How to implement CI/CD in just six weeks
Close
Header Background Image
Header Background Image

Case study

Building a microservices security platform

Cloud native
Cloud
Public clouds
Security
Monitoring & alerting
Full stack development

Business background

Clients icon

Client type

A start-up offering a security monitoring solution based on a service mesh
Goals Icon

Business goal

Build a cloud-native microservices security platform to protect microservices effectively while giving the user a clear overview of all traffic

Our approach

  • Provide a team of software and DevOps engineers with experience in C++/Golang/Kubernetes, building cloud-native apps and security
  • Ensure smooth, close communication with the client, including weekly refinement meetings to define next steps and overall direction, daily sync meetings to discuss progress and solutions, communication on Slack channels
  • Maintain transparency and traceability via the Kanban board in Jira
  • Develop and provide unit and integration tests
  • Work with distributed teams: Gdańsk and Warsaw (Poland), Chennai (India), Palo Alto (USA)
Requirements

Business benefits

Requirements
  • Increased security: significant improvement of application security.
  • Quick reaction time: rapid detection of security threats and vulnerabilities.
  • Fewer errors: security policies are implemented automatically.
  • Better user experience: clear visualization of communication and dependencies between microservices.
  • Proactive approach: effective identification of PII leakage vulnerabilities.

Technical highlights

  • Mesh sidecars installed on client microservices to monitor all traffic.
  • Telemetry plugins collect all required information on the Client side.
  • Telemetry engine gets all required metadata, enhances it on the platform’s Controller side.
  • Analysis and views provided via dedicated web UI.
  • Security graph provides L4-L7+ visibility into workload interactions along with auto-discovery of API payloads.
  • A data flow map shows the flow of sensitive information in application environments.
  • Baselining and continuous drift detection sends alerts in real-time for any unsanctioned or anomalous application behavior.
  • Intelligent security analytics and preventive security controls at L7+.
Requirements

Technology stack

[object Object]
[object Object]
[object Object]
[object Object]
[object Object]
[object Object]
[object Object]
[object Object]
[object Object]

Need support with your specific case?