TNS
VOXPOP
Will real-time data processing replace batch processing?
At Confluent's user conference, Kafka co-creator Jay Kreps argued that stream processing would eventually supplant traditional methods of batch processing altogether.
Absolutely: Businesses operate in real-time and are looking to move their IT systems to real-time capabilities.
0%
Eventually: Enterprises will adopt technology slowly, so batch processing will be around for several more years.
0%
No way: Stream processing is a niche, and there will always be cases where batch processing is the only option.
0%
Security

Twistlock Makes Istio’s Security Layer More Robust, Easier to Monitor

Jun 7th, 2018 10:17am by and
Featued image for: Twistlock Makes Istio’s Security Layer More Robust, Easier to Monitor

Liron Levin
Dr. Liron Levin is the Chief Software Architect at Twistlock. Prior to Twistlock, Levin worked on various research oriented projects as a technical lead at Microsoft. He holds a PhD in communication system engineering from Ben-Gurion university.

Istio has emerged as a popular and reliable service mesh management platform to make it easier to deploy, operate and scale microservices across cloud deployments. As a way to secure these service meshes, Twistlock has integrated with Istio to enrich the platform’s machine learning capabilities for connectivity. Twistlock does this by using Twistlock data to quarantine compromised services and to provide compliance policies to enforce secure configurations and the rest of the stack Istio runs on.

As cloud-native becomes the default way to build and run modern web-scale apps, organizations need increasingly sophisticated tools to abstract the underlying complexity away from normal operations. Kubernetes is the clear winner of the orchestration arms race and has abstracted the complexity of managing large fleets of compute nodes. However, as Kubernetes enables ever larger deployments, it can benefit from a companion technology that leverages its platform level primitives to make managing large portfolios of services simpler.

For example, Kubernetes makes it easy for you to deploy an app that scales across a 1,000 node cluster and deals with deployment and node failures. However, it can be complex to route traffic for that service, to monitor the overall health of the service (not just of individual nodes and pods) and to ensure fair resource allocation between this service and others within the cluster.

John Morello
Morello is the Chief Technology Officer at Twistlock, leading the company’s work with strategic customers and partners, and driving its product roadmap. Previously, he was the CISO of Albemarle, a Fortune 500 global chemical company. He spent 14 years at Microsoft, in both Microsoft Consulting Services and product teams. He ran feature teams that shipped security technologies in Windows, Azure, and Office 365 and served as the Lead Architect of the hybrid cloud consulting team for the Americas. He lives in Louisiana with his wife and two young sons. A passionate fisherman and scuba diver, he also serves as Chairman of the Coalition to Restore Coastal Louisiana.

Istio is a project designed to complement Kubernetes (and microservices platforms) and to provide these capabilities mentioned above. More specifically, Istio was designed to provide traffic management, service identity, management policy enforcement and telemetry for microservices.

Istio is built around the open source Envoy proxy hosted by the Cloud Native Computing Foundation (CNCF). Istio builds on existing Kubernetes capabilities to make deployment familiar and integrated while providing a variety of value-added services beyond Kubernetes’ more infrastructure specific focus.

Over the past few months, our customers have increasingly asked about Twistlock’s plans for Istio and today we’re happy to share those details. Istio is a complex platform with diverse configuration options and security settings, and it’s easy to get lost when trying to process all the details.

While it’s simple to get started running Istio, having visibility into traffic flows, enforcing security best practices, and (maybe most importantly) leveraging Istio’s capabilities to improve the security of your apps are the areas we focus on enhancing.

Example Scenario

To explore the new security features Twistlock provides, we’ll use the common Bookinfo example app.  As described in the guide, this app is composed of multiple interconnected microservices:

  • The product page microservice calls the details and reviews microservices to populate the page;
  • The details microservice contains book information;
  • The reviews microservice contains book reviews. It also calls the ratings microservice;
  • The ratings microservice contains book ranking information that accompanies a book review.

The topology of the app is depicted below:

Visualizing and Controlling Istio on Radar

One of the first challenges we recognized with customers using Istio was in being able to visualize the topology of services. While Twistlock has long offered the Radar view to provide a real-time Visio of your entire containerized environment, Istio allows us to further augment this data with more application-specific knowledge and depth.

One of the main security benefits of Istio is tight control over network policies — that is, strict control over the communication protocols and connections between entities. To provide this, it’s recommended to enable service-level access control in Istio. When using this feature with Twistlock, you gain full visibility and control over network topology directly in Radar’s visual canvas.

For example, in the Bookinfo example, the “productpage” service receives a “product-viewer” role that is bound to the “productpage-viewer” and “details-reviews-viewer” service roles.

The first role indicates all users can access the product page, while the second role is explicitly set for the product page and enables only it to access the details and reviews services.

Twistlock automatically registers the entire configuration so it is dynamically updated and annotated to the Radar canvas for each service:

Further, when clicking on the service roles, you can drill down to see the details for each:

Using Twistlock, we can edit and manage all the security settings that are associated with a given entity, and see those changes reflected in Istio’s managed service mesh topology.

Leveraging Istio for Runtime Quarantine

We also integrate our runtime defense sensors with Istio, adding deep security intelligence over the overlying topology by analyzing the allowed connection and infrastructure metadata across entities. Using this data, we report and quarantine entities based on the network metadata and observed behavioral anomalies.

For example, in the Bookinfo app, what happens if an attacker successfully achieves remote code execution on the “productpage” service and from there tries to access the “ratings” service? Technically, if all mesh rules were configured correctly, Istio network policies could prevent the connections, but you still need detection and alerting of the compromise, which comes through CNNF’s (our layer 3 Cloud Native Network Firewall) integration with Istio:

Of course, these network violations are also reported and shown in Radar:

This flow enables Twistlock to apply our ML-driven behavioral modeling to automatically detect anomalies, but to then offload a response to Istio for isolating the compromised service.

For example, Twistlock can quarantine a public facing web service when an anomaly is detected by instructing Istio to disconnect that service from the backend payments database. Because this integration occurs at the service mesh layer, Istio can instantly and elegantly enforce it across the environment, without requiring changes to IP routing or manual port reconfiguration.

Istio Compliance

Finally, our Twistlock Labs research team has developed a set of new compliance checks for Istio. These compliance checks are aligned to existing best practices from the Istio project and community, such as ensuring mutual TLS is enabled in the production namespace and that strict role-based access control is enabled. These compliance policies fit into Twistlock’s existing compliance capabilities, including the ability to alert and block based on non-compliance and to see status globally in real time in the Compliance Explorer dashboard.

Summary

As customers deploy and run more complex cloud-native apps, platforms such as Istio complement existing capabilities in Docker and Kubernetes to provide every customer with planetary scale tools. Twistlock helps to expand that reach by adding a security layer for Istio as well as leveraging it to scale security across your entire service mesh.

Twistlock is a sponsor of The New Stack.

Feature image via Pixabay.

Group Created with Sketch.
TNS owner Insight Partners is an investor in: Pragma, The New Stack, Docker.
THE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.