SlideShare a Scribd company logo
Think 2018 / © 2018 IBM Corporation
Skip the Anxiety Attack when Building
Secure Containerized Apps
—
Lewis Evans
Senior Software Engineer,
IBM Container Service Development
Contents
2Think 2018 / © 2018 IBM Corporation
• What is all of this new technology?
Ø containers, microservices, orchestration
• I’m scared to run in the cloud
• How can IBM help me?
Definitions
A standard way to package an application and all
its dependencies so that it can be moved between
environments and run without changes.
Containers work by isolating the differences
between applications inside the container so that
everything outside the container can be
standardized.
Containers
IBM Cloud Container Service | IBM Confidential | ©2017 IBM Corporation
Container Use Cases
Create new cloud-native apps
Streamline development
with built-in microservices, runtimes,
containers and Kubernetes orchestration
plus integrated management.
Modernize your heritage apps on cloud
Move your apps as-is to the cloud or re-
factor an app and use it in new
development and application workload
models.
Open your data center to work with cloud
services
Protect and leverage your in-house data
and pull in external
Allows users to define how to coordinate the
containers in the cloud when the multi-container
packaged application is deployed.
• Scheduling
• Cluster management
• Service discovery
• Provisioning
• Monitoring
• Configuration management
Container Orchestration
An engineering approach focused on decomposing an
application into single-function modules with well
defined interfaces which are independently deployed
and operated by a small team who owns the entire
lifecycle of the service.
Microservices accelerate delivery by minimizing
communication and coordination between people while
reducing the scope and risk of change.
Microservices
Problem
“Over 30% of Official
Images in DockerHub
Contain High Priority
Security Vulnerabilities”
Banyan Ops report
Source: http://bit.ly/2eknhJs
“80% of attacks leverage known
vulnerabilities and configuration
management setting weaknesses”
US State Department report
Source: http://bit.ly/2esbkke
The Heartbleed bug allows anyone on the Internet to read
the memory of the systems protected by the vulnerable
versions of the OpenSSL software. This compromises the
secret keys used to identify the service providers and to
encrypt the traffic, the names and passwords of the users
and the actual content. This allows attackers to eavesdrop
on communications, steal data directly from the services
and users and to impersonate services and users.
Source: http://heartbleed.com
The consequences of an attacker
successfully exploiting this vulnerability
on a Web server are serious in nature.
For example attackers may have the
ability to dump password files or
download malware on to infected
computers. Once inside the victim’s
firewall, the attackers could then
compromise and infect other computers
on the network.
Source: http://symc.ly/2e1blNM
IBM Cloud Container Service | ©2018 IBM Corporation
Sometimes things don’t
go as planned…
Many possibilities for failure
• Failures WILL happen
• Their root causes can be complex and
affect different number of users
• Reduce the likelihood of correlated
failures
• Recover quickly
• Proactive detection of problems before
they happen
Datacenter
Server Rack
Server
Virtual Server
Code
Request
Being competitive
requires:
– Rapid delivery
– Leveraging public cloud
– Simple, rapid scaling
Container and
microservice
considerations:
- Monitoring
- Logging
- Security
- Application versioning
- Root cause analysis
- Persistent storage
- Docker engine management
- Kubernetes version
Skip the anxiety attack when building secure containerized apps
A managed Kubernetes service providing an intuitive user experience
with on-going cluster management. Built-in security and isolation to
enable rapid delivery of apps, while leveraging IBM Cloud Services
including Weather data, IoT, Analytics, or AI capabilities with Watson.
Available in six IBM regions WW, including 19 datacenters.
Kubernetes Certified Service Provider
Kubernetes Technology Partner
Kubernetes Service Providers
IBM Cloud Container Service | ©2018 IBM Corporation
Kubernetes
Capabilities
Intelligent Scheduling Self-healing Horizontal scaling
Service discovery & load balancing Automated rollouts and rollbacks Secret and configuration management
IBM Cloud Container Service | ©2018 IBM Corporation
API
UI
CLI
Kubernetes
Master
Worker Node 1
Worker Node 2
Worker Node 3
Worker Node n
Registry
• Etcd
• API Server
• Controller Manager
Server
• Scheduler Server
Kubernetes Architecture
Cluster
Management
Capabilities
Simplified cluster
management
Extend with
IBM Cloud & Watson
Container security
& isolation
Automated
toolchains
Native open-source
experience
Integrated
operational tools
IBM Cloud Container Service | ©2018 IBM Corporation
• Intuitive graphical user experience
• CLI and API alternatives
• Fully managed master nodes
• User controlled worker node management
Simplified Cluster Management
IBM Cloud Container Service | ©2018 IBM Corporation
• Provides Docker image and running container scanning to
detect vulnerabilities and configuration weaknesses with
Vulnerability Advisor
• Image security enforcement
• Store your images securely in your hosted private registry
• Docker image signing
• Automatic encryption of secrets and volumes
• Isolated networking and storage
Container Security & Isolation
IBM Cloud Container Service | ©2018 IBM Corporation
Design Your Own Cluster
• Tunable capacity
• Select between shared and
dedicated compute
• Edge nodes
• Configurable networking and
storage
• Integrated VPN
IBM Cloud Container Service | ©2018 IBM Corporation
Extend IBM Cloud Services
• Enhance your application with Watson, IoT, Analytics and Data
Services
• Persistent Volumes using IBM Cloud storage
• IP and application Load Balancing
• Integrated with IBM Cloud access management
IBM Cloud Container Service | ©2018 IBM Corporation
Native Kubernetes Experience
• Seamless experience moving from local
development to IBM Bluemix
• 100% Kubernetes API and tools
• Supports Kubernetes dashboard
• Leverage Docker images
IBM Cloud Container Service | ©2018 IBM Corporation
Integrated Operational Tools
• Built-in log and metrics collection with IBM Bluemix
log and metrics services
• Use with IBM DevOps tools such as Delivery Pipeline
• Supports popular add-ons including Prometheus,
Weave, sysdig, fluentd and others
IBM Cloud Container Service | ©2018 IBM Corporation
Hardware level trust in the cloud?
Introducing:
IBM Cloud Container Service
with Trusted Compute
28Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation
Image Area
Tamper-proof assurance with a chain of
trust, rooted in hardware
Audit the trusted status of Bare-metal
Kubernetes worker nodes for compliance
needs
Uniquely secure: Containers protection
from the hardware up, available only from
IBM
How IBM delivers IBM Cloud Container Service with Trusted
Compute
Tamper-proof integrity assurance with a chain of trust rooted in hardware with Intel® Trusted Execution
Technology (Intel® TXT)
• Hardware Root of Trust with Intel® TXT
• Chain of Trust & Attestation with Intel Cloud
Integrity Technology (Intel ® CIT)
• Transparent visibility of Integrity assurance
to Kubernetes orchestration
• Container Integrity with Docker Trust
• Audit Logging and Continuous Monitoring
29
Skip the Anxiety Attack When Building
Secure Containerized Apps
Skip the Anxiety Attack When Building
Secure Containerized Apps
• Integrated security insights with Vulnerability Advisor
• Control access to cluster and containerized apps
• Network isolation
• Physical server isolation in the cloud
• Easy development with portable Docker containers
• Fast and scalable deployments with Kubernetes
• Create HA clusters and apps
• Operations support with native tools and 3rd party tools
• Modernize your apps using 170+ services from IBM Cloud
catalog, including Watson, Weather, IoT, or Data
What
do our
users
say?
“easy setup compared to the other cloud services like AWS,
Google cloud and Azure.”
“The biggest factor is that the cluster is managed. The cluster
management of kubernetes is a component with a lot of
learning cost high recognition.”
“Voice Gateway + Watson is used to validate call center
solutions”
“high speed”
“simple to use”
“Its right on the mark in terms of control and also you have a
free option. I am experimenting with blockchain using CS”
“We believe that it is attractive that you can leave the
infrastructure management part of the kubernetes cluster,
verify the safety of containers, and the part of cooperation
with bluemix team.”
Thank you
33Think 2018 / © 2018 IBM Corporation
Lewis Evans
Senior Software Engineer,
IBM Cloud Container Service Development
—
Lewis.evans@uk.ibm.com
Learn more:
ibm.biz/ibm-k8s
Ad

More Related Content

What's hot (20)

The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
Kiran Kumar
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
Developing Hybrid Cloud Applications
Developing Hybrid Cloud ApplicationsDeveloping Hybrid Cloud Applications
Developing Hybrid Cloud Applications
Daniel Berg
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
DevOps on GCP Course Compared to AWS
DevOps on GCP Course Compared to AWSDevOps on GCP Course Compared to AWS
DevOps on GCP Course Compared to AWS
Joseph Holbrook, Chief Learning Officer (CLO)
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
IBM Containers- Bluemix
IBM Containers- BluemixIBM Containers- Bluemix
IBM Containers- Bluemix
Virginia Fernandez
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
Abdul Rasheed Feroz Khan
 
TechWiseTV Workshop: Intercloud Fabric
TechWiseTV Workshop: Intercloud FabricTechWiseTV Workshop: Intercloud Fabric
TechWiseTV Workshop: Intercloud Fabric
Robb Boyd
 
Azure IoT Hub: what is it and why we select other solution (production projec...
Azure IoT Hub: what is it and why we select other solution (production projec...Azure IoT Hub: what is it and why we select other solution (production projec...
Azure IoT Hub: what is it and why we select other solution (production projec...
Katherine Golovinova
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
Dharmalingam S
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Antonio Sanz Alcober
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
Deep Ranjan Deb
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Watson kista summit 2018 icp
Watson kista summit 2018 icpWatson kista summit 2018 icp
Watson kista summit 2018 icp
IBM Sverige
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
Ankit Gupta
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
Kiran Kumar
 
Developing Hybrid Cloud Applications
Developing Hybrid Cloud ApplicationsDeveloping Hybrid Cloud Applications
Developing Hybrid Cloud Applications
Daniel Berg
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
TechWiseTV Workshop: Intercloud Fabric
TechWiseTV Workshop: Intercloud FabricTechWiseTV Workshop: Intercloud Fabric
TechWiseTV Workshop: Intercloud Fabric
Robb Boyd
 
Azure IoT Hub: what is it and why we select other solution (production projec...
Azure IoT Hub: what is it and why we select other solution (production projec...Azure IoT Hub: what is it and why we select other solution (production projec...
Azure IoT Hub: what is it and why we select other solution (production projec...
Katherine Golovinova
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
Dharmalingam S
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
Deep Ranjan Deb
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Watson kista summit 2018 icp
Watson kista summit 2018 icpWatson kista summit 2018 icp
Watson kista summit 2018 icp
IBM Sverige
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
Ankit Gupta
 

Similar to Skip the anxiety attack when building secure containerized apps (20)

Istio - A Service Mesh for Microservices as Scale
Istio - A Service Mesh for Microservices as ScaleIstio - A Service Mesh for Microservices as Scale
Istio - A Service Mesh for Microservices as Scale
Ram Vennam
 
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
CodeOps Technologies LLP
 
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM Cloud Paris Meetup - 20180628 - IBM Cloud PrivateIBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM France Lab
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Understanding Docker and IBM Bluemix Container Service
Understanding Docker and IBM Bluemix Container ServiceUnderstanding Docker and IBM Bluemix Container Service
Understanding Docker and IBM Bluemix Container Service
Andrew Ferrier
 
Accelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud PrivateAccelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud Private
Michael Elder
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
Somnath Sen
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902a
Tony Pearson
 
Bluemix overview v1.4
Bluemix overview v1.4Bluemix overview v1.4
Bluemix overview v1.4
Jose Pena
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
Kim Clark
 
VietOpenStack meetup 7th Openstack in ibm cloud
VietOpenStack meetup 7th Openstack in ibm cloudVietOpenStack meetup 7th Openstack in ibm cloud
VietOpenStack meetup 7th Openstack in ibm cloud
Vietnam Open Infrastructure User Group
 
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Michael Elder
 
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Edge 2016 Session 1886  Building your own docker container cloud on ibm power...Edge 2016 Session 1886  Building your own docker container cloud on ibm power...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Yong Feng
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Pradeep Bhatia
 
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
Michael O'Sullivan
 
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Luis Beltran
 
CLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptxCLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptx
DheekshithaPasala
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
Michael O'Sullivan
 
Beginners Guide and general overview to Cloud Computing.pptx
Beginners Guide and general overview to Cloud Computing.pptxBeginners Guide and general overview to Cloud Computing.pptx
Beginners Guide and general overview to Cloud Computing.pptx
samuelspiritus83
 
Istio - A Service Mesh for Microservices as Scale
Istio - A Service Mesh for Microservices as ScaleIstio - A Service Mesh for Microservices as Scale
Istio - A Service Mesh for Microservices as Scale
Ram Vennam
 
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
CodeOps Technologies LLP
 
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM Cloud Paris Meetup - 20180628 - IBM Cloud PrivateIBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM France Lab
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Understanding Docker and IBM Bluemix Container Service
Understanding Docker and IBM Bluemix Container ServiceUnderstanding Docker and IBM Bluemix Container Service
Understanding Docker and IBM Bluemix Container Service
Andrew Ferrier
 
Accelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud PrivateAccelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud Private
Michael Elder
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
Somnath Sen
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902a
Tony Pearson
 
Bluemix overview v1.4
Bluemix overview v1.4Bluemix overview v1.4
Bluemix overview v1.4
Jose Pena
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
Kim Clark
 
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Michael Elder
 
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Edge 2016 Session 1886  Building your own docker container cloud on ibm power...Edge 2016 Session 1886  Building your own docker container cloud on ibm power...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Yong Feng
 
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
Michael O'Sullivan
 
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
Luis Beltran
 
CLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptxCLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptx
DheekshithaPasala
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
Michael O'Sullivan
 
Beginners Guide and general overview to Cloud Computing.pptx
Beginners Guide and general overview to Cloud Computing.pptxBeginners Guide and general overview to Cloud Computing.pptx
Beginners Guide and general overview to Cloud Computing.pptx
samuelspiritus83
 
Ad

More from Haidee McMahon (8)

Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
Haidee McMahon
 
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Haidee McMahon
 
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Haidee McMahon
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
Haidee McMahon
 
Introduction to Intel's Developer Program
Introduction to Intel's Developer Program Introduction to Intel's Developer Program
Introduction to Intel's Developer Program
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
Haidee McMahon
 
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Haidee McMahon
 
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Haidee McMahon
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
Haidee McMahon
 
Introduction to Intel's Developer Program
Introduction to Intel's Developer Program Introduction to Intel's Developer Program
Introduction to Intel's Developer Program
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Haidee McMahon
 
Ad

Recently uploaded (20)

Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 

Skip the anxiety attack when building secure containerized apps

  • 1. Think 2018 / © 2018 IBM Corporation Skip the Anxiety Attack when Building Secure Containerized Apps — Lewis Evans Senior Software Engineer, IBM Container Service Development
  • 2. Contents 2Think 2018 / © 2018 IBM Corporation • What is all of this new technology? Ø containers, microservices, orchestration • I’m scared to run in the cloud • How can IBM help me?
  • 4. A standard way to package an application and all its dependencies so that it can be moved between environments and run without changes. Containers work by isolating the differences between applications inside the container so that everything outside the container can be standardized. Containers
  • 5. IBM Cloud Container Service | IBM Confidential | ©2017 IBM Corporation Container Use Cases Create new cloud-native apps Streamline development with built-in microservices, runtimes, containers and Kubernetes orchestration plus integrated management. Modernize your heritage apps on cloud Move your apps as-is to the cloud or re- factor an app and use it in new development and application workload models. Open your data center to work with cloud services Protect and leverage your in-house data and pull in external
  • 6. Allows users to define how to coordinate the containers in the cloud when the multi-container packaged application is deployed. • Scheduling • Cluster management • Service discovery • Provisioning • Monitoring • Configuration management Container Orchestration
  • 7. An engineering approach focused on decomposing an application into single-function modules with well defined interfaces which are independently deployed and operated by a small team who owns the entire lifecycle of the service. Microservices accelerate delivery by minimizing communication and coordination between people while reducing the scope and risk of change. Microservices
  • 9. “Over 30% of Official Images in DockerHub Contain High Priority Security Vulnerabilities” Banyan Ops report Source: http://bit.ly/2eknhJs “80% of attacks leverage known vulnerabilities and configuration management setting weaknesses” US State Department report Source: http://bit.ly/2esbkke The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. Source: http://heartbleed.com The consequences of an attacker successfully exploiting this vulnerability on a Web server are serious in nature. For example attackers may have the ability to dump password files or download malware on to infected computers. Once inside the victim’s firewall, the attackers could then compromise and infect other computers on the network. Source: http://symc.ly/2e1blNM IBM Cloud Container Service | ©2018 IBM Corporation
  • 11. Many possibilities for failure • Failures WILL happen • Their root causes can be complex and affect different number of users • Reduce the likelihood of correlated failures • Recover quickly • Proactive detection of problems before they happen Datacenter Server Rack Server Virtual Server Code Request
  • 12. Being competitive requires: – Rapid delivery – Leveraging public cloud – Simple, rapid scaling
  • 13. Container and microservice considerations: - Monitoring - Logging - Security - Application versioning - Root cause analysis - Persistent storage - Docker engine management - Kubernetes version
  • 15. A managed Kubernetes service providing an intuitive user experience with on-going cluster management. Built-in security and isolation to enable rapid delivery of apps, while leveraging IBM Cloud Services including Weather data, IoT, Analytics, or AI capabilities with Watson. Available in six IBM regions WW, including 19 datacenters. Kubernetes Certified Service Provider Kubernetes Technology Partner Kubernetes Service Providers IBM Cloud Container Service | ©2018 IBM Corporation
  • 17. Intelligent Scheduling Self-healing Horizontal scaling Service discovery & load balancing Automated rollouts and rollbacks Secret and configuration management IBM Cloud Container Service | ©2018 IBM Corporation
  • 18. API UI CLI Kubernetes Master Worker Node 1 Worker Node 2 Worker Node 3 Worker Node n Registry • Etcd • API Server • Controller Manager Server • Scheduler Server Kubernetes Architecture
  • 20. Simplified cluster management Extend with IBM Cloud & Watson Container security & isolation Automated toolchains Native open-source experience Integrated operational tools IBM Cloud Container Service | ©2018 IBM Corporation
  • 21. • Intuitive graphical user experience • CLI and API alternatives • Fully managed master nodes • User controlled worker node management Simplified Cluster Management IBM Cloud Container Service | ©2018 IBM Corporation
  • 22. • Provides Docker image and running container scanning to detect vulnerabilities and configuration weaknesses with Vulnerability Advisor • Image security enforcement • Store your images securely in your hosted private registry • Docker image signing • Automatic encryption of secrets and volumes • Isolated networking and storage Container Security & Isolation IBM Cloud Container Service | ©2018 IBM Corporation
  • 23. Design Your Own Cluster • Tunable capacity • Select between shared and dedicated compute • Edge nodes • Configurable networking and storage • Integrated VPN IBM Cloud Container Service | ©2018 IBM Corporation
  • 24. Extend IBM Cloud Services • Enhance your application with Watson, IoT, Analytics and Data Services • Persistent Volumes using IBM Cloud storage • IP and application Load Balancing • Integrated with IBM Cloud access management IBM Cloud Container Service | ©2018 IBM Corporation
  • 25. Native Kubernetes Experience • Seamless experience moving from local development to IBM Bluemix • 100% Kubernetes API and tools • Supports Kubernetes dashboard • Leverage Docker images IBM Cloud Container Service | ©2018 IBM Corporation
  • 26. Integrated Operational Tools • Built-in log and metrics collection with IBM Bluemix log and metrics services • Use with IBM DevOps tools such as Delivery Pipeline • Supports popular add-ons including Prometheus, Weave, sysdig, fluentd and others IBM Cloud Container Service | ©2018 IBM Corporation
  • 27. Hardware level trust in the cloud?
  • 28. Introducing: IBM Cloud Container Service with Trusted Compute 28Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation Image Area Tamper-proof assurance with a chain of trust, rooted in hardware Audit the trusted status of Bare-metal Kubernetes worker nodes for compliance needs Uniquely secure: Containers protection from the hardware up, available only from IBM
  • 29. How IBM delivers IBM Cloud Container Service with Trusted Compute Tamper-proof integrity assurance with a chain of trust rooted in hardware with Intel® Trusted Execution Technology (Intel® TXT) • Hardware Root of Trust with Intel® TXT • Chain of Trust & Attestation with Intel Cloud Integrity Technology (Intel ® CIT) • Transparent visibility of Integrity assurance to Kubernetes orchestration • Container Integrity with Docker Trust • Audit Logging and Continuous Monitoring 29
  • 30. Skip the Anxiety Attack When Building Secure Containerized Apps
  • 31. Skip the Anxiety Attack When Building Secure Containerized Apps • Integrated security insights with Vulnerability Advisor • Control access to cluster and containerized apps • Network isolation • Physical server isolation in the cloud • Easy development with portable Docker containers • Fast and scalable deployments with Kubernetes • Create HA clusters and apps • Operations support with native tools and 3rd party tools • Modernize your apps using 170+ services from IBM Cloud catalog, including Watson, Weather, IoT, or Data
  • 32. What do our users say? “easy setup compared to the other cloud services like AWS, Google cloud and Azure.” “The biggest factor is that the cluster is managed. The cluster management of kubernetes is a component with a lot of learning cost high recognition.” “Voice Gateway + Watson is used to validate call center solutions” “high speed” “simple to use” “Its right on the mark in terms of control and also you have a free option. I am experimenting with blockchain using CS” “We believe that it is attractive that you can leave the infrastructure management part of the kubernetes cluster, verify the safety of containers, and the part of cooperation with bluemix team.”
  • 33. Thank you 33Think 2018 / © 2018 IBM Corporation Lewis Evans Senior Software Engineer, IBM Cloud Container Service Development — [email protected] Learn more: ibm.biz/ibm-k8s