Learning Library

← Back to Library

Securing Hybrid Cloud: North‑South vs East‑West Traffic

Key Points

  • The talk distinguishes **north‑south traffic** (user‑to‑data‑center/cloud) from **east‑west traffic** (service‑to‑service within a data center or cloud) as a foundation for hybrid‑cloud security.
  • In traditional on‑prem monolithic apps, **perimeter security** (firewalls, badge access) and an **API gateway** protect exposed endpoints, placing most security responsibility on the application developer.
  • Moving to a public or private cloud, the architecture shifts to **Kubernetes workers** where multiple micro‑services communicate internally (east‑west), requiring container‑level security and service‑mesh controls.
  • At the cloud edge, providers add protections such as **DDoS mitigation and request authentication**, complementing the on‑prem perimeter and helping secure the north‑south traffic that enters the hybrid environment.

Full Transcript

# Securing Hybrid Cloud: North‑South vs East‑West Traffic **Source:** [https://www.youtube.com/watch?v=_bjDY9omL9I](https://www.youtube.com/watch?v=_bjDY9omL9I) **Duration:** 00:13:15 ## Summary - The talk distinguishes **north‑south traffic** (user‑to‑data‑center/cloud) from **east‑west traffic** (service‑to‑service within a data center or cloud) as a foundation for hybrid‑cloud security. - In traditional on‑prem monolithic apps, **perimeter security** (firewalls, badge access) and an **API gateway** protect exposed endpoints, placing most security responsibility on the application developer. - Moving to a public or private cloud, the architecture shifts to **Kubernetes workers** where multiple micro‑services communicate internally (east‑west), requiring container‑level security and service‑mesh controls. - At the cloud edge, providers add protections such as **DDoS mitigation and request authentication**, complementing the on‑prem perimeter and helping secure the north‑south traffic that enters the hybrid environment. ## Sections - [00:00:00](https://www.youtube.com/watch?v=_bjDY9omL9I&t=0s) **North‑South vs East‑West Security** - The speaker explains hybrid‑cloud security by contrasting perimeter (north‑south) traffic with internal (east‑west) traffic, using an on‑prem monolith example to illustrate firewall‑based protection and its impact on application developers. ## Full Transcript
0:00hi everyone my name is psy venom and I'm 0:02a developer advocate with IBM today I 0:04want to talk about security with hybrid 0:06cloud architectures this is going to be 0:08part three of the hybrid cloud 0:09architecture series security is a 0:12nuanced topic but to kind of help me 0:15explain I'm going to start with two 0:17major concepts of north-south network 0:20traffic versus east-west network traffic 0:22when I walked into the office today I 0:24had to pull out my badge and scan to get 0:27into the building this is something 0:29called perimeter security and it's a 0:31core part of north-south network traffic 0:34essentially what that refers to is any 0:36traffic that's traveling from end-user 0:38applications to your data centers or 0:41public or private cloud environments 0:43let's take a step back and kind of 0:45explain these pieces here so we've 0:48talked about this in the previous videos 0:49but what we've got here is the stock 0:52trader monolith which is gonna be on an 0:55on-prem data center we've got a couple 0:59of services here maybe something to help 1:01us talk to the cloud and maybe a data 1:04store as well so we mentioned perimeter 1:07security and that's something you 1:09honestly you take as a given with data 1:10centers that you have that firewall 1:13sitting in front of that data center 1:15giving you a private network for your 1:18actual data center and the applications 1:20and workloads running within it this 1:22made security a lot easier to tackle 1:24when working with monolithic 1:25applications but it did put the onus of 1:28security on the application the 1:30enterprise application developer the the 1:34the main thing here to actually secure 1:37these endpoints was to make sure that 1:39all the capabilities that this monolith 1:41exposes those API endpoints or secured 1:44and to do that we could take advantage 1:46of something like an api gateway so 1:49traditionally what we would see is a 1:50gateway that's set up in front of that 1:56that on-prem application with key 2:00capabilities exposed that may be 2:03required by that front-end to render the 2:05application and potentially the same for 2:08a mobile app as well so that I think 2:11helps tackle security with north-south 2:14and network traffic on the on premise 2:16side but let's shift gears here for a 2:18second and talk about the public cloud 2:21side or even potentially a private cloud 2:23I'll talk about the different components 2:25here later in the video but let's start 2:28with this piece right here which is the 2:30kubernetes worker within the kubernetes 2:34worker we can assume that we have a 2:35couple of services that we need to 2:37actually render the stock trader 2:39application whether it's mobile or in a 2:41web app so I have a couple services you 2:45can assume they talk to one another so 2:47what happens when an end-user actually 2:49accesses that application well one 2:51they'll actually have to hit that 2:53endpoint that becomes available at which 2:55point they will enter the public cloud 2:57and at that layer we get things like 3:01denial of service protection and other 3:04kind of things that the cloud provider 3:06offers you to make sure that those 3:08requests or maybe authenticated or you 3:11know they're they're coming in in a safe 3:12manner 3:13the next thing that happens that 3:15requests will get forwarded to your 3:17actual kubernetes worker node with the 3:19capabilities that it exposes so at that 3:23level we have a couple of options for 3:25securing those endpoints so let's say 3:28you know we want to hit this first micro 3:31service running in a kubernetes worker 3:33there's two ways that we can kind of 3:35configure security policies the first is 3:38gonna be at layer 3 which is if you're 3:41familiar it's it's things like IPS and 3:44ports basically allows you to configure 3:47policies for any network interface 3:49that's gonna be done with things like 3:51calico or the native kubernetes api 3:55policies so that handles the the layer 3 3:59security level the other option we have 4:02here is to use something like Sto for 4:04layer 7 network policies and and routing 4:10for security together with those two 4:13capabilities we can cover everywhere 4:15from layer 3 to layer 7 network security 4:17policies so the request comes in and you 4:21know granted that it passes those 4:23policies gets forwarded to your worker 4:25and whatever services it might hit so 4:27this is the ingress application flow and 4:29then for external requests that a 4:32service might make for egress calls you 4:35know the same can be configured in sto 4:38or calico going everywhere from layer 4:41three to layer seven so that kind of 4:44talks about north-south traffic ingress 4:47and egress so communication with the 4:49clients as well as the data center or 4:51public private cloud environments so 4:54that tackles north-south network flows 4:59next let's talk about east-west so these 5:02are going to be essentially 5:04communication happening between services 5:07running on Prem or in your public 5:10private data cloud environments so for 5:13east-west going back to my analogy so I 5:17badge tin to my building they let me 5:18into the perimeter but to actually get 5:20to my floor where I where I work every 5:23day I have to badge again and that's 5:25going to be on it's actually the third 5:26floor of the building right so I go up 5:29to the third floor and I'm forced to 5:30actually scan my badge again if I tried 5:32to enter the fourth floor I actually 5:34wouldn't be allowed to enter as I'm not 5:36on the design team so essentially what 5:39that refers to is a concept called 5:41segmentation so within the actual 5:45building or an application 5:46infrastructure maybe a public cloud 5:48environment we want to create segments 5:51of what users are allowed to access what 5:53admins are allowed to access what 5:55processes are allowed to access when 5:57when talking to one another so at that 6:01level we actually call this an customer 6:04or in kubernetes environments we call 6:06that micro segmentation so in the 6:09customer managed environment what that 6:11would look like is essentially setting 6:13up using something like sto TLS between 6:17all requests going between micro 6:21services the thing about encryption it's 6:23one of those things that you want to 6:24encrypt any requests as early as 6:26possible and decrypt as late as possible 6:28so with traditional kind of kubernetes 6:31micro services architectures you want to 6:33make sure that all of those requests are 6:35being encrypted at the earliest level 6:38possible 6:39so that's kind of handles micro service 6:41- micro service architecture but we 6:43didn't really need to consider that with 6:45the monolith because again as we 6:47mentioned monoliths would be using RPC 6:49or remote procedure calls software based 6:51calls which remove the requirement of of 6:55you know talking over a network so we 6:57wouldn't actually have to take advantage 6:58of TLS but you can imagine that you do 7:01want to make sure that the the network 7:03calls may be made to the database would 7:06be secured 7:07TLS the next concept I want to introduce 7:10is what we've have sketched out here on 7:12the cloud manage side of our cloud so 7:16what we've got here is the kubernetes 7:19master node and one thing to kind of 7:25remember here is that when you're 7:26working with a managed kubernetes 7:27service the the master node is actually 7:30going to be managed by the cloud 7:33provider so whereas you control the 7:35worker nodes the master is completely 7:38managed and houses a very important 7:41piece of the architecture the @cd data 7:44store so in the kubernetes world that CD 7:49datastore is something that you want to 7:52be really careful about protecting 7:53because that has all the information 7:55about your services your deployments and 7:58all of the kubernetes api resources so 8:01secure in that CD is going to be very 8:03important it's paramount to your 8:05security architecture and to secure that 8:08a cloud provider traditionally will have 8:11a kind of a three phase process so what 8:14we'll have is everything from we'll 8:20start with step 1 which is 8:22authentication so TLS next we've got our 8:27back which is kubernetes role based 8:29access control for authorization and 8:34then finally over here the last piece of 8:38that puzzle is going to be the admission 8:40controller which is a kubernetes concept 8:42that you know once you've made it 8:44through the authentication and 8:45authorization there's another level of 8:47security to make sure that those API 8:50requests are our Mutai 8:52or you know massaged and made sure that 8:54they're in the right format to access 8:56that data so they'll access that EDD 9:00data and to send that back to your work 9:02or note where your application pods need 9:04to request that information or or you 9:06know pass information to it there's a 9:08Open VPN server and there's also going 9:15to be a client as well but that's going 9:19to enable you to basically access that 9:22EDD data store and return data back into 9:24the kubernetes worker so that kind of 9:28covers the the pattern of how kubernetes 9:32is set up in a cloud provider service 9:36with master node being managed and the 9:38worker node being able to kind of work 9:41with that master node in a secure 9:42fashion to make sure your assets are 9:44protected at all times the other thing I 9:47want to mention here that EDD city data 9:48store is gonna be backed up is about 9:52this arrow here that EDD CD data store 9:54is going to be backed up in a cloud 9:57object storage capability to make sure 9:59that you know worst case scenario you do 10:02have those those assets in a secure 10:05place so I think that covers you know 10:08north-south network traffic as well as 10:10east-west where we talked about network 10:13traffic coming in from clients or at 10:15least network traffic going between 10:16services from your data center and your 10:19private environments private or public 10:21cloud environments the last thing I want 10:23to talk about is a concept called dev 10:25sec ops notice here that you know it's 10:33essentially dev ops with the word 10:35security right in the middle and 10:36essentially it's a way to ensure that 10:40security is something that you think 10:42about from the ground up when you start 10:44architecting the application all the way 10:46until you move into production and 10:48that's something you want to take 10:49advantage of to make sure that you know 10:51you don't have any any issues when we're 10:55moving to production you don't want to 10:56architect an application the incorrect 10:58way and then realize you have to go back 11:00and rework all of that so thinking about 11:03security from the beginning is going to 11:06be 11:06an important thing when working with a 11:08cloud provided kubernetes service 11:10there's something that makes it a little 11:12bit easier to to make sure your flows 11:15are secure and one one consideration you 11:18want to have here is to make sure that 11:19your CI workflow that DevOps flow has 11:22security embedded within it and is 11:24automated so you can imagine maybe you 11:26have your favorite kind of code 11:29repository holding your application code 11:31your your docker files whatever they 11:33might be I'm going to automate that 11:35process and make sure that you know 11:38maybe only the developers who are 11:40building that code have access to that 11:41git repo next you want to make sure you 11:44have a trusted signer to make sure that 11:47that code when it gets pushed into a 11:49registry well will go ahead and sign it 11:52as a trusted image which is something 11:54that's available with the cloud manage 11:56registry so we'll push that image into 11:59that registry once there there's the 12:01capability called vulnerability advisor 12:03that's going to scan that image and make 12:05sure that there's any issues or any 12:08vulnerabilities that are detected 12:09everywhere from the base operating 12:11system to may be the runtime that you're 12:13using that if a vulnerability is 12:15detected you'll be made aware of it once 12:18it passes that vulnerability assessment 12:19you can tie that in to build that image 12:23and push it directly into kubernetes at 12:26that stage you can use something like an 12:29admission controller which we talked 12:31about in the kubernetes master an 12:32admission controller to make sure that 12:34that image is again secure and without 12:36vulnerabilities and finally there's an 12:39live scanning capability to allow you to 12:42scan your images running in production 12:44to make sure that there's no 12:46vulnerabilities in there so dev sack ops 12:49an important a very important concept 12:52that ensures that from the ground up 12:54you're managing security when doing 12:56DevOps thanks for tuning in to part 13:00three of the hybrid cloud architecture 13:01series on security if you haven't 13:03already be sure to check out the 13:05introduction part 1 and part 2 the links 13:07will be below as always feel free to 13:10subscribe if you want to see more of 13:11these videos in the future thank you