Slide 1

Slide 1 text

Build a Secure Developer Platform Using Argo, Istio and Vault Jona Apelbaum & Alessandro Vozza

Slide 2

Slide 2 text

2 | Copyright © 2022 Field Engineer Solo.io Placeholder Slide Title Jona Apelbaum Platform Advocate Solo.io Alessandro Vozza

Slide 3

Slide 3 text

3 | Copyright © 2022

Slide 4

Slide 4 text

4 | Copyright © 2022 01 02 03 04 05 06 Developer Portals Pimp your IdP with Service Mesh Multi-{tenant|cluster|cloud} Automate everything w/ GitOps + Demo Secure your workloads + Demo Wrap up Agenda Slide – 6 Items

Slide 5

Slide 5 text

5 | Copyright © 2022 Solo.io - Pick the right Cloud-Native building blocks Well Funded ($135M), $1B Valuation Satisfied Customers (135% Renewals) Cloud-native Technology Leadership Cloud-native Education Leadership Unified Platform for API Gateway | Multi-Cloud | Zero-Trust | Observability

Slide 6

Slide 6 text

6 | Copyright © 2022 1. What is a Developer Portal?

Slide 7

Slide 7 text

7 | Copyright © 2022 Internal Developer Platforms Developers -first experience IdPs are interfaces to backend services, catalogs and utilities for developers

Slide 8

Slide 8 text

8 | Copyright © 2022 - Self service - Comprehensive - Best practices - Platform Engineering team - Secure - Automated discovery IdPs for all

Slide 9

Slide 9 text

9 | Copyright © 2022 SRE, Platform, DevOps? SRE practices Platform Engineering DevOps culture DevOps SRE Platform Engineering

Slide 10

Slide 10 text

10 | Copyright © 2022 2. Service Mesh and IdPs

Slide 11

Slide 11 text

11 | Copyright © 2022 Service Mesh in 2 minutes

Slide 12

Slide 12 text

12 | Copyright © 2022

Slide 13

Slide 13 text

13 | Copyright © 2022 3. Multi-{tenant|cluster|cloud}

Slide 14

Slide 14 text

14 | Copyright © 2022 Multi-everything

Slide 15

Slide 15 text

15 | Copyright © 2022 Multicluster Istio

Slide 16

Slide 16 text

16 | Copyright © 2022 Multicluster Istio

Slide 17

Slide 17 text

17 | Copyright © 2022 N/S vs E/W traffic

Slide 18

Slide 18 text

18 | Copyright © 2022 4. Automate everything w/ GitOps

Slide 19

Slide 19 text

19 | Copyright © 2022 GitOps in 2 minutes

Slide 20

Slide 20 text

20 | Copyright © 2022 How do we do GitOps https://akuity.io/

Slide 21

Slide 21 text

21 | Copyright © 2022 Demo 1: Multicluster canary

Slide 22

Slide 22 text

22 | Copyright © 2022 Intermezzo: what’s going on?

Slide 23

Slide 23 text

23 | Copyright © 2022 5. Securing your workloads

Slide 24

Slide 24 text

24 | Copyright © 2022 Traditional Security - Edge Security DC / On-Prem X DMZ

Slide 25

Slide 25 text

25 | Copyright © 2022 Traditional Security - Edge Security DC / On-Prem X Privileged user

Slide 26

Slide 26 text

26 | Copyright © 2022 Traditional Security - Edge Security DC / On-Prem X Privileged user Phishing victim

Slide 27

Slide 27 text

27 | Copyright © 2022 Traditional Security - Edge Security DC / On-Prem Privileged user Phishing victim Access unlocked!

Slide 28

Slide 28 text

28 | Copyright © 2022 Moving to Microservices ● Increased complexity ● Increased # attack surfaces ● More vulnerable

Slide 29

Slide 29 text

29 | Copyright © 2022 What is Zero Trust • Zero Trust (ZT) is a set of security principles that treats every component, service and user of a system continuously exposed to and potentially compromised by a malicious adversary • Zero Trust Architecture (ZTA) is an enterprise’s cybersecurity plan that utilises ZT concepts and encompasses component relationships, workflow planning, and access policies • Zero Trust Enterprise (ZTE) is the network infrastructure and operational policies that are in place for an enterprise as a product of zero trust architecture plan

Slide 30

Slide 30 text

30 | Copyright © 2022 Principles of Zero Trust • Assume no implicit or explicit trusted zone in network • Identity verification strictly enforced for all connections • Access Control strictly enforced for communication between apps and servers • Risk profiles, generated in realtime are used in resource access control • All sensitive data is encrypted both in transit and at rest • All events are continuously monitored, collected, stored and analysed to assess compliance with security policies • Policy management and distribution is centralised https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity

Slide 31

Slide 31 text

31 | Copyright © 2022

Slide 32

Slide 32 text

32 | Copyright © 2022 Secretless workloads with Vault

Slide 33

Slide 33 text

33 | Copyright © 2022 Demo 2: Secretless workloads

Slide 34

Slide 34 text

34 | Copyright © 2022 6. Wrap up What did we learn?

Slide 35

Slide 35 text

35 | Copyright © 2022 35 | Copyright © 2022 https://academy.solo.io

Slide 36

Slide 36 text

Thank You!