Click here to close now.




















Welcome!

Microservices Expo Authors: Elizabeth White, Joe Pruitt, Lori MacVittie, Jason Bloomberg, AppDynamics Blog

Related Topics: Microservices Expo

Microservices Expo: Article

SOA Web Services Journal - Collect(ing) Calls

I'm sitting in the airport, waiting for my end-of-week flight, and listening to the latest security controversy

I'm sitting in the airport, waiting for my end-of-week flight, and listening to the latest security controversy. Apparently the government has compiled a database of phone records as part of their fight against terrorism - the theory being that by analyzing the call patterns and using some social engineering, they might be able to identify terrorist activity.

I have no idea if this is legal or not, but certainly it's something I never expected while I was using my phone. I suspect that many people besides me expected their communications to be confidential. Apparently the phone companies felt that was not the case.

A few months ago, a bank that I do business with lost a tape with all sorts of personal information pertaining to its customers. They later recovered the tape, but not before they'd had to send out a note to all of us letting us know our identities were in jeopardy.

Sadly, these are just some of the problems that present themselves in the wired world. They're not even examples of malicious behavior (I give the government the benefit of the doubt); they're just things that happen in the course of doing business, or running the country.

While these incidents don't pertain directly to Web services security, or to securing an SOA, they certainly illustrate the complexity of the problem and the seriousness of the issues.

Security is a fundamental IT issue, one that has been growing in complexity and difficulty since the invention of the network card. We all have information that is important to us, and keeping that information private is something we expect from the organizations that we share our information with.

SOA and Web services provide ease of communication and mechanisms for widespread distribution of application functionality, often outside the boundaries of the enterprise. Many business-to-consumer sites, for example, provide Web services interfaces to do things like bid on an auction or purchase an item. During the transaction, sensitive information is transmitted.

It's our expectation that this information will be protected, both when the transaction occurs and in the future. This requires security in many areas. During the transaction, establishing a secured connection and protecting the information transfer from snooping eyes is critical. Once the information is inside a company that employs an SOA infrastructure to support its applications, it's critical that all avenues to that information be safeguarded as well. This includes protecting databases from attacks, as well as ensuring that access to all of our sensitive information is both controlled and monitored, so that the classic disgruntled employee or corporate spy cannot simply siphon off all of our information to sell to criminals. This is not an easy task, and the various legislative programs such as HIPPA, which requires privacy for health records, can make the task even more challenging.

There's a balance too, between privacy and efficiency. Yes, I'd like my doctors to be able to see my records in an emergency, but at the same time, I'm not sure I want my insurance company to be able to do the same thing. Without question, creating an intelligent approach to information security is a complex task. Data never really disappears once you provide it to another source - and we have to all realize that providing information may have consequences that we never imagined. We have a responsibility as well to be diligent and to not allow social engineering and Internet scams to take us in. Responsibility starts with us, and extends to the people we trust with our information.

Our focus in this issue is on SOA and Web services security. This is always an important topic and, certainly in light of recent events, one of interest to all of us who work in information technology.

More Stories By Sean Rhody

Sean Rhody is the founding-editor (1999) and editor-in-chief of SOA World Magazine. He is a respected industry expert on SOA and Web Services and a consultant with a leading consulting services company. Most recently, Sean served as the tech chair of SOA World Conference & Expo 2007 East.

Comments (2) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
SOA Web Services Journal News 06/09/06 01:38:11 PM EDT

I'm sitting in the airport, waiting for my end-of-week flight, and listening to the latest security controversy. Apparently the government has compiled a database of phone records as part of their fight against terrorism - the theory being that by analyzing the call patterns and using some social engineering, they might be able to identify terrorist activity.

SOA Web Services Journal News 06/09/06 01:08:29 PM EDT

I'm sitting in the airport, waiting for my end-of-week flight, and listening to the latest security controversy. Apparently the government has compiled a database of phone records as part of their fight against terrorism - the theory being that by analyzing the call patterns and using some social engineering, they might be able to identify terrorist activity.

@MicroservicesExpo Stories
"ProfitBricks was founded in 2010 and we are the painless cloud - and we are also the Infrastructure as a Service 2.0 company," noted Achim Weiss, Chief Executive Officer and Co-Founder of ProfitBricks, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the distributability (I can make up words if I want) of requests across a pool of instances. The latter occurs because sessions don’t need to hang out and consume resources that could ...
Node.js is an open source runtime environment for server-side and network based applications. Node.js contains all the components needed to build a functioning website. But, you need to think of Node.js as a big tool box. As with any other art form, going to the tool box over and over to perform the same task is not productive. The concept of tool reuse is used in all forms of artistry and development is no exception.
What we really mean to ask is whether microservices architecture is SOA done right. But then, of course, we’d have to figure out what microservices architecture was. And if you think defining SOA is difficult, pinning down microservices architecture is unquestionably frying pan into fire time. Given my years at ZapThink, fighting to help architects understand what Service-Oriented Architecture really was and how to get it right, it’s no surprise that many people ask me this question.
The Internet of Things. Cloud. Big Data. Real-Time Analytics. To those who do not quite understand what these phrases mean (and let’s be honest, that’s likely to be a large portion of the world), words like “IoT” and “Big Data” are just buzzwords. The truth is, the Internet of Things encompasses much more than jargon and predictions of connected devices. According to Parker Trewin, Senior Director of Content and Communications of Aria Systems, “IoT is big news because it ups the ante: Reach out ...
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Sysdig has announced two significant milestones in its mission to bring infrastructure and application monitoring to the world of containers and microservices: a $10.7 million Series A funding led by Accel and Bain Capital Ventures (BCV); and the general availability of Sysdig Cloud, the first monitoring, alerting, and troubleshooting platform specializing in container visibility, which is already used by more than 30 enterprise customers. The funding will be used to drive adoption of Sysdig Clo...
Auto-scaling environments, micro-service architectures and globally-distributed teams are just three common examples of why organizations today need automation and interoperability more than ever. But is interoperability something we simply start doing, or does it require a reexamination of our processes? And can we really improve our processes without first making interoperability a requirement for how we choose our tools?
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
JavaScript is primarily a client-based dynamic scripting language most commonly used within web browsers as client-side scripts to interact with the user, browser, and communicate asynchronously to servers. If you have been part of any web-based development, odds are you have worked with JavaScript in one form or another. In this article, I'll focus on the aspects of JavaScript that are relevant within the Node.js environment.
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Microservices are hot. And for good reason. To compete in today’s fast-moving application economy, it makes sense to break large, monolithic applications down into discrete functional units. Such an approach makes it easier to update and add functionalities (text-messaging a customer, calculating sales tax for a specific geography, etc.) and get those updates / adds into production fast. In fact, some would argue that microservices are a prerequisite for true continuous delivery. But is it too...
In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL...