Reinhard Kugler
Security Challenges of Breaking A Monolith
#1about 7 minutes
Understanding the problems with a monolithic architecture
A monolithic video processing application faces challenges with scaling, high costs from idle power, and a lack of reliability.
#2about 2 minutes
Decomposing the monolith into a microservice architecture
The application is broken down into distinct services like an API, a message broker, a transcoding worker, and S3 storage.
#3about 2 minutes
Securing container images and the software supply chain
The initial step of containerization reveals that official base images often contain known vulnerabilities, highlighting supply chain risks.
#4about 4 minutes
Defining trust boundaries for authentication and authorization
Breaking down the application creates new trust boundaries between frontend and backend components, requiring robust authentication and authorization.
#5about 8 minutes
Using bucket policies and pre-signed URLs for S3 access
AWS S3 access is controlled using bucket policies for broad rules and pre-signed URLs for providing temporary, specific access to objects.
#6about 3 minutes
Preventing malicious uploads with input validation
An AWS Lambda function can be triggered on file uploads to S3 to perform validation and prevent attackers from hosting malicious content.
#7about 5 minutes
Analyzing the impact of a container vulnerability
A vulnerability in a transcoding library like FFmpeg can be exploited through a malicious file, leading to code execution and access to secrets within the container.
#8about 2 minutes
Comparing security trade-offs of monoliths vs microservices
While microservices increase the attack surface and complexity, they offer better isolation, making privilege escalation more difficult than in a monolith.
#9about 11 minutes
Q&A on microservice architecture and security
The speaker answers audience questions about using AI in security, starting new projects, and identifying threats in a microservice architecture.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
16:17 MIN
Building and securing the new microservices architecture
How to Destroy a Monolith?
02:05 MIN
Challenges of modernizing and scaling monolithic frontends
Web-Fragments: incremental micro-frontends migration approach for enterprise
03:25 MIN
The challenge of data security in microservice architectures
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
33:55 MIN
Audience Q&A on practical micro-frontend challenges
Micro-frontends anti-patterns
03:19 MIN
Break down monolithic problems into microservices
End the Monolith! Lessons learned adopting Serverless
38:31 MIN
Leveraging containerization for improved security posture
Kubernetes Security - Challenge and Opportunity
00:08 MIN
The flawed debate between monoliths and microservices
Microservices? Monoliths? An Annoying Discussion!
43:14 MIN
Navigating security risks when creating developer content
WeAreDevelopers LIVE - Should We Respect LLMs? Is Rust Taking Over? Developers as Content Creators and more
Featured Partners
Related Videos
Single Server, Global Reach: Running a Worldwide Marketplace on Bare Metal in a Cloud-Dominated World
Jens Happe
You can’t hack what you can’t see
Reto Kaeser
DevSecOps: Security in DevOps
Aarno Aukia
Full Spectrum File Uploads
Austin Gil
Microservices? Monoliths? An Annoying Discussion!
Eberhard Wolff
Architecting API Security
Philippe De Ryck
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
101 Typical Security Pitfalls
Alexander Pirker
Related Articles
View all articles.gif?w=240&auto=compress,format)



From learning to earning
Jobs that call for the skills explored in this talk.

