Cloud-native Architectures: Why application security should be microservices ready

Private cloud, public cloud, hybrid cloud, multi-cloud and now cloud-native. If you are feeling dizzy and confused with all the cloud jargon and how it impacts your application security, you have come to the right place.

Over the last decade, IT has transformed itself into an innovation powerhouse. The conversation has changed from “cost center” to “revenue driver,” with the development and operations teams adopting the DevOps philosophy.

When a digital business is evaluating application security solutions, it quickly becomes apparent that application architecture already in place can be a limiting factor. What if we say that security solutions should work with any cloud infrastructure including serverless frameworks, work natively with continuous integration/continuous deployment (CI/CD) pipelines, containers and Kubernetes orchestration, and enable operations teams to be efficient. Sounds too good to be true? It’s okay to be skeptical. Let us explain how this is all possible for a cloud-native application security solution to deploy with any application software stack, with an out-of-band architecture that is coupled with inline server-side enforcement.

PerimeterX Cloud-native Platform

The PerimeterX Platform is a set of cloud-native infrastructure and services that powers an award-winning suite of application protection solutions. The solutions powered by the Platform protect online businesses against automated attacks and client-side threats, and improve operational efficiency.

The key here is the out-of-band deployment without requiring inline traffic processing. The client-side signal collection at the browser or device level done by the PerimeterX Sensor is separated from the processing of the attack data that happens in the cloud-based Detector. This separation of the Sensor and Detector allows the application development for the website to continue without being tied to real-time, in-production updates of threat intelligence and machine learning algorithms to the Detector. The client-side signal collection also happens asynchronously, preserving the end user experience. The (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: