HomeNewsIndia NewsUseful directives to Secure Microservices

    Useful directives to Secure Microservices

    As enterprises look to become more Agile and move towards a DevOps and continuous testing, the need for microservices has grown manifolds.

    Businesses require a next-generation web application firewall (WAF) that enables secure delivery of applications. Software development life cycle (SDLC), is as flexible as the dynamic environment and threat landscape and adapts to the needs of the business. Before considering any solution, make sure it meets the requirements of both development and operations (DevOps) and security teams.

    SQL injections, cross-site scripting, access violations, remote file inclusion — running applications in a service mesh architecture don’t eliminate the risk from data leakage or service disruptions. Emerging continuous integration and continuous delivery (CI/CD) technologies disrupt common practices and processes and create new blind spots.

    Here are 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.

    Native Fit into CI/CD Pipeline

    • Kubernetes controlled elasticity — Easily orchestrated, grows and scales application security along with Kubernetes pods, including auto-learned policies and configuration settings.
    • Automation at the speed of development — Application programming interfaces (APIs) for integration with common tools for security provisioning of new services and applications, with a local management and reporting interface.
    • TLS termination — End-to-end encryption is necessary to secure data integrity and avoid eavesdropping and man-in-the-middle (MITM) attacks. A single TLS termination at the host also eliminates spreading multiple certificates across third parties.
    • Minimal footprint — Microservices are all about micro units; thus, the enforcement point in the data plane should be lightweight while the control plane (management, analytics and learning algorithms) is integrated into the environment independently.

     Quality of Protection

    • Extensive security — Application protection today goes beyond the OWASP Top 10, so a good WAF needs to accurately detect malicious bot activity, secure APIs and mitigate denial-of-service attacks.
    • Effective security (zero-day protection) — Negative and positive security models are necessary to protect against known and unknown threats, thus maximizing security and minimizing false positives.
    • Adaptive security — Immediate detection of new and modified applications in the CI/CD pipeline isn’t enough and must be followed by automatic generation and optimization of security policies.
    • Data leakage prevention — Make sure data that is being shared externally is protected. Credit card and Social Security numbers must be masked, cookies must be encrypted, and scrapers should be misled with fake data.

    For more information, visit: www.radware.com

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    Electronics Manufacturing Surges to ₹11.5 Lakh Crore Industry, Generates 25 Lakh Jobs: Vaishnaw

    The growth of electronics manufacturing in India is unprecedented,...

    Decision Tree Learning Architecture Definition, Types and Diagram

    Decision Tree Learning's architecture is a tree-like, hierarchical structure...

    Top 10 Reinforcement Learning Applications and Use Cases

    One of the most intriguing areas of machine learning...

    How TVS Electronics is Transforming Digital India with “Make in India” AIDC

    In the fast-paced world of digital transformation, Automatic Identification...

    Lotus Microsystems and EDOM Technology Form Strategic Distribution Partnership to Expand Presence Across APAC

    Distribution Partnership to Expand Presence Across APAC Lotus Microsystems ApS,...

    Cars That Talk: Reimagining driving with RADAR, LIDAR and Smart Connectivity

    By: STMicroelectronics Vehicles across the continent are increasingly shifting from...

    Tata–Merck MoU to Accelerate Chip Manufacturing Infrastructure in India

    Tata Electronics Private Limited has signed a strategic Memorandum...