| ©2018 F5 NETWORKS
1
Secured APIM-as-a-Service
Frank Zhu
| ©2018 F5 NETWORKS
2
Objective
| ©2018 F5 NETWORKS
3
Bring DevOps best practices into Operations
Provision & Security
Turn Gate into Guardrail
| ©2018 F5 NETWORKS
4
Challenges
| ©2018 F5 NETWORKS
5
Digital Transformation Challenges
Speed
Complexity Attack Surface Collaboration
✓ Inconsistent Security
solution across
cloud environments
✓ Lack of DevOps
friendly security tools
(CI/CD pipeline)
✓ Implement security early in
the development process
✓ Deploy in modern
architecture
✓ Microservices creates
Additional attack vectors
& new attack types
✓ SecOps view of DevOps:
“They don’t take
security seriously”
✓ DevOps View of SecOps:
“They constantly are
interrupting our pipeline,
slowing us down, all for
the sake of security”
| ©2018 F5 NETWORKS
6
The Solution
| ©2018 F5 NETWORKS
7
Declarative
Support Base Templates
predefined or externalreference
Adaptation layer: Base Template Adaption
Option to customize the initial policy
{"policy": {
"name":"AppPolicy01",
"description":"AppV1.1 - DEMO FOR DECLARATIVE AND WEBHOOKS CAPABILITIES",
"template":{ "name":"POLICY_TEMPLATE_RAPID_DEPLOYMENT" },
"enforcementMode":"blocking",
"server-technologies":[
{
"serverTechnologyName":"MySQL"
} ],
"signature-settings":{
"signatureStaging": false
},
"modifications": [{
"entityChanges": {
"type": "explicit"
},
"entity": {
"name": "log"
},
"entityKind": "tm:asm:policies:filetypes:filetypestate",
"action": "delete",
"description": "Delete Disallowed File Type"
} ] }
Modification layer: Policy builder suggestions
Part of the modification layer and can be shared between
policies
| ©2020 F5
8
 Shift-Left 
API Testing
API
Implementation
API Definition API Onboarding
API
Deployment
API Runtime
Development Operations
Self Service
| ©2018 F5 NETWORKS
9
Secured APIM-as-a-Service
| ©2018 F5 NETWORKS
10
Secured APIM-as-a-Microservice
| ©2018 F5 NETWORKS
11
Deployment Options
| ©2018 F5 NETWORKS
12
Deployment at the Edge (Tier 2)
Ingress
Controller
pod
pod
pod
pod
pod
Per-Pod proxy
Per-Service
proxy
Edge
NetOps/SecOps-Centric Approach
This is a prime use case for Edge load balancer
i.e. outside K8s.
NetOps/SecOps empower their App/DevOps
brethren to consume F5 application services in
an automated manner.
| ©2018 F5 NETWORKS
13
Deployment on the Ingress Controller (Tier 3)
Ingress
Controller
pod
pod
pod
pod
pod
Per-Pod proxy
Per-Service
proxy
Edge
K8s SecOps/DevSecOps-Centric Approach
Appropriate solution when secured policies are
under direction of NetOps or DevOps teams.
Policies are defined and associated with
services using Kubernetes API.
NGINX Ingress Controller RBAC allows:
• Admin users to enforce policies per listener
• DevOps users to select policy per Ingress
Resource
Leverage Container Ingress Services to
scale NGINX Ingress Controller and add other
application services (LB, DNS, DDoS, IAM).
| ©2018 F5 NETWORKS
14
Deployment forA Specific Service (Tier 3)
Ingress
Controller
pod
pod
pod
pod
pod
Per-Pod proxy
Per-Service
proxy
Edge
DevSecOps-Centric Approach
Appropriate solution when secured policies
are under direction of the DevSecOps team,
and specific to a small number of services.
Protection is implemented using a front-end
proxy service for the protected service(s).
• Easy to deploy securely
• Security updates require re-deployment of
per-service proxy tier
Allows for greater resource control and
reduces complexity of IC configuration.
| ©2018 F5 NETWORKS
15
Deployment forA Specific Pod (Tier 3)
Ingress
Controller
pod
pod
pod
pod
pod
Per-Pod proxy
Per-Service
proxy
Edge
AppOwner-Centric Approach
Appropriate solution when App Owner has full
control of security for their application.
Protection is implemented using an embedded
proxy for each application pod.
• Implemented, tested and deployed using
CI/CD pipeline
• Security updates require re-deployment of
application pods
Suitable for services that require very close
control and testing of API configuration.
| ©2018 F5 NETWORKS
16
Meet the Team
| ©2018 F5 NETWORKS
17
DevOps squad: 6-8 resources:
1. Tech lead
2. Scrum Master
3. Test Developer
4. Deployment Developer
5. 2-4 Full-Stack Developers
Two-Pizza Team
Call of Duty: Warzone for Windows With Crack Free Download 2025
| ©2018 F5 NETWORKS
19
Discovery Questions
| ©2018 F5 NETWORKS
20
1. How many APIsnowand overthe next year? How many Teams?
2. Internalor Externalconsumers?Determineswhat they need froma DevPortal& Auth Requirements
3. API stylesin use – REST,XML, gRPC,GraphQL.Nowvs Future.
4. Contractfirstapproach(Do theydesignbeforetheybuild APIs)? Existingspecs?
5. Deploymentflow(how many teams have to touchit)
6. Automationrequirements-DevOpspractices,CI/CD maturity
7. How are the APIs deliveredtoday?Reverseproxy,load balancer,simpleAPIgateway,APImgtsolution
8. What’s wrong with it? Whatchanged? Needthem to share what they really need.
9. Are they modernizing? Forreal,or brownfieldmix/mess
10. Lookingto augment,rip/replace,Performanceand latency
APIM Focus
| ©2018 F5 NETWORKS
21
1. Existing WAFsolutions
2. The Deploymentoptionsrequirements
3. Describerthe existing communication/interactionbetweenDevelopmentand Operationsteams
4. How is the API implementationtested?Whattoolsare used?
5. Is there value to unify the securitytestsforAPI?
WAF Focus

More Related Content

PDF
Secured APIM-as-a-Service
PPTX
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
PDF
Application Security with NGINX
PDF
Application Security with NGINX | APAC
PDF
Découvrez NGINX AppProtect
PDF
IDM Crack 2025 Internet Download Manger Patch
PDF
What's New with NGINX Application Security Solutions
PDF
IObit Uninstaller Pro Crack 13.2.0.5 + Key Download 2025
Secured APIM-as-a-Service
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Application Security with NGINX
Application Security with NGINX | APAC
Découvrez NGINX AppProtect
IDM Crack 2025 Internet Download Manger Patch
What's New with NGINX Application Security Solutions
IObit Uninstaller Pro Crack 13.2.0.5 + Key Download 2025

Similar to Call of Duty: Warzone for Windows With Crack Free Download 2025 (20)

PDF
Movavi Screen Recorder Studio 22.5.2 Crack
PDF
Get the Most Out of Kubernetes with NGINX
PDF
Introduction to DevSecOps
PPTX
Enhanced Security and Visibility for Microservices Applications
PPTX
What it feels like to live in a Security Enabled DevOps World
PPTX
Shift Left for More Secure Apps with F5 NGINX
PPTX
DevSecCon KeyNote London 2015
PPTX
DevSecCon Keynote
PDF
Securing Your Apps & APIs in the Cloud
PDF
Nginx app protect-for-meetup-v1.0-202006_lk
PPTX
Secure DevOPS Implementation Guidance
PPTX
Overcoming Security Challenges in DevOps
PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
InfoQ_NGINX_Fundamentals_of_Microservices.pptx.pdf
PPTX
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
PPTX
DevOps Security: A New Paradigm
PPTX
DevOps State of the Union 2015
PPTX
2018 07-24 network security at the speed of dev ops - webinar
PPTX
Q Con New York 2015 Presentation - Conjur
PPTX
Is DevOps Braking Your Company?
Movavi Screen Recorder Studio 22.5.2 Crack
Get the Most Out of Kubernetes with NGINX
Introduction to DevSecOps
Enhanced Security and Visibility for Microservices Applications
What it feels like to live in a Security Enabled DevOps World
Shift Left for More Secure Apps with F5 NGINX
DevSecCon KeyNote London 2015
DevSecCon Keynote
Securing Your Apps & APIs in the Cloud
Nginx app protect-for-meetup-v1.0-202006_lk
Secure DevOPS Implementation Guidance
Overcoming Security Challenges in DevOps
Connect Ops and Security with Flexible Web App and API Protection
InfoQ_NGINX_Fundamentals_of_Microservices.pptx.pdf
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
DevOps Security: A New Paradigm
DevOps State of the Union 2015
2018 07-24 network security at the speed of dev ops - webinar
Q Con New York 2015 Presentation - Conjur
Is DevOps Braking Your Company?
Ad

Recently uploaded (20)

PPTX
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...
PPTX
Folder Lock 10.1.9 Crack With Serial Key
PPTX
Human-Computer Interaction for Lecture 1
PPT
3.Software Design for software engineering
PDF
Bright VPN Crack Free Download (Latest 2025)
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
PDF
Cloud Native Aachen Meetup - Aug 21, 2025
PDF
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
PDF
Top 10 Project Management Software for Small Teams in 2025.pdf
PDF
IT Consulting Services to Secure Future Growth
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PPTX
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
PPTX
Human-Computer Interaction for Lecture 2
PPTX
Chapter_05_System Modeling for software engineering
PDF
Engineering Document Management System (EDMS)
PPTX
A Spider Diagram, also known as a Radial Diagram or Mind Map.
PDF
Odoo Construction Management System by CandidRoot
PPTX
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
PPTX
Foundations of Marketo Engage: Nurturing
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...
Folder Lock 10.1.9 Crack With Serial Key
Human-Computer Interaction for Lecture 1
3.Software Design for software engineering
Bright VPN Crack Free Download (Latest 2025)
Viber For Windows 25.7.1 Crack + Serial Keygen
Cloud Native Aachen Meetup - Aug 21, 2025
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
Top 10 Project Management Software for Small Teams in 2025.pdf
IT Consulting Services to Secure Future Growth
Internet Download Manager IDM Crack powerful download accelerator New Version...
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
Human-Computer Interaction for Lecture 2
Chapter_05_System Modeling for software engineering
Engineering Document Management System (EDMS)
A Spider Diagram, also known as a Radial Diagram or Mind Map.
Odoo Construction Management System by CandidRoot
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
Foundations of Marketo Engage: Nurturing
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
Ad

Call of Duty: Warzone for Windows With Crack Free Download 2025

  • 1. | ©2018 F5 NETWORKS 1 Secured APIM-as-a-Service Frank Zhu
  • 2. | ©2018 F5 NETWORKS 2 Objective
  • 3. | ©2018 F5 NETWORKS 3 Bring DevOps best practices into Operations Provision & Security Turn Gate into Guardrail
  • 4. | ©2018 F5 NETWORKS 4 Challenges
  • 5. | ©2018 F5 NETWORKS 5 Digital Transformation Challenges Speed Complexity Attack Surface Collaboration ✓ Inconsistent Security solution across cloud environments ✓ Lack of DevOps friendly security tools (CI/CD pipeline) ✓ Implement security early in the development process ✓ Deploy in modern architecture ✓ Microservices creates Additional attack vectors & new attack types ✓ SecOps view of DevOps: “They don’t take security seriously” ✓ DevOps View of SecOps: “They constantly are interrupting our pipeline, slowing us down, all for the sake of security”
  • 6. | ©2018 F5 NETWORKS 6 The Solution
  • 7. | ©2018 F5 NETWORKS 7 Declarative Support Base Templates predefined or externalreference Adaptation layer: Base Template Adaption Option to customize the initial policy {"policy": { "name":"AppPolicy01", "description":"AppV1.1 - DEMO FOR DECLARATIVE AND WEBHOOKS CAPABILITIES", "template":{ "name":"POLICY_TEMPLATE_RAPID_DEPLOYMENT" }, "enforcementMode":"blocking", "server-technologies":[ { "serverTechnologyName":"MySQL" } ], "signature-settings":{ "signatureStaging": false }, "modifications": [{ "entityChanges": { "type": "explicit" }, "entity": { "name": "log" }, "entityKind": "tm:asm:policies:filetypes:filetypestate", "action": "delete", "description": "Delete Disallowed File Type" } ] } Modification layer: Policy builder suggestions Part of the modification layer and can be shared between policies
  • 8. | ©2020 F5 8  Shift-Left  API Testing API Implementation API Definition API Onboarding API Deployment API Runtime Development Operations Self Service
  • 9. | ©2018 F5 NETWORKS 9 Secured APIM-as-a-Service
  • 10. | ©2018 F5 NETWORKS 10 Secured APIM-as-a-Microservice
  • 11. | ©2018 F5 NETWORKS 11 Deployment Options
  • 12. | ©2018 F5 NETWORKS 12 Deployment at the Edge (Tier 2) Ingress Controller pod pod pod pod pod Per-Pod proxy Per-Service proxy Edge NetOps/SecOps-Centric Approach This is a prime use case for Edge load balancer i.e. outside K8s. NetOps/SecOps empower their App/DevOps brethren to consume F5 application services in an automated manner.
  • 13. | ©2018 F5 NETWORKS 13 Deployment on the Ingress Controller (Tier 3) Ingress Controller pod pod pod pod pod Per-Pod proxy Per-Service proxy Edge K8s SecOps/DevSecOps-Centric Approach Appropriate solution when secured policies are under direction of NetOps or DevOps teams. Policies are defined and associated with services using Kubernetes API. NGINX Ingress Controller RBAC allows: • Admin users to enforce policies per listener • DevOps users to select policy per Ingress Resource Leverage Container Ingress Services to scale NGINX Ingress Controller and add other application services (LB, DNS, DDoS, IAM).
  • 14. | ©2018 F5 NETWORKS 14 Deployment forA Specific Service (Tier 3) Ingress Controller pod pod pod pod pod Per-Pod proxy Per-Service proxy Edge DevSecOps-Centric Approach Appropriate solution when secured policies are under direction of the DevSecOps team, and specific to a small number of services. Protection is implemented using a front-end proxy service for the protected service(s). • Easy to deploy securely • Security updates require re-deployment of per-service proxy tier Allows for greater resource control and reduces complexity of IC configuration.
  • 15. | ©2018 F5 NETWORKS 15 Deployment forA Specific Pod (Tier 3) Ingress Controller pod pod pod pod pod Per-Pod proxy Per-Service proxy Edge AppOwner-Centric Approach Appropriate solution when App Owner has full control of security for their application. Protection is implemented using an embedded proxy for each application pod. • Implemented, tested and deployed using CI/CD pipeline • Security updates require re-deployment of application pods Suitable for services that require very close control and testing of API configuration.
  • 16. | ©2018 F5 NETWORKS 16 Meet the Team
  • 17. | ©2018 F5 NETWORKS 17 DevOps squad: 6-8 resources: 1. Tech lead 2. Scrum Master 3. Test Developer 4. Deployment Developer 5. 2-4 Full-Stack Developers Two-Pizza Team
  • 19. | ©2018 F5 NETWORKS 19 Discovery Questions
  • 20. | ©2018 F5 NETWORKS 20 1. How many APIsnowand overthe next year? How many Teams? 2. Internalor Externalconsumers?Determineswhat they need froma DevPortal& Auth Requirements 3. API stylesin use – REST,XML, gRPC,GraphQL.Nowvs Future. 4. Contractfirstapproach(Do theydesignbeforetheybuild APIs)? Existingspecs? 5. Deploymentflow(how many teams have to touchit) 6. Automationrequirements-DevOpspractices,CI/CD maturity 7. How are the APIs deliveredtoday?Reverseproxy,load balancer,simpleAPIgateway,APImgtsolution 8. What’s wrong with it? Whatchanged? Needthem to share what they really need. 9. Are they modernizing? Forreal,or brownfieldmix/mess 10. Lookingto augment,rip/replace,Performanceand latency APIM Focus
  • 21. | ©2018 F5 NETWORKS 21 1. Existing WAFsolutions 2. The Deploymentoptionsrequirements 3. Describerthe existing communication/interactionbetweenDevelopmentand Operationsteams 4. How is the API implementationtested?Whattoolsare used? 5. Is there value to unify the securitytestsforAPI? WAF Focus