{"id":3221,"date":"2018-03-25T15:51:15","date_gmt":"2018-03-25T13:51:15","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=3221"},"modified":"2023-06-09T14:13:04","modified_gmt":"2023-06-09T12:13:04","slug":"security-in-a-saas-startup-and-todays-security-issues-with-devops","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/","title":{"rendered":"Security in a SaaS startup and today&#8217;s security issues with DevOps"},"content":{"rendered":"<h1>Motivation<\/h1>\n<p>Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and policies and does not even end with a proper patch management or in case of software development secure coding.&nbsp;As we see using a safe password ([10] explains safe passwords) and the hope of not being caught by the next ransom attack is not enough. Security is a combination of organizational, technical and physical measurements.<br \/>\n<!--more--><br \/>\nAnother view on security is the technical one, looking at algorithms like RSA, secure hash functions, protocols like tsl\/ssl and the PKI etc. We have good tools, but if we look at our technology stack it is still impossible to create a 100% secure system nowadays. There are security breaches in each layer, starting down at the hardware, e.g. a Qualcomm Chip [11], going up to the operating system (e.g. PtH [12]) up to the application using a lot of third party code. A secure system must not use any unsecure third party or legacy code and must not rely on any unsecure other systems &#8211; so we would have to start from scratch.<\/p>\n<p>We cannot assure a 100% secure system or even a 100% secure company, but we can keep the risk down at an acceptable minimum. This is where economics plays in &#8211; taking security measurements costs money and we must decide how much money (or time &#8211; but time is money again) we spend on security.<\/p>\n<p><em>&nbsp;<\/em><em>\u201cBasically, you&#8217;re either dealing with Mossad or not-Mossad [the Israeli CIA].&nbsp;<\/em><em>If your [opponent] is not-Mossad, then you&#8217;ll probably be fine if you pick a good password and don&#8217;t respond to emails from <\/em><a href=\"mailto:ChEaPestPAiNPi11s@virus-basket.biz.ru\"><em>ChEaPestPAiNPi11s@virus-basket.biz.ru<\/em><\/a><em>. If your [opponent] is the Mossad, YOU&#8217;RE GONNA DIE AND THERE&#8217;S NOTHING THAT YOU CAN DO ABOUT IT.\u201d<\/em><\/p>\n<p style=\"text-align: right;\">James Mickens [4]<\/p>\n<p>A good overview of what can be done today gives Google&#8217;s whitepaper on their security management [13] &#8211; they do a lot, starting with dedicated hardware encryption and signing.&nbsp;The security in a company is also addressed by the ISO 2700X standard, consisting of a lot of requirements and over a hundred measurements to be taken. But where to start?<\/p>\n<p>In this article, we look at security from a startups point of view: what do we need to do in an early stage, developing in our garage, without too much effort. We will take a special look at the DevOps toolchain, as its automation leads to new security issues.<\/p>\n<p>DevOps? DevOps is the merge of development and operations with the goal to test, build and release software fast, frequently and reliable. This leads to an automated toolchain, in which a single change in code by a programmer can result in a new production release (Continuous Integration, Continuous Delivery). A programmer now has impact on a productive system and needs to think about configuring and running the software securely.<\/p>\n<h1>Scenario: Working in the living room<\/h1>\n<p>To take a closer look at the security in a small company our scenario will be a SaaS startup, just founded, without any customers yet. Figure 1 gives an overview \u2013 making no claim to be exhaustive \u2013 of the minimal infrastructure we will need.<\/p>\n<figure id=\"attachment_3222\" aria-describedby=\"caption-attachment-3222\" style=\"width: 1262px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3222\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/figure-1-infrastruktur\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur.png\" data-orig-size=\"1262,496\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure 1 Infrastruktur\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Example of an early stage infrastructure \u2013 maybe more tools and systems than one would think&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur-1024x402.png\" class=\"wp-image-3222 size-full\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur.png\" alt=\"\" width=\"1262\" height=\"496\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur.png 1262w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur-300x118.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur-768x302.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-1-infrastruktur-1024x402.png 1024w\" sizes=\"auto, (max-width: 1262px) 100vw, 1262px\" \/><\/a><figcaption id=\"caption-attachment-3222\" class=\"wp-caption-text\">Example of an early stage infrastructure \u2013 maybe more tools and systems than one would think<\/figcaption><\/figure>\n<p>As we can see we need a whole bunch of software to communicate, document and organize our work and code. Looking at this infrastructure from a network view we can see a lot of interaction between the different systems. We must handle a lot of accounts, secure communication and especially take care of the infrastructure running in our own cloud (back office, continuous integration, continuous delivery, our own API service), see figure 2.<\/p>\n<figure id=\"attachment_3223\" aria-describedby=\"caption-attachment-3223\" style=\"width: 961px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3223\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/figure-2-infrastruktur_network\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network.png\" data-orig-size=\"961,371\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure 2 Infrastruktur Network\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Example on an early stage infrastructure network view \u2013 there are more systems we interact with than one would probably think.  | CI \u2013 Continuous Integration, VPC \u2013 Virtual Private Cloud, PW \u2013 Password&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network.png\" class=\"wp-image-3223 size-full\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network.png\" alt=\"\" width=\"961\" height=\"371\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network.png 961w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network-300x116.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-2-infrastruktur_network-768x296.png 768w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/a><figcaption id=\"caption-attachment-3223\" class=\"wp-caption-text\">Example on an early stage infrastructure network view \u2013 there are more systems we interact with than one would probably think. | CI \u2013 Continuous Integration, VPC \u2013 Virtual Private Cloud, PW \u2013 Password<\/figcaption><\/figure>\n<h1>Keep track of your tools and systems<\/h1>\n<p>To manage all your tools and systems I suggest to introduce something like a company board or system overview at a central place, reachable by every employee. It could be a word document, but better a wiki page, a one-pager-website only available to employees. It should contain a list of all systems and tools with a description what there are for and when to be used. This information is something like a small policy one would write in a larger company, e.g. \u2018place documentation in this wiki\u2019 and \u2018place invoices in that cloud\u2019. Some security experts might argue that an attacker could get to much information out of such a system overview, but I think that at this stage it\u2019s more important to keep track of all systems.<\/p>\n<h1>Enforcing basic security<\/h1>\n<p>There are many easy and effective measurements to start with. Some will even sound too easy \/ boring \/ common sense to bother with, but they are still highly effective.<\/p>\n<p>We will not cover all of them in detail, but there are worth to be mentioned:<\/p>\n<ul>\n<li>Don\u2019t visit unsecure websites (porn, torrents) \u00e0 Use a private machine<\/li>\n<li>No sensitive data via Email (it\u2019s not encrypted in most cases!)<br \/>\n-&gt; use a shared filesystem and link it or a password manager or an encrypted zip<\/li>\n<li>No email attachments (still one of the most popular phishing attacks)<br \/>\n-&gt; same as above<\/li>\n<li>Encrypt your hard drives (one click in most OS \u2013 just think of what would happen if you lost your device, you would not be able to sleep anymore)<\/li>\n<li>Screen lock you PC and smartphone<\/li>\n<li>Use secure (and different) passwords (you can\u2019t remember them? See next bullet)<\/li>\n<li>Use a password manager with share function<br \/>\n-&gt; There will always be some company accounts to share, even if every employee should have his own account<\/li>\n<li>Use multiple users when setting up a system\/server and even better: use roles and groups<\/li>\n<\/ul>\n<p>This were some basics, no we will look at some eye-opening, maybe even entertaining examples.<\/p>\n<h1>Human failure<\/h1>\n<p>A technically secure system is not secure out of the box. Most of the times we need to configure the security and remember or store tokens and passwords. This is, where the human factor plays in \u2013 which can lead to fatal security breaches.<\/p>\n<h2>Push to public<\/h2>\n<p>Looking at public available code, configuration files (.dot files) are of major interest. Those files potentially contain secret server keys and logins, database users and passwords etc. to automate the build and delivery process. Thanks to search functions you can easily look for those secrets, e.g.&nbsp;<a href=\"https:\/\/github.com\/search?p=98&amp;q=aws_secret_access_key&amp;type=Code&amp;utf8=%E2%9C%93\">https:\/\/github.com\/search?p=98&amp;q=aws_secret_access_key&amp;type=Code&amp;utf8=%E2%9C%93<\/a><\/p>\n<figure id=\"attachment_3224\" aria-describedby=\"caption-attachment-3224\" style=\"width: 1018px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3224\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/figure-3-push-to-public\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png\" data-orig-size=\"1018,762\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure 3 push to public\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Example of a secret key published on github. In this case the AWS config was probably pushed by mistake together with some other file. Fun fact: The author added a gitignore entry not to push some other secret vars.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png\" class=\"wp-image-3224 size-full\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png\" alt=\"\" width=\"1018\" height=\"762\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png 1018w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public-300x225.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public-768x575.png 768w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/a><figcaption id=\"caption-attachment-3224\" class=\"wp-caption-text\">Example of a secret key published on github. In this case the AWS config was probably pushed by mistake together with some other file. Fun fact: The author added a gitignore entry not to push some other secret vars.<\/figcaption><\/figure>\n<p>A story of a person publishing his AWS secret key to github and getting a bill over $50 0000 from amazon can be found here [8].&nbsp;AWS keys are only one example of sensitive data \u2013 any secret tokes, e.g. for Slack or a Google API, logins to databases, credentials to access a server to deploy a new version of the software \u2013 all this information must not be pushed to a public repository.<\/p>\n<p>The easiest way to avoid this kind of security breaches is to use a nonpublic organizational repository. In addition, there are tools to scan repositories for confidential data, e.g. TruffleHog [6] or GitRob [7]. GitMonitor [5] offers even an online service which will scan your repository and notify you on security breaches.<\/p>\n<p>This is a typical DevOps security issue, as the programmer oversees operating the software as well.<\/p>\n<h2>Default configuration<\/h2>\n<p>A ransack attack of 27 000 MongoDB databases hit the new lately (January 2017 [3]). What happened? All those MongoDB Instances were on the internet with their default configuration. There is only few software with actually secure defaults \u2013 but why don\u2019t we ship software with secure defaults? It\u2019s just not handy setting up secure user and password combination for every database during development. One could think of a tool, managing new installations with a wizard creating, storing and reentering safe passwords all the time. This would help developers to keep their workflow despite secure defaults. But this would have to be a god-like tool, knowing all software and how to configure it. One could even think of a standard, supplying an interface to securely setup new software. Again, a DevOps sourced issue, as programmers probably didn\u2019t think much about setting up a secure operation environment.<\/p>\n<h2>Backup<\/h2>\n<p>Maybe you have heard of CodeSpaces, maybe not, but one you should know about them: they didn\u2019t do they homework. <em>The SaaS provider is out of business after an AWS security breach, underscoring the need for proper cloud storage backup<\/em> [9]. In short: CodeSpaces\u2019 AWS (root) account got hacked and blackmailed by the attacker. They changed all passwords but the attacker was watching them. In the end, the attacker wiped out all data \u2013 including all backups, as they were on AWS too. In the first place, a proper 2-factor-authorization and IAM would have helped to protect the account. Second, placing backups in the same cloud and even in the same account is just ridiculous.<\/p>\n<p>There is a practical backup strategy: 3-2-1. 3 backups on 2 technologies (cd, cloud, tape, NAS), 1 off site (geographically as well as technically).<\/p>\n<h1>Summing Up<\/h1>\n<p>Don\u2019t underestimate security! You should be a little bit paranoid but you still want to get you job done. There are a handful of small measurements you can take without too much effort to introduce a basic security. You cannot afford to arm for an attack by a \u2018Mossad\u2019, but keep script-kiddies out, prevent known attacks and prepare for unknown attacks.<\/p>\n<p>Don\u2019t bother doing anything that\u2019s not your key-business. We didn\u2019t touch it but patch and vulnerability management is of high importance and for every software or server you run you must do it. This is a very good argument to use cloud services where some else must worry about this.<\/p>\n<hr>\n<p>cp054@hdm-stuttgart.de<\/p>\n<h1>Sources<\/h1>\n<p>[1] https:\/\/github.com\/forter\/security-101-for-saas-startups, viewed on 24.05.2017<br \/>\n[2] RSA Conference 2017, DevOOPS: Attacks And Defenses For DevOps Toolchains https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hta-w02-devoops-attacks-and-defenses-for-devops-toolchains.pdf, viewed on 24.05.2017<br \/>\n[3] http:\/\/www.zdnet.com\/article\/mongodb-ransacked-now-27000-databases-hit-in-mass-ransom-attacks\/, viewed on 22.04.2017<br \/>\n[4] James Mickens, ;login:logout, USENIX January 2014, https:\/\/www.usenix.org\/system\/files\/1401_08-12_mickens.pdf<br \/>\n[5] https:\/\/gitmonitor.com\/<br \/>\n[6] https:\/\/github.com\/dxa4481\/truffleHog<br \/>\n[7] https:\/\/github.com\/michenriksen\/gitrob<br \/>\n[8] https:\/\/www.quora.com\/My-AWS-account-was-hacked-and-I-have-a-50-000-bill-how-can-I-reduce-the-amount-I-need-to-pay<br \/>\n[9] http:\/\/www.networkcomputing.com\/cloud-infrastructure\/code-spaces-lesson-cloud-backup\/314805651<br \/>\n[10] https:\/\/nakedsecurity.sophos.com\/2014\/10\/01\/how-to-pick-a-proper-password<br \/>\n[11] https:\/\/www.heise.de\/security\/meldung\/QuadRooter-Verwundbare-LTE-Chips-sollen-ueber-900-Millionen-Android-Geraete-gefaehrden-3289647.html<br \/>\n[12] https:\/\/bogs.technet.microsoft.com\/austria\/2015\/09\/16\/pass-the-hash-angriffe-pth-kurz-zusammengefasst<br \/>\n[13] https:\/\/.cloud.google.com\/security\/whitepaper<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Motivation Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and policies and does not even [&hellip;]<\/p>\n","protected":false},"author":580,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[659,650,26,651],"tags":[27,142],"ppma_author":[742],"class_list":["post-3221","post","type-post","status-publish","format-standard","hentry","category-devops","category-scalable-systems","category-secure-systems","category-system-designs","tag-security","tag-start-up"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":26378,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/25\/secure-code-fast-delivery-the-power-of-devsecops\/","url_meta":{"origin":3221,"position":0},"title":"Secure Code, Fast Delivery: The Power of DevSecOps","author":"Furkan Erdogan","date":"25. July 2024","format":false,"excerpt":"In today\u2019s fast-paced digital world, security breaches are more than just a risk; they\u2019re almost a guarantee if you don\u2019t stay ahead. Imagine being able to develop software at lightning speed without compromising on security. Sounds like a dream, right? Welcome to the world of DevSecOps! If you\u2019re curious about\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4005,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/20\/cloud-security-tools-and-recommendations-for-devops-in-2018\/","url_meta":{"origin":3221,"position":1},"title":"Cloud security tools and recommendations for DevOps in 2018","author":"Immanuel Haag","date":"20. August 2018","format":false,"excerpt":"Introduction Over the last five years, the use of cloud computing services has increased rapidly, in German companies. According to a statistic from Bitkom Research in \u00a02018, the acceptance of cloud-computing services is growing. Cloud-computing brings many advantages for a business. For example, expenses for the internal infrastructure and its\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":23067,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2022\/03\/15\/security-strategies-and-best-practices-for-microservices-architecture\/","url_meta":{"origin":3221,"position":2},"title":"Security Strategies and Best Practices for Microservices Architecture","author":"Larissa Schmauss","date":"15. March 2022","format":false,"excerpt":"Microservices architectures seem to be the new trend in the approach to application development. However, one should always keep in mind that microservices architectures are always closely associated with a specific environment:\u00a0Companies want to develop faster and faster, but resources are also becoming more limited, so they now want to\u2026","rel":"","context":"In &quot;Scalable Systems&quot;","block_context":{"text":"Scalable Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/"},"img":{"alt_text":"","src":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a","width":350,"height":200,"srcset":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1x, https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1.5x"},"classes":[]},{"id":3978,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/16\/security-in-smart-cities\/","url_meta":{"origin":3221,"position":3},"title":"Security in Smart Cities","author":"Johannes Kaeppler","date":"16. August 2018","format":false,"excerpt":"Today cities are growing bigger and faster than ever before. This results in various negative aspects for the citizens such as increased traffic, pollution, crime and cost of living, just to name a few. Governments and city administrations and authorities are in need to find solutions in order to alleviate\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3232,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/06\/usable-security-users-are-not-your-enemy\/","url_meta":{"origin":3221,"position":4},"title":"Usable Security &#8211; Users are not your enemy","author":"mw195","date":"6. October 2017","format":false,"excerpt":"Introduction Often overlooked, usability turned out to be one of the most important aspects of security. Usable systems enable users to accomplish their goals with increased productivity, less errors and security incidents. And It stills seems to be the exception rather than the rule. When it comes to software, many\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/windows-uac.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3084,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/05\/cloud-security-part-2-the-vulnerabilities-and-threats-of-the-cloud-current-scientific-work-on-cloud-security-conclusion-and-outlook\/","url_meta":{"origin":3221,"position":5},"title":"Cloud Security \u2013 Part 2: The vulnerabilities and threats of the cloud, current scientific work on cloud security, conclusion and outlook","author":"Andreas Fliehr","date":"5. September 2017","format":false,"excerpt":"The second of two blog posts about cloud security. This post covers the vulnerabilities and threats of the cloud, the current scientific work on cloud security and a conclusion and an outlook.","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":742,"user_id":580,"is_guest":0,"slug":"cp054","display_name":"cp054","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/c8295f08a6e6de8d2431589b3c9e937e1a0c979b220df372a3d38d33bc918e72?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/580"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=3221"}],"version-history":[{"count":7,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3221\/revisions"}],"predecessor-version":[{"id":24745,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3221\/revisions\/24745"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=3221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=3221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=3221"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}