Announcing Tetrate Agent Operations Director for GenAI Runtime Visibility and Governance

Learn more
< Back

Gartner’s CASCE Proposal for Securing Composite Applications

Background Many applications today rely on components from multiple providers, accessed via web APIs – referred to as “composite applications,” accord

Gartner%E2%80%99s%20CASCE%20Proposal%20for%20Securing%20Composite%20Applications

Background

Many applications today rely on components from multiple providers, accessed via web APIs – referred to as “composite applications,” according to Techopedia. Securing these applications, including communication across components, is challenging. 

Now Gartner is promoting a solution to these challenges in a report, 2021 Gartner® Innovation Insight for Comprehensive Secure Connectivity for Composite Applications. The report describes composite applications as “a security architecture challenge” and proposes techniques “to implement these applications with greater consistency, flexibility and integrity.” Joe Skorupa of Gartner also spoke about these issues at the third annual ZTA and DevSecOps for Cloud-Native Applications conference, held in January. (Mr. Secorro’s talk was not recorded.) 

We at Tetrate have been thinking about these same issues, and talking to our colleagues in the industry about them, for some time, and we have come to similar conclusions as Gartner. As a result, most, if not all of Gartner’s proposed recommendations are already implemented in Tetrate Service Bridge, and are available out of the box to Tetrate customers.

Key challenges

Organizations are building applications that incorporate components from multiple second- and third-party providers, predominantly via web APIs. This can be as simple as storing data in AWS S3, or as complex as building an AI application that draws heavily on services provided by Google Cloud Platform for machine learning. 

This reliance on components outside the control of the organization presents new security challenges: 

  • The more components, the greater the attack surface
  • Use of external components makes it harder to ensure compliance with relevant regulations and standards.
  • Developers lack the knowledge and expertise to implement appropriate networking and security policies across the composite app
  • Networking and security teams lack the means to ensure policy implementation and control enforcement across the app
  • The difficulty of enforcing network policies on outside components may require blocking them or relaxing important policy requirements – and either choice needs to be explicitly rendered in enforceable and auditable policy

Key recommendations

Gartner is proposing CASCE as a solution. CASCE offers the following recommendations. Software engineering leaders must:

  • Use a common repository for networking policies to support consistency in all communications
  • Ensure that policy is enforced consistently across applications
  • Use distributed API gateways and private networks to enforce policies, reducing points of contact and ensuring control 
  • Ensure strong identity authentication for end users (for instance, via OAuth) as well as application components (for instance, via SPIFFE and SPIRE). 
  • Ensure consistent policy and context across heterogeneous environments.

Why Tetrate?

Tetrate has been primarily concerned with security, agility, and business continuity within a service mesh. These are outstanding features in both the Istio open source project and Tetrate Service Bridge, our application connectivity platform. 

CASCE works to ensure that these advantages are not lost in communications between a secure service mesh, such as one based on Istio and using TSB, and outside components. It ensures that all participants in a composite application are working together to live up to the same high standards. 

If you are working on composite applications, you may want to learn more about service mesh as a critical architectural component, and ways to ensure high standards across your internal and external application components, as set forth in CASCE. If so, we urge you to contact Tetrate for a discussion.

Product background Product background for tablets
New to service mesh?

Get up to speed with free online courses at Tetrate Academy and quickly learn Istio and Envoy.

Learn more
Using Kubernetes?

Tetrate Enterprise Gateway for Envoy (TEG) is the easiest way to get started with Envoy Gateway for production use cases. Get the power of Envoy Proxy in an easy-to-consume package managed via the Kubernetes Gateway API.

Learn more
Getting started with Istio?

Tetrate Istio Subscription (TIS) is the most reliable path to production, providing a complete solution for running Istio and Envoy securely in mission-critical environments. It includes:

  • Tetrate Istio Distro – A 100% upstream distribution of Istio and Envoy.
  • Compliance-ready – FIPS-verified and FedRAMP-ready for high-security needs.
  • Enterprise-grade support – The ONLY enterprise support for 100% upstream Istio, ensuring no vendor lock-in.
  • Learn more
    Need global visibility for Istio?

    TIS+ is a hosted Day 2 operations solution for Istio designed to streamline workflows for platform and support teams. It offers:

  • A global service dashboard
  • Multi-cluster visibility
  • Service topology visualization
  • Workspace-based access control
  • Learn more
    Decorative CTA background pattern background background
    Tetrate logo in the CTA section Tetrate logo in the CTA section for mobile

    Ready to enhance your
    network

    with more
    intelligence?