当前位置:网站首页>First exposure! The only Alibaba cloud native security panorama behind the highest level in the whole domain
First exposure! The only Alibaba cloud native security panorama behind the highest level in the whole domain
2022-06-23 12:53:00 【InfoQ】

- Lack of systematic cloud native security capability construction :Traditional enterprise application security model usually divides security boundaries based on different trust domains , East West Service interactions within the trust domain are considered secure . Container applications may need to be deployed in the cloud IDC And cloud drift , Static identifier in traditional border based security model ( such as IP Address ) It is no longer feasible in cloud native scenarios , Enterprise security protection needs to be closer to attribute based and meta cluster ( Such as labels and marks ) Identify changing dynamic loads , And take zero trust security measures .
- Lack of application side full life cycle security protection means: The container provides elasticity 、 Agility and dynamic extensibility , It also changes the deployment mode of the application . The application life cycle is greatly shortened , The life cycle of a container application is usually at the minute level . This requires more automated security controls in the enterprise application lifecycle and security design architecture , From the identity system 、 Asset management 、 Authentication 、 Application side full life cycle security protection such as threat analysis, detection and blocking .
- Lack of understanding of the cloud security responsibility sharing model: In the process of enterprise application cloud original biochemical architecture transformation , Enterprise application developers and security operation and maintenance personnel need to understand the responsibility boundary between the enterprise itself and the cloud service provider . From application design 、 Development 、 structure 、 distribution 、 Deploy to the various stages of the runtime , On the one hand, cloud service providers are required to provide security protection productization capabilities under the cloud native , On the other hand, enterprises need to enhance the security concept under the cloud 、 Continuous learning of tools and processes and real long-term practice into application .
Cloud native security maturity model

Cloud native security panorama

- Infrastructure security :Alibaba cloud is computing 、 Storage 、 The network and other cloud infrastructures have built a solid platform base security capability . In the direction of computing security , Cloud security center and container image service support automated detection of vulnerabilities , The alarm , Traceability and attack analysis , At the same time, it supports automatic intelligent repair of image vulnerabilities ; Support multiple at the same time OS, Baseline scanning and rich policy configuration of hybrid Cloud Architecture ; In the direction of network security , The cloud firewall service supports multiple boundary protection and adaptive intelligent policy recommendation based on traffic learning results ; In the direction of storage security , The container service backup center supports remote backup and rapid recovery of application data ,ACK One It provides the backup and disaster recovery capabilities of two places and three centers in a multi cloud and mixed cloud scenario , meanwhile ACK-TEE It also provides confidential computing technology based on the integration of software and hardware to help protect the remaining information in the memory dimension .
- Infrastructure security / Supply chain security :First, on the cloud native network side , Container services and cloud security center provide pod The East-West strategy control and intelligent blocking ability of the dimension , At the same time, it supports the visual display of cluster network topology ;ASM Grid services provide Service Mesh Full link traffic encryption under the framework 、 observation , Monitoring and seven layer access control capabilities ; In the direction of orchestration and component safety ,ACK Container services support multi-dimensional automated security patrol capabilities , Help identify potential risks of cluster application and provide reinforcement suggestions , At the same time, ensure that all system components are based on CIS And other compliance specifications . Cluster nodes can be realized by using the managed node pool CVE Automatic self-healing capability . On access control ,ACK Clustered RRSA The function supports the cluster application side pod Cloud resource permission isolation of dimension ; In the mirror safe direction ,ACR Container image service enterprise edition provides cloud native delivery chain function , In combination with image integrity verification and other production capabilities , Build an enterprise level supply chain DevSecOps Ability ; Safe direction at runtime , The cloud security center supports container dimension runtime Real time threat detection 、 Alarm and intelligent processing , Help enterprises resist container escape 、 Sensitive file operations 、 Abnormal connection and other in container attacks .
- Cloud native application security :Cloud native application security includes all aspects of enterprise application side protection . First, in the direction of general security , By using cloud firewall and Web Application firewall and other services can realize north-south and east-west attack protection and fine-grained access control of enterprise applications , Support API Loophole 、 Monitoring of injection attacks and sensitive data breaches 、 Analysis and automatic repair recommendations , At the same time, enterprise applications can access ARMS RASP service , Realization API Call chain monitoring and API Service asset management ; In the direction of microservice security ,MSE The microservice engine ensures the communication security of the microservice network through the cloud native gateway combined with the cloud firewall and other services , While providing rich microservice governance capabilities, it also provides security monitoring and application code layer RASP Protection capability . stay Serverless Safety direction , Functional computing services support storage 、 Fine grained access control and tenant isolation of functional resources such as network , It also supports function resources 、 Real time monitoring and complete audit of traffic .
- Cloud native security operation and maintenance: How to conduct security operation and maintenance of cloud native applications is a key issue that enterprises are concerned about . In the direction of safety management , Services such as container service and cloud security center support rich and detailed visual asset management capabilities , At the same time, the log service provides complete audit logs on the control side and the business side , And support intelligent analysis based on audit 、 Alarm and graphic display capability . In policy management , Container service support is based on OPA Cluster deployment time Policy Governance engine , At the same time, cloud effect services are developed for cloud nativity 、 The test process provides policy based operation process configuration and security detection functions . Identity management is the foundation of zero trust security , Alibaba cloud RAM and IDaaS Service support enterprise LDAP docking , In the service grid, it supports the customization of identity based inter service access policy rules and the real-time detection and alarm of identity credential leakage . In the direction of safe operation , The cloud security center supports the use of cloud honeypots to induce and capture attackers and customize attack Countermeasures , At the same time, it supports multi-dimensional visual detection, early warning and traceability analysis , In addition, Alibaba cloud threat intelligence platform supports IOC Search for 、 The verdict , It can obtain vulnerability intelligence through multiple channels and support the offline subscription of industry security event reports , Help the enterprise security operation and maintenance team improve the efficiency of operation and management .
- R & D and operation security :The Alibaba cloud security team conducts strict security audit and management of the platform's internal R & D and operation processes . In the direction of security requirements , The security team customizes the demand list for cloud products , Support application scenario specific customization requirements and automated test cases , At the same time, it supports multi-channel demand collection and systematic management ; In the direction of development security , First, implement the automatic inspection of component vulnerabilities in the product security 、 Integrity verification and identity traceability , Support systematic threat modeling and internal standardized security design specifications and technology stacks in security design ; In the direction of test safety , There is an end-to-end testing tool chain in the R & D operation process , Cooperate with daily manual penetration test , Find the vulnerability in time and automatically enter it into the system to notify the repair . Whole DevSecOps The process can realize risk identification and operation through policy configuration , No manual intervention required .
Alibaba cloud container product family - Efficient and safe 、 Intelligence is unbounded

边栏推荐
- 唐人街徒步:在异国情调的纽约感受浓厚的中式气息
- Halcon principle: one dimensional function_ 1D type [1]
- 对象池框架
- sql增加表记录的重复问题。
- Ros2 knowledge (6): principle and practice of coordinate object TF
- If there is a problem with minority browsers, do you need to do a compatibility test?
- Deep thinking: in-depth analysis of some scenes in Gaia Altman and the philosophy and perception reflected
- Excel-VBA 快速上手(一、宏、VBA、过程、类型与变量、函数)
- The project experience of resume and several problems that testers should pay attention to in writing
- User behavior modeling
猜你喜欢

New project, how to ensure the coverage of the test?

With 32 qubits! Rigetti computing enters the UK quantum computing market

Excel-VBA 快速上手(一、宏、VBA、过程、类型与变量、函数)

CRMEB知识付费如何二开阿里云短信功能

解决:Argument type ‘String‘ expected to be an instance of a class or class-constrained type

How to test the third-party payment interface?

唐人街徒步:在异国情调的纽约感受浓厚的中式气息

Ablebits Ultimate Suite for Excel

What should testers do if the requirements need to be changed when the project is half tested?

支持HomeKit、NFC:智汀智能门锁SL1仅需要149元
随机推荐
冷板式、浸没式、喷淋式液冷散热能否引领高性能计算发展?
Unity学习Day14--协程和WWW
Qt5 knowledge: QT drawing graph
kubernetes comfig subpath
What should I do if a serious bug occurs within the scope of my own test and I am about to go online?
判断测试结束的标准有哪些?
R语言将距离矩阵输入给hclust函数进行层次聚类分析,使用cutree函数进行层次聚类簇的划分、参数k指定聚类簇的个数、给每个样本都分配了簇标签
Analysis and solution of connection failure caused by MySQL using replicationconnection
TT-SLAM:用于平面环境的密集单目SLAM(IEEE 2021)
MySQL使用ReplicationConnection导致的连接失效分析与解决
If there is a problem with minority browsers, do you need to do a compatibility test?
2022 construction worker - decoration direction - post skills (construction worker) operation certificate examination question bank simulated examination platform operation
Photon网络框架
R语言glm函数使用频数数据构建二分类logistic回归模型,分析的输入数据为频数数据、将频数数据转化为正常样本数据(拆分、裂变为每个频数对应的样本个数)
Capacity limited facility location problem
【UVM入门 ===> Episode_7 】~ sequence、sequence item、sequencer、driver
Qunhui 10 Gigabit network configuration and test
跟循泰国国内游宣传曲MV,像本地人一样游曼谷
Explain the relationship between pyqt5 signal and slot in detail
R language is used to build ordered multi classification logistic regression model, ordinal or. The display function obtains the summary statistical information of the ordered logistic regression mode