Organizations today are working to modernize their technology architecture, but many are still left managing older legacy applications. It’s no wonder since migration to the cloud and a microservices based environment requires a rip and replace strategy that is typically avoided due to the expense involved. So, while most organizations are working to move to the cloud the process has been slow.

What this often leads to is a fractured attempt to move select services while relying on legacy applications to manage others. This creates two district worlds with new and old technology mixing together and relying on each other. One of the biggest challenges with these hybrid environments is they can demand two sets of management systems. This can mean two sets of security policies or two sets of identity management requirements each requiring its own support and processes. What was supposed to be a project to simplify can end up creating double the effort.

One common thread between the two are the APIs in place to support the communication channel. Allowing every application type to talk to each other and share data. The use of APIs has solved the legacy communication problem but what if they can solve other issues as well? What if focusing on securing the APIs can solve the requirement of multiple security policies?

The Cloudentity MicroPerimeter™ solves that very problem.

The Cloudentity MicroPerimeter™ provides authentication and individual authorization policies for each service and legacy application. The MicroPerimeter™ consists of two components.

  • The MicroPerimeter™ Edge facilitates the authorization required and creates a token carried through the transaction. Then each monolithic application is wrapped in its own MicroPerimeter™ Edge to monitor and secure all traffic it receives and sends
  • The MicroPerimeter™ Sidecar, due to its tiny footprint, protects each microservice.

With each application having an individual MicroPerimeter™ allowing for per-transaction authentication and per-resource authorization. Leveraging the two components of the MicroPerimeter™ allows an organization to create and support one security policy that can be used throughout a hybrid environment.