
 
Agility in the Age of Services and Hyperspecialization (Greg Schott)
Agility in the Age of Services and Hyperspecialization (Greg Schott)Agility in the Age of Services and Hyperspecialization (Greg Schott)
Agility in the Age of Services and Hyperspecialization (Greg Schott)
 
Know What You Don’t Know - ModusBox Presents the Metrics Dashboard
Know What You Don’t Know - ModusBox Presents the Metrics DashboardKnow What You Don’t Know - ModusBox Presents the Metrics Dashboard
Know What You Don’t Know - ModusBox Presents the Metrics Dashboard
 
PetSmart’s eCommerce Modernization: Using APIs To Drive Agility & Omnichannel...
PetSmart’s eCommerce Modernization: Using APIs To Drive Agility & Omnichannel...PetSmart’s eCommerce Modernization: Using APIs To Drive Agility & Omnichannel...
PetSmart’s eCommerce Modernization: Using APIs To Drive Agility & Omnichannel...
 
Building the Digital Foundation for a $28Bn Enterprise using MuleSoft’s Anypo...
Building the Digital Foundation for a $28Bn Enterprise using MuleSoft’s Anypo...Building the Digital Foundation for a $28Bn Enterprise using MuleSoft’s Anypo...
Building the Digital Foundation for a $28Bn Enterprise using MuleSoft’s Anypo...
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint Platform
 
Patterns in Microservices for Enterprises
Patterns in Microservices for EnterprisesPatterns in Microservices for Enterprises
Patterns in Microservices for Enterprises
 
DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together
 
The Platform Revolution: How Networked Markets Are Transforming the Economy -...
The Platform Revolution: How Networked Markets Are Transforming the Economy -...The Platform Revolution: How Networked Markets Are Transforming the Economy -...
The Platform Revolution: How Networked Markets Are Transforming the Economy -...
 

Kürzlich hochgeladen

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Kürzlich hochgeladen (20)

%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Secure by design: Scaling security across the enterprise

  • 1. Scaling security across the enterprise Secure by design As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 2. All contents © MuleSoft Inc. What is Security by Design? 2 As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 3. All contents © MuleSoft Inc. What is it really? 3 • Bake security into your design • Follow a standard set of principals • Think in Layers • Make it part of your culture As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 4. All contents © MuleSoft Inc. Is there an issue? 4 • OWASP Top 10 Update for 2017 As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 5. All contents © MuleSoft Inc. Security Goals 5 • Digitization of Business Capabilities • Multiple digital channels • Confidentiality • Integrity • Availability As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 6. All contents © MuleSoft Inc. Security Design Principles 6 • Targeted • Minimalized • Locked • Multi-keyed • Elastic • Reliable • Standardized As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 7. All contents © MuleSoft Inc. Targeted: Profile your APIs 7 Public APIsSemi-public APIs Private APIs As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 8. All contents © MuleSoft Inc. Minimalized: Be stingy with capabilities 8 • Domain-driven Design • Business Entities • Single responsibility principle As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 9. All contents © MuleSoft Inc. Locked: Authenticate and Authorize every call 9 • Token based Access Control • TLS • Tokenization As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 10. All contents © MuleSoft Inc. Multi-keyed: Use OpenID Connect and OAuth 2.0 10 ImplicitAuthorization Code Authorization Code Client Credentials As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 11. All contents © MuleSoft Inc. Multi-keyed: Use TLS, Mutual TLS, SAML, and JWT 11 As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 12. All contents © MuleSoft Inc. Elastic: Use Containerization & Container Scheduling 12 • Each Microservice has distinct scalability requirements • Container scheduling makes scaling easy • PaaS frameworks schedule containers based on traffic As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 13. All contents © MuleSoft Inc. Reliable: Use Domain Events 13 My Shopping Microservice Order Fulfillment Microservice Credit Card Microservice Inventory Microservice As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 14. All contents © MuleSoft Inc. Reliable: Use Circuit Breaker Pattern 14 My Shopping Microservice Customer Profile Microservice Loyalty Microservice Order History Microservice Order History Microservice As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 15. All contents © MuleSoft Inc. Standardized: Choose the best Technologies 15 As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.
  • 16. All contents © MuleSoft Inc. Speed. Agility. API Security. Innovation. 16 • Emerges bottoms-up via self-service • Provides visibility, security and governability at every API node • Is recomposable: it bends, not breaks – built for change An application network As of April 20th, 2017 and subject to change at MuleSoft's exclusive discretion.

Hinweis der Redaktion

  1. No friction between goals of business to expose capabilities and goals of security to restrict access
  2. Targeted => network ; profile; oauth 2.0 grant type Minimalized=> in commands and capabilitiies; business entities; Domain driven; filter data (ABAC); Locked => default + every call is protected; TLS; (tokenization; encryption of data at rest) Multi-keyed => OpenID Connect (access + id) ; private : access token + mutual TLS Elastic => container scheduling; service lookup; business entitties are easier to scale Reliable => use event driven; encrypt messages; no subscripiton in the DMZ; circuit breaker Standardized => all the above
  3. According to user segmentation and hence network segmentation
  4. Least privilege
  5. Username / password credentials are evil Hide and guarantee integrity with encryption and digital signatures
  6. Auth code where possible because client forced to authenticate Never use resource owner password credentials Recognize the limit of oauth. WE NEED RBAC OR ABAC
  7. Protect all web apis with HTTPS Never use plain http Self-sign only within corporate Mutual TLS on corporate and extranet
  8. We have a need to grow and shrink with traffic Devops facilitates rapid provisioning Paas make all this easy with dynamic scaling
  9. Distributed transactions are evil Eventual consistency is good (lines with needs of business) Guaranteed delivery Better customer experience
  10. Graceful handling of failures Use fallback to deliver some default set of info (perhaps cached)
  11. If we use standards the quality is much better Vulnerabilities of public frameworks identified and solved.