Understanding Zero Trust Security with Service Mesh

A presentation at Devoxx Poland in June 2022 in Kraków, Poland by Viktor Gamov

Slide 1

Slide 1

Understanding Zero Trust Security with Service Mesh DEVOXX, KRAKOW, POLAND, 2022 @gamussa | @DevoxxPl | @thekonginc

Slide 2

Slide 2

TRUST @gamussa | @DevoxxPl | @thekonginc

Slide 3

Slide 3

THE CLOUD CONNECTIVITY COMPANY @gamussa | @DevoxxPl | @thekonginc

Slide 4

Slide 4

THE CLOUD CONNECTIVITY COMPANY @gamussa | @DevoxxPl | @thekonginc

Slide 5

Slide 5

TRUST IS EXPLOITABLE We must eliminate trust to achieve security @gamussa | @DevoxxPl | @thekonginc

Slide 6

Slide 6

THE CLOUD CONNECTIVITY COMPANY @gamussa | @DevoxxPl | @thekonginc

Slide 7

Slide 7

TRUST @gamussa | @DevoxxPl | @thekonginc

Slide 8

Slide 8

Viktor GAMOV Principal Developer Advocate @gamussa | @DevoxxPl | @thekonginc

Slide 9

Slide 9

THE PILLARS OF ZERO TRUST IDENTITY AUTOMATION DENIED BY DEFAULT OBSERVABILITY @gamussa | @DevoxxPl | @thekonginc

Slide 10

Slide 10

Slide 11

Slide 11

IDENTITY Introducing a form of identity, we can remove trust @gamussa | @DevoxxPl | @thekonginc

Slide 12

Slide 12

ZERO TRUST SECURITY We need a virtual «Multipass» for our Services. @gamussa | @DevoxxPl | @thekonginc

Slide 13

Slide 13

MARKETPLACE APP USER SERVICE ITEM SERVICE INVOICES SERVICE USER SERVICE USER SERVICE USER SERVICE @gamussa | @DevoxxPl | @thekonginc

Slide 14

Slide 14

MARKETPLACE APP @gamussa | @DevoxxPl | @thekonginc

Slide 15

Slide 15

MARKETPLACE APP USER SERVICE ITEM SERVICE INVOICES SERVICE NETWORK CALL USER SERVICE USER SERVICE @gamussa | @DevoxxPl | @thekonginc USER SERVICE

Slide 16

Slide 16

USER SERVICE INVOICES SERVICE ITEM SERVICE @gamussa | @DevoxxPl | @thekonginc

Slide 17

Slide 17

IDENTITY: USERS OPERATION: POST /invoices INVOICES SERVICE USER SERVICE @gamussa | @DevoxxPl | @thekonginc

Slide 18

Slide 18

THE CLOUD CONNECTIVITY COMPANY @gamussa | @DevoxxPl | @thekonginc

Slide 19

Slide 19

@gamussa | @DevoxxPl | @thekonginc

Slide 20

Slide 20

@gamussa | @DevoxxPl | @thekonginc

Slide 21

Slide 21

Multi-Mesh And Easy To Use & Scale Intelligently route traffic across any platform and any cloud to meet expectations and SLAs Universal (K8s + VMs), Attribute-Based Policies & More Restrict access and encrypt all traffic by default to only complete transactions when identity is verified @gamussa | @DevoxxPl | @thekonginc Built-in Multi Zone Connectivity Out of the box connectivity across multi-cluster, multi-cloud and multi-platform deployments across the world.

Slide 22

Slide 22

Database @gamussa | @DevoxxPl | @thekonginc

Slide 23

Slide 23

@gamussa | @DevoxxPl | @thekonginc

Slide 24

Slide 24

@gamussa | @DevoxxPl | @thekonginc

Slide 25

Slide 25

apiVersion: kuma.io/v1alpha1 kind: Mesh metadata: name: default spec: mtls: enabledBackend: ca-1 backends: - name: ca-1 type: builtin dpCert: rotation: expiration: 1d conf: caCert: RSAbits: 2048 expiration: 10y @gamussa | @DevoxxPl | @thekonginc

Slide 26

Slide 26

apiVersion: kuma.io/v1alpha1 kind: TrafficPermission mesh: default metadata: name: allow-all-traffic spec: sources: match: kuma.io/service: ‘’ destinations: match: kuma.io/service: ‘’ @gamussa | @DevoxxPl | @thekonginc

Slide 27

Slide 27

type: OPAPolicy mesh: default name: opa-1 selectors: - match: kuma.io/service: backend conf: policy: inlineString: | package envoy.authz import input.attributes.request.http as http_request default allow = false token = {“valid”: valid, “payload”: payload} { [_, encoded] = split(http_request.headers.authorization, ” “) [valid, _, payload] = io.jwt.decode_verify(encoded, {“secret”: “secret” }) } allow { is_token_valid action_allowed } : : @gamussa | @DevoxxPl | @thekonginc

Slide 28

Slide 28

Achieve Zero-Trust Security Achieve zero-trust by design Automatically provide mTLS encryption and identity across every single API, microservice and database @gamussa | @DevoxxPl | @thekonginc 17

Slide 29

Slide 29

Achieve Zero-Trust Security Inject compliance Fine-grained traf ic policies ensure appropriate connectivity and data privacy for every single API, microservice and database f @gamussa | @DevoxxPl | @thekonginc 17

Slide 30

Slide 30

Achieve Zero-Trust Security Streamline security responses Provide the Central IT team with control to rapidly deploy critical security patches across all networks @gamussa | @DevoxxPl | @thekonginc 17

Slide 31

Slide 31

THE PILLARS OF ZERO TRUST IDENTITY AUTOMATION DENIED BY DEFAULT OBSERVABILITY @gamussa | @DevoxxPl | @thekonginc

Slide 32

Slide 32

DEMO! @gamussa | @DevoxxPl | @thekonginc

Slide 33

Slide 33

Join Kong Nation! Links - https://konghq.com/kongbuilders/ - https://youtube.com/konginc - https://konghq.com/ community/ @gamussa | @DevoxxPl | @thekonginc