In: Computer Science
Describe the major Information Security risks that you see associated with the move to this Microservices strategy for Web Services. You should name and describe each risk that you estimate its likelihood and consequence and then describe a possible control for the risk and describe using tabular form
Based on the above Question
1. Lack of Encryption:- Network transmissions are
vulnerable to eavesdropping and Man-in-the-Middle (MitM) attacks
that circumvent mutual authentication by impersonating endpoints.
Mobility enterprise managers must encrypt communications and data
to prevent security incursions.
Fix:
2. Inadequate Security Risk Assessment
Fix:Failing to perform detailed risk profiles of an IT infrastructure and systems prevents network administrators from determining how and where an intrusion has occurred or when it happened. It makes future breaches virtually impossible to prevent.
3. Poor Compliance:-Hybrid clouds require more due diligence when it comes to compliance. Both the public cloud provider and your private cloud must stay within compliance parameters. Maintaining and demonstrating compliance is more difficult with the hybrid model because data moves back and forth.
Fix:
4. Weak Security Management:-Too many enterprise managers run amuck when they fail to employ authentication, identity management, and authorization procedures for both their private and public cloud. Cloud security protocols must be integrated.
Fix:
5. Poor Data Redundancy:-A lack of redundancy puts a hybrid IT cloud and your enterprise at risk. This is especially true if you don’t have redundant copies of data properly distributed across all data centers. Distributing data this way mitigates the damage that occurs when there is an outage in one data center.
Fix:
Implement redundancy. This can be accomplished three ways:
6. Unprotected APIs:-When unprotected, API endpoints expose sensitive data to malicious attacks that exploit an authentication/authorization token or key to manipulate personal information and data. This vulnerability is of particular concern in enterprise mobility management and BYOD transmissions over unsecure connections.
Fix:
8. Denial-of-Service (DoS) Attacks:- Attackers render a cloud or mobile enterprise inaccessible by issuing a DoS attack. Network service is disrupted in the virtual environment through an inherent weakness in shared resources such as CPU, RAM, and disk space or network bandwidth.
Fix:
Denial of Service attacks on cloud management APIs are often caused by sending bad SOAP or REST requests from the enterprise.