Skip to content

控制測試執行:自定義執行器

Test execution is the process of running tests to verify a specific functionality in a system. It’s a great way for us to find bugs in our applications, but over time we realized that we needed to improve the speed and efficiency of our test execution method. Here’s how we did it.

The story so far
After four years of automated test development, we now have a significant collection of tests we can run. These tests can be organized and executed on demand and provide us with valuable data about the current state of our system.

Most popular automated test development platforms offer us some level of control over test execution: parallel suites, for example, to reduce execution times. Some platforms even allow us to dynamically inject test cases during runtime, depending on the current system state.

But what if it’s not enough? What if we need even more control over execution? What if we want to use mixed-type pipelines and dynamically change test data or execution pool thread capabilities?

The problem
We execute tests from several different IPs because some of the functionality can be tested only while using a specific tunnel connection. This brings us to Cloudflare accessibility problems, request limit issues, and, occasionally, authentication errors.

Some more complex scenarios require the alteration of test data. This can only be done via microservice-based endpoints. Some of those endpoints are only accessible from an internal network. After a tunnel connection is established with an external server, a test execution bot can no longer reach the internal resources required for this test run.

Another problem is the number of requests being generated during test runs. For security purposes, all environments have strict request limits, but our test activity can easily reach those limits. Dynamic IPs prevent us from whitelisting IP addresses, and it becomes impossible to execute all test collections from one IP address.

The solution
After several solutions failed, we finally came up with a test strategy that involved modifying test data upfront.

If access cannot be gained from specific IP, we get access tokens before making the connection. If the alteration of test data via internal endpoints is needed, we execute this before the test run. We also bypassed request limits by switching IPs during the test run.

All of this would be impossible if we did not design a more sophisticated test executor.

The executor
We had to design a system that allowed full control of dynamic test execution. The project goal was to have control over the parallel and serial execution of tasks, bound with one executor.

First, data gathering and alteration happen via internal endpoints. A tunnel connection is established, and then parallel test execution takes place to minimize execution time.

Some test suites generate more requests than others, so we must be aware of how many requests are being made and how many suites are in parallel segments. At some point, the IP address has to change, and a new set of test suites are executed again in parallel. This pipeline continues until all tests have been executed.

The result
Thanks to this solution, we can take full control of the test execution pool and execution sequence. In practice, that means we are able to adapt to ever-changing security measures and still provide valuable test execution reports. Our tests allow us to identify bugs faster than ever, enhancing the security and efficiency of all our applications.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

了解可觀察性 VS。 監控。 第1部分

The development of clouds, the DevOps movement, and distributed microservice-based architecture have come together to make observability vital for modern architecture. We’re going to dive into what observability is and how to approach the metrics we need to track. Observability is a way of spotting and troubleshooting the root causes of problems involving software systems whose internals we might not understand. It extends the concept of monitoring, applying it to complex systems with unpredictable and/or complex failure scenarios. I’ll start with some of the basic principles of observability that I’ve been helping to implement across a growing number of products and teams at Nord Security.

Monitoring vs. Observability

“Monitoring” and “observability” are often used interchangeably, but these concepts have a few fundamental differences.

Monitoring is the process of using telemetry data to understand the health and performance of your application. Monitoring telemetry data is preconfigured, implying that the user has detailed information on their system’s possible failure scenarios and wants to detect them as soon as they happen.

In the classical approach to monitoring, we define a set of metrics, collect them from our software system, and react to any changes in the values of these metrics that are of interest to us.

For example:

Excessive CPU usage can indicate that we need to scale it up to compensate for increasing system loads;

A drop in successfully served requests after a fresh release can indicate that the newly released version of the API is malfunctioning;

Health checks process binary metrics that represent whether the system is alive at all or not.

Observability extends this approach. Observability is the ability to understand the state of the system by performing continuous real time analysis of the data it outputs.

Instead of just collecting and watching predefined metrics, we continuously collect different output signals. The most common types of signals – the three pillars of observability – are:

  • Metrics: Numeric data aggregates representing software system performance;
  • Logs: Time-stamped messages gathered by the software system and its components while working;
  • Traces: Maps of the paths taken by requests as they move through the software system.

The development of complex distributed microservice architectures has led to complex failure scenarios that can be hard or even impossible to predict. Simple monitoring is not enough to catch them. Observability helps by improving our understanding of the internal state of the system.

Metrics

Choosing the right metrics to collect is key to establishing an observability layer for our software system. Here are a few different popular approaches that define a unified framework of must-have metrics in any software system.

USE

Originally described by Brendan Gregg, this approach focuses more on white-box monitoring – monitoring of the infrastructure itself. Here’s the framework:

  • Utilization – resource utilization.
    • % of CPU / RAM / Network I/O being utilized.
  • Saturation – how much remaining work hasn’t been processed yet.
    • CPU run queue length;
    • Storage wait queue length;
  • Errors – errors per second
    • CPU cache miss;
    • Storage system fail events;

Note: Defining “saturation” in this approach can be a tricky task and may not be possible in specific cases.

Four Golden signals

Originally described in the Google SRE Handbook, the Four Golden signals framework is defined as follows:

  • Latency – time to process requests;
  • Traffic – requests per second;
  • Errors – errors per second;
  • Saturation – resource utilization.

RED

Originally described by Tom Wilkie, this approach focuses on black-box monitoring – monitoring the microservices themselves. This simplified subset of the Four Golden Signals uses the following framework:

  • Rate – requests per second;
  • Errors – errors per second;
  • Duration – time to process requests.

Choosing and following one of these approaches allows you to unify your monitoring concept throughout the whole system and make it easier to understand what is happening. They complement one another, and your choice may depend on which part of a system we want to monitor. These approaches also don´t exclude additional business-related metrics that vary from one component of the software system to another.

Logs

System logs are a useful source of additional context when investigating what is going on inside a system. They are immutable, time-stamped text records that provide context to your metrics.

Logs should be kept in a unified structured format like JSON. Use additional log storage/visualization tools to simplify interaction with the massive amount of text data the software system provides. One very well-known and popular solution for log storage is ElasticSearch.

Traces

Traces help us better understand the request flow in our system by representing the full path any given request takes through a distributed software system. This is very helpful in identifying failing nodes and bottlenecks.

Traces themselves are hierarchical structures of spans, where each span is a structure representing the request and its context in every node in its path. Most common tracing visualization tools like Jaeger or Grafana display traces as waterfall diagrams showing the parent and child spans caused by the request.

Conclusion

Building an observable software system lets you identify failure scenarios and possible risks during the whole system life cycle. A combination of metrics, extensive log collection, and traces helps us understand what’s happening inside our system at any moment and speeds up investigations of abnormal behavior.

This article was just the first step. We’ve covered the standard approaches to metrics and briefly discussed traces and logs. But to implement an observable software system, we need to set up its components correctly to supply us with the signals we need. In part 2, we’ll discuss instrumentation approaches and modern standards in this field.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

物聯網:物聯網 VS。 網絡威脅

Internet of Things (IoT) is a rapidly growing industry. It is forecasted that in 2025 there will be 152,200 IoT devices connecting to the internet every minute. Nowadays, modern businesses utilize IoT technologies such as remote healthcare medical devices, agricultural drones, intelligent production lines, and financial modeling systems to reduce costs, increase productivity, and perform economic forecasts. But users often forget about these technologies’ security aspects, making them an easy target for cybercriminals. Therefore, in this blog, we will discuss how to secure your IoT devices and protect yourself from potential cyber-attacks.

Blog image size 1280x720

What are IoT devices?

The Internet of Things (IoT) is a network of physical items implanted with sensors, software, and other technologies that act on the collected data via machine learning. They are devices created to adapt to users’ daily needs and improve daily repetitive tasks. It can be anything from intelligent kids’ toys or smart home appliances to healthcare devices, vehicles, etc.

However, businesses use IoT technology on a larger scale, starting with smart office systems that include smart locks, remote security cameras, and climate control, and ending with complex solutions, such as digital financial modeling, AI-based management solutions, intelligent factory systems, autonomous agriculture, etc.

How IoT is transforming businesses

Research shows that companies who utilized IoT devices for a year noticed these positive trends: improved productivity, reduced labor, increased worker safety, etc.

Here are a few examples of how IoT improves business solutions:

  1. They help you manage and track your inventory by providing various remote control choices.

  2. They are becoming smarter with every connection to the device – the more they track, the more they learn about the patterns, and by doing so, they optimize the user’s experience.

  3. They innovate businesses with the help of predictive maintenance. For example, these devices will help monitor your harvest if you work in agriculture.

  4. They reduce waste by improving power management and water consumption, making businesses more eco-friendly.

  5. They reduce human labor by automating repetitive tasks and helping to allocate workforce resources to more complex tasks.

  6. They automatically schedule and control various production tasks, increasing productivity.

  7. They assist in maintenance. For example, IoT devices measure temperature, humidity, and other indicators to achieve necessary storage conditions.

  8. They can even prevent diseases or health issues by tracking necessary health data, such as blood sugar levels, and reminding about insulin injections.

The hidden dangers of IoT

The advantages are outstanding, but many IoT devices still don’t meet the minimum cybersecurity standards. If not secured, they’re sensitive to cyberattacks, such as an incident with a hijacked Tesla when the attackers gained access to car control while it was driving.

The number of cyberattacks on IoT devices is growing at alarming rates. In the first half of 2021, it was twice as high as the total number of attacks in 2020. Here are the most frequent types of threats carried out against IoT devices:

  • DoS (denial-of-service) attacks are carried out to take down company online assets and steal their sensitive data.

  • Brute-force password attacks lead to criminals gaining access to a particular device.

  • Firmware hijacking is used to access a device when software is downloaded from an illegitimate source.

  • Eavesdropping attack occurs when a hacker intercepts, deletes or changes data sent between two devices.

Top causes making IoT devices insecure

A recent study addressed the most common IoT security issues: lack of personal information privacy, unprotected software, insecure web, weak passwords, and lack of encryption. In general, many people and businesses don’t prioritize security simply because they are unaware of why they need it. Unlike laptops and other types of consumer electronic hardware, many of these devices don’t have built-in security that provides regular security updates.

Another issue is that people don’t change the initial default settings and leave them as they were after setting up IoT devices at their home or office. Many off-brand IoT producers manufacture devices with fewer resources and cheaper components that usually are insecure, creating an ever-increasing threat to the device owners.

How to secure your business IoTs

The main problem for businesses is that they have too many devices and don’t usually supervise them. That creates security gaps in your cybersecurity and opens the doors for eager cybercriminals. So, here are 10 steps for how you can secure your business IoT devices:

  1. Understand the current IoT assets. Run an internal audit to determine how many and what kind of IoT devices you have and who has the access.

  2. Monitor ALL the devices. Keep an eye on all of your devices to protect them from being infected – utilize a tech solution to automate this process.

  3. Apply a tracking system. Implement an identity and access management (IAM) solution that will allow you to track which IoT devices are active and when they go online and offline.

  4. Build an internal security system. Block any potential threat by using network access control (NCA) technologies that authenticate and authorize network users to access your company’s information.

  5. Remove all data from old devices. Pay attention to the devices that aren’t in use anymore, as they may store important information. After removing all data, consider returning them to manufacturers for recycling.

  6. Choose reliable suppliers. Pay attention to the manufacturer of your IoT devices, because it’s very important to know whether the device comes with built-in security and how you should update it from reliable sources in the future.

  7. Keep the devices up-to-date. Various software updates bring bug fixes and security patches, so it’s essential to be updated regularly.

  8. Make unlockable passwords. Build strong password combinations consisting of various symbols, letters, and numbers to make them hard to crack. Also, creating a master password would do the trick if the devices are connected to a phone, tablet, or computer.

  9. Guarantee IoT security. Ensure that you are using port security, invest in a network intrusion detection system, disable port forwarding, and use security solutions like VPN and firewalls.

  10. Secure the Wi-Fi. Last but not least, ensure the Wi-Fi router’s safety – strengthen the router firewall, deactivate WPS, and enable the WPA2 protocol. And, as always, use a strong password for it!

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

數據加密如何保護您的業務

Embracing the cloud is more than a simple infrastructure upgrade – it’s a way towards a more efficient business transformation. And while companies store their data in the clouds, the number of intruders that seek to steal data or hold it hostage is constantly growing. So, in this interview, we talked with Aivaras Vencevičius, the Head of Product at NordLocker, about how business leaders should look at cybersecurity and why data encryption is the next big thing.

 

P1033313 Edit

 

First, could you tell us a bit about yourself and what you do here at Nord Security?

Hey, my name is Aivaras, and I am the Head of Product at NordLocker. I lead the team who provides an encrypted cloud solution for anyone who wants to safely store their data and still be its original owner. I know it sounds similar to what usual cloud providers say, but, believe me, you lose control over your files the moment you upload them to the cloud. The simple truth is that many providers still have the decryption key and can access the files at any time. With NordLocker, it’s the opposite – we secure your data without the ability to see it, a.k.a zero-knowledge architecture. Together with a team of excellent Product Owners and Designers, we successfully lead the product’s vision, roadmap development, and new feature discovery.

Weakest nodes of security in business

From your experience, how likely are companies to protect their data and have a data protection policy in place? Why?

Well, this likelihood usually comes down to several different factors. First of all, it depends on the company size, the industry in which it operates, IT maturity, and more. Secondly, it’s also somewhat affected by the growing awareness of data security risks and the necessity to secure it through various data protection measures. And finally, the most impactful factor is the rising number of breaches and the fear of becoming one of the targets. As a result, companies tend to care more about their data security when they or someone close to them experience a breach. So, it’s still more “reacting to disaster” than preparing for it proactively.

In your opinion, what can cause more security breaches and damage – lack of security policy or employee carelessness? Why?

It is unquestionably both. Businesses that don’t have at least basic security policies in place often become easy prey for cybercriminals. Unfortunately, the same thing can happen due to the employee’s carelessness. A company with the most sophisticated, well-described, and thought-through security procedures can be compromised if employees keep their passwords written on sticky notes on their desks. In that case, no policy can help. Cybercriminals spend a lot of time looking for the weakest links in a company’s protection, and if there are any, it’s bound to be exploited.

Even though people are often a company’s weakest link in security, this doesn’t happen just because they are careless. Usually, our basic habits, knowledge of cyber threats, and understanding of security policies and tools differ, and we aren’t very aware of complex security measures. So to ensure that employees aren’t the cause of a breach, every business should ask itself whether it’s easy for people to use already applied security tools and what additional effort employees have to make to follow those security policies.

The growing scale of ransomware

Let’s talk a little bit about ransomware. How big of a threat to company security is it? Could you share a bit of data on that?

The truth is that nowadays, ransomware is one of the biggest and fastest-growing threats. Mainly because it causes two very harmful things for businesses – it steals sensitive data that can cause reputational damage if exposed and blocks business access to crucial data needed to run daily operations. This fear of disruption and data loss pushes company owners to pay ransoms, increasing the attackers’ desire to carry out even larger operations. In fact, in 2021 alone, ransomware attacks rose to 1,000 per day, mostly targeting industries such as construction, manufacturing, finance, and others. So no business is safe from ransomware and other types of malware unless they do data encryption to protect against these threats.

What is the more attractive target for cybercriminals – confidential business information or employee information?

At the end of an attack, attackers typically seek to gain access to confidential company information, which is the ‘highest tier’ in data value scales. However, this data is usually the most protected from hackers. So, this is where employee information comes into play: breaching employee data can lead attackers further and provide them with access to more important corporate data. Simply put, stealing employees’ information could be the start of a very complex and harmful data breach.

Evaluating the risks

Does the size of a company directly impact the effectiveness of its cybersecurity policy? Why? How should a company solve such a problem?

Well, the company size doesn’t necessarily affect the effectiveness of cybersecurity. Larger companies may seem more resilient to cyber-attacks because they have more resources and a greater number of dedicated IT specialists who can examine the company’s cybersecurity ecosystem. However, this is not the case. They may have much more flaws, and it is far more difficult to oversee the training and safety of thousands of people rather than 10 or 20. On the other hand, small businesses cannot dedicate large budgets to cybersecurity and employ IT security professionals. However, being small, they are less likely to attract the attention of criminals. Nevertheless, there is always a risk. So, no matter how big or small the company is, all businesses should think about potential cybersecurity dangers regularly.

Usually, a ‘what-if’ scenario helps to evaluate the scale of risk:

  1. What if your business gets attacked?

  2. How difficult would it be to continue business operations?

  3. What are the costs of a potential loss of data?

  4. What appropriate resources and attention should be dedicated to cybersecurity?

Practical tips to ensure your data is safe

How important is it to encrypt corporate information? How effective are NordLocker’s algorithms used to encrypt the company’s data?

Data encryption is one of the safest ways to protect corporate information from cyberattacks. Even if a file is stolen, the content is encrypted and cannot be accessed by anyone else. And this is where our NordLocker product succeeds – it combines data encryption with secure cloud storage and backup. So, in the event of a ransomware attack, the company’s data is protected and cannot be taken hostage, while the backups provide business continuity.

From your point of view – what steps should a company take to protect its information? What advice would you give to them?

  1. First of all, a company should treat cybersecurity as a continuous business activity by making sure they are aware of the latest cyber threats. It is important to keep in mind that there is no one perfect solution or tool that could protect against all threats.

  2. The second step is to identify possible dangers and weak areas in your firm. Once you find thems, make sure you implement the best security measures to strengthen your company’s vulnerabilities.

  3. Finally, keep in mind that even the most modern security policies and tools may be considered worthless if the company’s employees do not naturally apply them. Using security tools that are simple to deploy and easy to use by employees with different technical knowledge can help make their daily routines much safer.

Thus, it is important to maintain a holistic approach and use a wide range of security tools that are easy to use and do not stand in the user’s way. It will help build a security net over the business and make it more resilient to ever-increasing cyber threats.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.