DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Related

  • The Transformative Power of Artificial Intelligence in Cloud Security
  • Cloud Computing Security: Ensuring Data Protection in the Digital Age
  • Hybrid Cloud Backup: A Comprehensive Guide To Securing Your Data
  • Deliver Exceptional Digital Experiences and Unlock New Value With Okta Customer Identity

Trending

  • Event Driven Architecture (EDA) - Optimizer or Complicator
  • GitHub Copilot's New AI Coding Agent Saves Developers Time – And Requires Their Oversight
  • Rust, WASM, and Edge: Next-Level Performance
  • Chat With Your Knowledge Base: A Hands-On Java and LangChain4j Guide
  1. DZone
  2. Software Design and Architecture
  3. Cloud Architecture
  4. Developer Week CloudX 2023: Better Security and Accessibility in the Cloud

Developer Week CloudX 2023: Better Security and Accessibility in the Cloud

Discover DeveloperWeek CloudX: Uniting Global Cloud Experts! Explore insights from security, accessibility, and DevOps leaders from this year's event.

By 
Dwayne McDaniel user avatar
Dwayne McDaniel
·
Oct. 19, 23 · Opinion
Likes (1)
Comment
Save
Tweet
Share
3.4K Views

Join the DZone community and get the full member experience.

Join For Free

DevNetwork is a brand you might already recognize, as they put on the DeveloperWeek expo in the spring and API world in the fall. This year, they introduced a new event focused on cloud technology, including accessibility and security, DeveloperWeek CloudX. With a mission to bring together cloud developers, architects, IT and infrastructure professionals, and executives building the cloud ecosystem, the event took place in person from August 15-16, with a chance to participate online from August 22-23. If you missed it, the online portions will be available on demand in the near future.

This first edition of CloudX featured over 100 speakers across multiple stages. Professionals from around the world gathered to share their experiences and best practices about building in the cloud. Here are just a few highlights from the first-ever CloudX.

CloudX

CloudX Award Winners

This inaugural event also featured the CloudX Awards, a celebration of innovation and excellence, honoring the cloud industry's best companies, products, and services. Check out the winners and see if you are already working with them, or learn if you can take advantage of any of their offerings. Aside from just receiving an award, multiple winners also presented ways to solve cloud scaling issues in a safe and secure way.

We are excited to have been chosen for a 2023 CloudX Award in the category of Cloud Infrastructure for our On-Demand Private Cloud. We are even more excited that our own Todd Robinson and Peter Lee could attend the @DeveloperWeek CloudX Conference to accept it. #CloudX#OpenMetal

This was the case for Skyflow, who won a CloudX award for Cloud Innovation. Attendees were able to attend their Developer Advocate Adam Chan's session "Infra Infiltrated? Yes. PII Exfiltrated? No." where he covered some practical steps that developers can take to mitigate the risk of a data breach, including data minimization, encryption, access control, and secure coding practices. 

Cockroach Labs, who won in the category of Cloud Data Platforms, Data Management, or Big Data with their 'cloud first' CockroachDB, also presented a session called "Infrastructure as Code with CockroachDB" by co-presenters Harsh Shah of Cockroach Labs and Jack Chi from Iterable. In this 50-minute session, they laid out how to properly build out IaC in terms of scale and security, with step-by-step code examples showcasing the versatility of both companies' offerings.

Infrastructure as Code with CockroachDB presented by Jack Chi from Iterable and Harsh Shah of Cockroach Labs

GitOps and Multicloud Complexity

"Multi-cloud is the best of and worst of tech," began Billy Thompson, Solutions Engineering Manager at Akamai, as he dove into his session "GitOps: A Strategy for Cloud Durability." He outlined the normal flow companies go through migrating from on-premise servers and networks to the cloud. At first, with perhaps a handful of applications all on a single cloud provider, things stay pretty straightforward. But eventually, almost inevitably, as more and more apps come online, you find yourself living with multiple cloud providers, all with their own requirements, IAM rules, and potential misconfigurations.

Fortunately, there are some standardized ways to approach multicloud: Infrastructure as Code and GitOps. Infrastructure as Code, IaC, lets you define your network, servers, and services in code. Popular options include Terraform from Hashicorp and the Cloud Native Computing Foundation project Crossplane. GitOps, as covered in our article from GitOpsCon, is a way to approach DevOps where your state is declarative, versioned, and immutable. Additionally, any changes to the source code are pulled automatically, and the system itself is continuously reconciled.

The larger your organization, the more likely you will have multi-cloud as an issue. No matter what tools or approach your team chooses, Billy stressed it is vital that teams discuss what multi-cloud really means in terms of configuration requirements and dependency drift.

GitOps: A Strategy for Cloud Durability.from Billy Thompson of Akamai Cloud/Linode at  #DevWeek #CloudX
GitOps: A Strategy for Cloud Durability.from Billy Thompson of Akamai Cloud/Linode at #DevWeek #CloudX

The Hidden Dangers of GraphQL

GraphQL is a newer, alternative API query format that has proven to be a faster and more versatile way to fetch and manipulate data than the traditional REST protocol. GraphQL enables "declarative data fetching," where a client can specify exactly what data it needs from an API. While it has become wildly popular in the Jamstack and decoupled CMS space, overall, it is still early for the technology, which only first emerged in 2015. In his session "The DevSecOps Guide to Control and Secure GraphQL APIs," Shahar Binyamin, CEO and co-founder of Inigo, pointed out some potential security pitfalls of this technology and best practices to stay safe.

One of the most significant issues teams adopting GraphQL face is the security ownership question. It is still a newer tech, and internal subject matter experts likely don't exist inside most organizations. It can be hard to know exactly who to turn to about developer, security, or operations issues. This is a common 'maturity pain' that all teams have faced as technology has evolved.

Shahar suggested thinking like an attacker is a great starting point for thinking about security.  He said hackers generally follow these three steps:

  1. Detect: Enumerate over endpoints and find JSON valid and error responses.
  2. Fingerprint: Based on errors, it is easy to tell what server technology is being used, even the version.
  3. Exploit:  Vulnerabilities in specific GraphQL implementations are well documented, and the knowledgebase is always growing.

Fortunately, Shahar also spelled out some basic steps to eliminate the most common threats.

Protect Your Queries

Limit the depth and breadth of allowed queries. It is very common for attackers to try to scrape as much data as possible in as little time as possible. Make sure this suspicious activity is accounted for. Allowing for unlimited complexity of requests can also lead to nested circular Denial of Service attacks if a query can be written to be self-referential.

Rate Limiting

While most teams will have WAF rules about the number of individual calls made to the API endpoint, it is less common to tune the WAF to look at the number of operations per call. It is possible to launch a complex brute-force attack from a single call. Disallowing calls that contain too many operations per call and keeping watch for multiple calls in a row that are just mutations of the previous call will help the attackers out.

Watch for Data Scraping

Just as you should limit what requests come into your API, you should also inspect what data is being returned. A repeated request for a person's name or email is going to be highly unusual behavior. Rate-limiting outbound objects can slow down attackers, giving you time to detect and disallow them.
Those are just a few ways to get started. He also talked about the need for better access controls and how that could be a double-edged sword, slowing down or halting development if done incorrectly but opening the API to the public if not undertaken at all. In addition to his list, you can refer to the OWASP GraphQL Cheat Sheet for more information about securing your GraphQL implementation.

The DevSecOps Guide to Control and Secure GraphQL APIs from Shahar Binyamin CEO and co-founder, Inigo #DevWeek #CloudX

Accessibility Means Developing for All

In his excellent keynote," Accessibility Testing in Mobile Apps: Including All Users," on day two of CloudX, Marcus Merrell, VP of Tech Strategy at Sauce Labs, laid out why accessibility matters. On average, 15% of people using your service or product need to use some form of assistive technology. From a business perspective, this means not addressing accessibility can affect the bottom line as users will look for better alternatives. From a compliance standpoint, it means you can be sued if your service ADA rules. Marcus hopes we will all be motivated by morals here and do the right thing for the user because we want everyone to feel included.

According to his research into WCAG standards, 90% of accessibility problems come down to 10 issues. If an organization just works to fix these issues, then it will be on a much better track for being more inclusive.

1. File format conversion issues. If it is jumbled upon transfer to a different format, a screen reader can never parse it. Be sure to test every time a file is converted from `.doc` to `.pdf` or from `.ppt` to `.kth`.

2. Alt text errors. Often, alt text is either too limited to provide any value or way too descriptive past the point of helpfulness. He said we need to accept that many images need to use an empty alt text if they are merely decorative. A picture of a sunflower inside an article about HTTPS tooling might look nice, but if a screen reader suddenly reads a paragraph about that sunflower to someone looking for a technical answer, that is not good.

3. Lack of visual indication of the current focus. Screen reading assistive technology parses any page into logical, semantic chunks (more on this later). If there is no indication of what the screen reader is focused on, it can make it that much harder to cohesively deliver the messaging you want to in the order you intended. He said hitting tab and highlighting parts of a page might seem disruptive, but for the visually impaired, this is magic.

4. Non-descriptive text for hyperlinks. If you are just highlighting "click here" or 'read more…' then you are not giving any context to what that link goes to. Anyone using a screen reader would really appreciate a description of where the link leads. For example, this link takes you to Oregon State University's Descriptive Link guidelines page.

5. Clickable/interactive areas that are too small. If you present a large text box that asks the user to click to agree but only make the radio button 5 pixels high, then you are making it very hard for anyone with dexterity issues to use your side. Instead of making users do "mouse target practice," make the entire text clickable.  

6. Improper use of heading elements. While you might think of headers (H1, H2, H3…) as a way to make a page layout look better, assistive technologies rely on them to parse the presented information. Headers should never be used just for style. Fortunately, there are multiple tools that make it easy to test for semantics.

7. Insufficient color contrast. You can easily measure the difference between colors, and some ratios are much more readable than others. This ratio can be easily tested by tools like the WebAIM Constrast Checker, which can help teams working on corporate-approved color palettes ensure they are inclusive to all viewers.

8. Embedding non-accessible elements. It is easy to assume that any third-party code or content we inject into our will be accessible. In reality, it might be bringing down your site's usability overall. Make sure you test after the embedding is complete and not just before.

9. Using the same decorative text for different resources. If you link to your documentation twice on the same page and both references only link to the term 'documentation,' then it will be a challenge for the user to know exactly what to click. While this might feel like a subset of number four, it is enough of an issue Marcus made it its own point.

10. Using overlay products. As he ran out of time, he referred us to this New York Times article about web accessibility overlays. The bottom line is they can open you up to lawsuits while also making your site or product harder to use.

Keynote, day 2 of #DevWeek #CloudX "Accessibility Testing in Mobile Apps: Including All Users " from Marcus Merrell VP of Tech Strategy, Sauce Labs
,

Walking a more secure path

In his session "Context Over Control: Security's New Path," James Wickett, CEO and co-founder DryRun Security, walked us through his self-described radical beliefs about security:

  • Security is a function of quality.
  • Security is a value, not just a cost.
  • Developers care about security.
  • We need contextual security analysis.

His approach to security focuses on Control, Composition, and Context. He said right up front that context was the most vital. Security as control means enforcing the preset rules and blocking suspicious activities. Security as composition means understanding each component in your environment and the threats they can expose you to. Security as context takes the larger picture into perspective. It asks:

  • Who wrote the code?
  • What does the app do?
  • Are there any critical functions?
  • Did the developer pass any security training?

He said all three views on security are important, but only a context-based view considers the experience you are delivering. He compared composition and context as the difference between reading an ingredient list for a recipe and actually eating the taco it produces.

Thinking about the whole organization and the history of the project will lead to better outcomes and improved collaboration, allowing teams to work together more cohesively and with greater agility. Part of the path forward is democratizing security tools and getting the right tools into your developers' hands earlier in the process. We recommend using ggshield as a pre-commit hook for this reason.

James ended his talk by referring us to DryRun Security's Contextual Security Analysis Guide for further insights into this topic.

"Context Over Control: Security's New Path" James Wickett, CEO & Co-Founder of DryRun Security #DevWeek #CloudX

A Safer Cloud for All

One of the biggest takeaways from Developer Week CloudX is that everyone is on the same basic journey when it comes to the cloud. No matter where you are on your cloud migration path, at the beginning and just bringing your first apps online, or living the multicloud dream and leveraging IaC consistently, keeping security top-of-mind is critical to success.

There is a lot more to CloudX than we could cover here. Be sure to check out all the amazing talks from Developer Week CloudX when they become available. Let's all make working in the cloud safer together.

Cloud dev security Cloud communications Cloud computing Cloud engineering

Published at DZone with permission of Dwayne McDaniel. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • The Transformative Power of Artificial Intelligence in Cloud Security
  • Cloud Computing Security: Ensuring Data Protection in the Digital Age
  • Hybrid Cloud Backup: A Comprehensive Guide To Securing Your Data
  • Deliver Exceptional Digital Experiences and Unlock New Value With Okta Customer Identity

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!