The Dark Side of Microservices: Turn on the Lights with Kubernetes WAAP multi-layered defense


Welcome to the final chapter of our blog series, “The Dark Side of Microservices.” If you have been following along, you have journeyed with us through the intricate world of microservices, explored the potential threats lurking in the shadows, and learned how to illuminate your path with next-gen WAAP solutions. In this concluding chapter, we will delve into the protection layers, ensuring you have the strongest defenses to protect your microservices in the dynamic and challenging landscape of Kubernetes.

Core Kubernetes WAAP Components and Capabilities:

Before we dive into the protection layers, let’s take a moment to understand the core components and capabilities that Kubernetes WAAP should have to provide the essential protection layers.

Enforcer:

The Enforcer, much like a vigilant sentry, must be a lightweight component with the crucial responsibility of inspecting incoming traffic, both for web and API requests. But its role doesn’t end there. Here’s what will make the Enforcer a powerful guardian:

Traffic Inspection:
The Enforcer thoroughly examines incoming requests and based on predefined security policies, decides whether to allow, report, or block the request. This means that only legitimate and safe traffic makes it through, while potential threats are intercepted in real-time.

Data Protection:
Beyond its gatekeeping function, the Enforcer will also be responsible for inspecting server responses. It can mask or synthesize sensitive data to protect against data leakage and ensure data privacy and compliance.

Scalability:
In the ever-evolving landscape of Kubernetes, scalability is key. The Enforcer should scale in and out as needed, natively handled by Kubernetes’ scaling mechanisms. This ensures that your security measures remain efficient and responsive, no matter the scale of your microservices environment.

Behavioral Analysis:
In the realm of security, understanding behavioral patterns is vital. The Enforcer should collect behavioral data, enabling it to identify malicious actors. By analyzing these behaviors, it can discern patterns that suggest a “bad actor” and take the necessary actions, including blocking them.

Backend:

The Backend is the second critical component in the Kubernetes WAAP solution. It should serve as the control centre, orchestrating the deployment of Enforcers and managing the security policies. Here’s a closer look at its role:

Data Collection:
One of the Backend’s critical functions is to collect telemetry data from the Enforcers. It gathers all security events reported by the Enforcers and stores this data locally, creating a comprehensive repository of security incidents and anomalies. This information can also be shared with third-party Security Information and Event Management (SIEM) applications for further analysis.

Security Policy Management:
The Backend is responsible for managing all deployed Enforcers, ensuring they have the most up-to-date security policies. This ensures that your microservices are consistently protected against evolving threats.

Behavioral Data Analysis:
Behaviour data collected from the Enforcers is not just stored; it is analyzed. The Backend assesses this data, identifying trends, patterns, and anomalies. By understanding how your microservices and their users behave, it can adjust security policies dynamically, responding to emerging threats and maintaining a proactive stance against potential attacks.

Policy Control with Kubernetes CRDs:
The Backend should empower DevSecOps teams with the ability to implement security as code (SaC). The best way to achieve that is through Kubernetes Custom Resource Definitions (CRDs). This means you can define and control your security policies as part of your Kubernetes resources, streamlining security management and integration into your DevOps pipeline.

Protection Layers:

The deployment strategies for Kubernetes WAAP should offer a multi-layered defence that can be tailored to your specific security needs. The best deployment approach is to gradually strengthen by first protecting the perimeter, moving on to safeguarding your crown jewels, and finally implementing full-mesh protection. If you are strict with data privacy, the Kubernetes WAAP should provide a 100% air-gapped solution, meaning that all components are installed within your environment.

Protecting the “Crown Jewels”:
Your crown jewels are your most critical assets, deserving the utmost protection. In this case, you identify the microservices that expose an interface to these critical assets, such as a database or microservices accessing critical information. You can then define that all incoming traffic to these microservices will be inspected by an Enforcer. This approach not only examines requests coming from outside the environment but also requests generated from within, possibly by malicious code operating inside the environment.

This deployment option allows you to define a highly specific security policy tailored to these critical microservices. The Enforcers should support machine-to-machine protocols such as gRPC. Moreover, the Enforcers will collect specific behavioral data relevant only to these microservices and take actions to block suspicious requests. They can alert you to internal bad actors operating from inside the environment and can also mask or sanitize sensitive data leaving the microservices. This approach provides an intimate and accurate security policy that is highly relevant to these specific microservices, guaranteeing exceptionally low latency.

Protecting the Perimeter:
In this protection area, we explore the basic and traditional way to protect your application. You deploy an Enforcer that is responsible for inspecting and enforcing all incoming traffic originating from outside your environment. The Ingress Controller or API Gateway forwards traffic to the Enforcer, waiting for the Enforcer’s decision to block or pass the request. In this option, the security policy should be defined from the perspective of the entire application to cover all incoming Layer 7 threats.

Full Mesh Protection:
In the full mesh protection approach, you monitor all internal traffic between all microservices. This offers the highest level of protection with an intimate relationship with each microservice. This approach ensures that all inter-microservice communications are scrutinized, enhancing the security posture and enabling a proactive stance against potential threats.

Summary:

As we conclude our journey through “The Dark Side of Microservices,” you should now have a clear understanding of the threats that microservices face and the powerful weapon that a true Kubernetes WAAP can be in your security arsenal. Whether you choose to protect the perimeter, secure your crown jewels, or provide full-mesh protection, we’ve got you covered.

By exploring the various protection layers, you’ll be equipped to make the best choice for your organization, ensuring that your microservices in Kubernetes are not only powerful and efficient but also fortified against the dark forces of the digital world.

With Radware KWAAP, you can have it all: a Kubernetes-native high-end security protection that supports the above essential protection layers.

Your digital assets deserve the best defense – stay informed, stay safe and contact us to get more information about Radware’s application protection for Kubernetes.

Tomer Rozentzvaig

Director of Product Management – AppSec Tomer is a 25-year Hi-Tech industry expert. He has been actively involved in developing, inventing and leading product development for distributed heterogeneous network environments for military and paramilitary organizations. His career has been focused on 3 key areas: security, providing value to customers and delivering an excellent user experience (UX). In his various roles, Tomer has led all security risk analysis tasks and has been responsible for implementing mitigation solutions at every layer of the network.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center