Reinhard Kugler

Security Challenges of Breaking A Monolith

How can a single vulnerability in one container compromise your entire system? Discover the hidden security risks of breaking up a monolith.

Security Challenges of Breaking A Monolith
#1about 7 minutes

Understanding the problems with a monolithic architecture

A monolithic video processing application faces challenges with scaling, high costs from idle power, and a lack of reliability.

#2about 2 minutes

Decomposing the monolith into a microservice architecture

The application is broken down into distinct services like an API, a message broker, a transcoding worker, and S3 storage.

#3about 2 minutes

Securing container images and the software supply chain

The initial step of containerization reveals that official base images often contain known vulnerabilities, highlighting supply chain risks.

#4about 4 minutes

Defining trust boundaries for authentication and authorization

Breaking down the application creates new trust boundaries between frontend and backend components, requiring robust authentication and authorization.

#5about 8 minutes

Using bucket policies and pre-signed URLs for S3 access

AWS S3 access is controlled using bucket policies for broad rules and pre-signed URLs for providing temporary, specific access to objects.

#6about 3 minutes

Preventing malicious uploads with input validation

An AWS Lambda function can be triggered on file uploads to S3 to perform validation and prevent attackers from hosting malicious content.

#7about 5 minutes

Analyzing the impact of a container vulnerability

A vulnerability in a transcoding library like FFmpeg can be exploited through a malicious file, leading to code execution and access to secrets within the container.

#8about 2 minutes

Comparing security trade-offs of monoliths vs microservices

While microservices increase the attack surface and complexity, they offer better isolation, making privilege escalation more difficult than in a monolith.

#9about 11 minutes

Q&A on microservice architecture and security

The speaker answers audience questions about using AI in security, starting new projects, and identifying threats in a microservice architecture.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
BB
Benedikt Bischof
Why You Shouldn’t Build a Microservice Architecture
Welcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Michael Eisenbart who talks about the pros and cons of microservice architecture.‍About the speaker:‍Michael has been working for Bosch as a sof...
Why You Shouldn’t Build a Microservice Architecture
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
CH
Chris Heilmann
Dev Digest 134 - Where pixels sing?
News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 134 - Where pixels sing?
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev

From learning to earning

Jobs that call for the skills explored in this talk.

Rust and GoLang

Rust and GoLang

NHe4a GmbH
Karlsruhe, Germany

Remote
55-65K
Intermediate
Senior
Go
Rust