Reinhard Kugler
Security Challenges of Breaking A Monolith
#1about 7 minutes
Understanding the problems with a monolithic architecture
A monolithic video processing application faces challenges with scaling, high costs from idle power, and a lack of reliability.
#2about 2 minutes
Decomposing the monolith into a microservice architecture
The application is broken down into distinct services like an API, a message broker, a transcoding worker, and S3 storage.
#3about 2 minutes
Securing container images and the software supply chain
The initial step of containerization reveals that official base images often contain known vulnerabilities, highlighting supply chain risks.
#4about 4 minutes
Defining trust boundaries for authentication and authorization
Breaking down the application creates new trust boundaries between frontend and backend components, requiring robust authentication and authorization.
#5about 8 minutes
Using bucket policies and pre-signed URLs for S3 access
AWS S3 access is controlled using bucket policies for broad rules and pre-signed URLs for providing temporary, specific access to objects.
#6about 3 minutes
Preventing malicious uploads with input validation
An AWS Lambda function can be triggered on file uploads to S3 to perform validation and prevent attackers from hosting malicious content.
#7about 5 minutes
Analyzing the impact of a container vulnerability
A vulnerability in a transcoding library like FFmpeg can be exploited through a malicious file, leading to code execution and access to secrets within the container.
#8about 2 minutes
Comparing security trade-offs of monoliths vs microservices
While microservices increase the attack surface and complexity, they offer better isolation, making privilege escalation more difficult than in a monolith.
#9about 11 minutes
Q&A on microservice architecture and security
The speaker answers audience questions about using AI in security, starting new projects, and identifying threats in a microservice architecture.
Related jobs
Jobs that call for the skills explored in this talk.
Architekt für Cloud Security - AWS (w|m|d)

zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Featured Partners
Related Videos
You can’t hack what you can’t see
Reto Kaeser
DevSecOps: Security in DevOps
Aarno Aukia
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
Cyber Security: Small, and Large!
Martin Schmiedecker
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
Maturity assessment for technicians or how I learned to love OWASP SAMM
Mathias Tausig
Get started with securing your cloud-native Java microservices applications
Thomas Südbröcker
Walking into the era of Supply Chain Risks
Vandana Verma
From learning to earning
Jobs that call for the skills explored in this talk.


DevOps Engineer – Kubernetes & Cloud (m/w/d)
epostbox epb GmbH
Berlin, Germany
Intermediate
Senior
DevOps
Kubernetes
Cloud (AWS/Google/Azure)


(Senior) Cloud Security Architect - (m/f/x) (onsite / remote in Germany)
Scalable GmbH
München, Germany
Remote
Senior
Python
Gitlab
Jenkins
Terraform
+3
Software Development Engineer-Security Automation, AWS Security OpRes
Amazon
Canton de Courbevoie-1, France
Java
Linux
NoSQL
Python
TypeScript
+2




