SlideShare a Scribd company logo
1 of 38
Download to read offline
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shannon Lietz – Intuit – Sr. Manager, Cloud Security Engineering
Matt Bretan – AWS Professional Services – Senior Consultant
October 2015
SEC402
Enterprise Cloud Security via DevSecOps 2.0
Crawl. Walk. Run.
What to expect from this session
• Are you ready to adopt security so compelling it
changes how your company operates???
• Learn from our lessons and war stories.
• Gain knowledge about how to do DevSecOps at your
organization.
• Discover what we are doing to learn more!
…DevSecOps is an evolving story
Copyright © 2009 José-Manuel Benitos
2007 2008 2009 2010 2011 2012 2013 2014 2015
48 61
82
159
280
514
?
Security, compliance, governance, and audit related launches and updates
AWS constantly innovating – driven by your needs
Cloud security Then and Now
From: To:
Human
Interactions
Recon Operations
Security
Intelligence
UX API
Security Intelligence
Recon Tools Agents
Operations
Human Interactions
Where are we today?
• DevSecOps is different and
addictive.
• Cloud attacks and
compromises are faster.
• Investing in native cloud
solutions.
• Doubling down on educating
security on AWS services.
• Focusing on attack modeling
and operationalizing security.
Since 2014:
+ 37 DevSecOps worldwide
+ 2k cloud security
+ 3 open-source projects underway
+ Full day of SecDevOps @RSA
+ Dedicated track for security in
Rugged DevOps @ Goto
How can I catch up? Quick recap?
Problem statement
• DevOps requires continuous deployments
• Fast decision making is critical to DevOps
success
• Traditional security just doesn’t scale or move
fast enough
Welcome, DevSecOps!
• Customer focused mindset
• Scale, scale, scale
• Objective criteria
• Proactive hunting
• Continuous detection and response
Bang
Head
Here
DevSecOps
Security
Engineering
Security
Operations
Compliance
Operations
Security
Science
Experiment,
Automate,
Test
Hunt,
Detect,
Contain
Respond,
Manage,
Train
Learn,
Measure,
Forecast
Why is this so important? The Case for Change
• DevOps, Agile, and Scrum on the rise…
• Workload migrations to software defined environments…
• Mass adoption of the public cloud…
• Talent migration to progressive cloud companies…
• Startups have game-changing tech at their disposal…
• Competitive landscape is becoming fierce…
• The perimeter is no longer an option…
• Security, now more than ever, is an arms race…
The DevSecOps mindset
• Customer focus
• Open and transparent
• Iteration over perfection
• Hunting over reaction
• Hmmm → Wait a minute, this sounds like a
manifesto…insert shameless plug here:
http://www.devsecops.org
OK → Ready, Set, Crawl?
Where to start?
• Pontificate?
• Checklists?
• 1-pagers? 6-pagers?
Documents?
Page 3 of 433
Security as code
Security as code is easy with AWS
AWS provides all the APIs!
• Programmatically test environments
• Determine state of environment at a
specific point in time
• Repeatable processes
• Scalable operations
How can we learn DevSecOps?
Security as
Code?
Security as
Operations?
Compliance
Operations?
Science?
Experiment:
Automate
Policy
Governance
Experiment:
Detection
via Security
Operations
Experiment:
Compliance
via
DevSecOps
Toolkit
Experiment:
Science via
Profiling
DevOps
+
Security
Start
Here?
DevOps
+
DevSecOps
Crawl demo
Lessons learned
• One and done does not work.
• Documenting decisions is useful but not enough.
• Traditional security tools make operating a cloud
environment challenging.
• Need to suspend disbelief.
• Enterprise cloud security is a big-data problem.
The “who” matters
Operations
Red team
Blue team
Developer
Security
The “who” matters
Copyright © 2012 Martin Patten
The “who” matters
Can I skip walking?
Why walking is important…
Imagine that you will need to support all of the facets of
security inline with development and operations at speed.
• Were your crawl experiments enough to generate DevSecOps
experts?
• Have you got the right level of operational maturity?
• Do you have an All Star Team or a Team of All Stars?
• Is your organization listening, participating, and fully engaged?
• Is collaboration and communication working well?
• Do you have it all figured out?
Are you ready to make these decisions?
On-Premises
Partial
On-Premises
Outsourced w/ No
Indemnification
Outsourced w/
Partial
Indemnification
Outsourced w/ Full
Indemnification
Who is
responsible?
I
N
T
E
R
N
A
L
You You You You + Partner Partner
P
A
R
T
N
E
R
S
Which minimal
controls are
needed?
Physical Security,
Secure Handling,
Disposal
File Or Object
Encryption For
Sensitive Data,
Physical Security,
Secure Handling,
Disposal
File Or Object Encryption For
Sensitive Data, Partner
Security, SOC Attestation
File Or Object
Encryption For
Sensitive Data,
Partner Security, SOC
Attestation
Partner Security, SOC
Attestation
Where does
data transit
and get
stored?
Company “Owned”
Data Center Or Co-
location
Any Compute &
Transit, Data Store On
Premises
Public Cloud, Free Services
SaaS, Private Cloud,
Public Cloud, Free
Services,
Managed Services,
SaaS, Private Cloud
What are the
innovation
benefits?
Reduced Latency,
Search Sensitive Data
Speed, Reduced
Friction, Search
Sensitive Data
Speed, Reduced Friction,
Evolving Patterns, Community
Speed, Reduced
Friction, Evolving
Patterns, Community
Speed, Reduced
Friction, Indemnification
What are the
potential risks?
SQL Injection, Internal
Threats, Mistakes,
Phishing, Increased
Friction, Slow
Latency, SQL Injection,
Internal Threats,
Mistakes, Phishing,
Increased Friction,
Slow
Inability to Search Sensitive
Data, SQL Injection, Internal
Threats, Mistakes, Phishing,
Unknown Gov’t Requests,
Reduced Financial
Responsibility
Inability to Search
Sensitive Data, SQL
Injection, Internal
Threats, Mistakes,
Phishing, Unknown
Gov’t Requests
Inability to Search
Sensitive Data, SQL
Injection, Internal
Threats, Mistakes,
Phishing, Unknown
Gov’t Requests
Or govern these policies?
{
“Version”: “2015-05-09”,
“Statement”: {
“Effect”: “Allow”,
“Action”: [
“iam:ChangePassword”,
“iam:GetAccountPasswordPolicy”
],
“Resource”: “*”
}
}
Or hunt full stack security issues?
Or communicate simply and quickly?
Discover Evaluate Control Communicate
Or translate security like this?
Begin
(iam.client.list_role_policies(:role_name => role_)[:policy_names]
-roldedb.list_policies(role)).each do |policy|
log.warn("Deleting Policy"#{policy}", which is not part of the approved baseline.")
if policydiff("{}",
URI.decode(iam.client.get_role_policy(
:role_name => role,
:policy_name => policy
)[:policy_document]),
{:argv => ARGV, :diff => options.diff})
end options.dryrun ? nil : 
iam.client.delete_role_policy(
:role_name => role,
:policy_name => policy
)
Account Grade:
B
Heal Account?
Walk demo
Lessons learned
• A lot of this is not new.
• It’s hard work and ever evolving.
• Enterprise cloud security is a bigger big-data problem than
we originally thought…petabytes!!!!
• Keys to success:
• Detect and resolve security issues quickly.
• Use native security capabilities as much as possible.
• Enlist and enable the organization.
• Educate inline and break it into bite-size chunks.
Up and running in 2 weeks
Guiding principles
• DevSecOps is a journey, not a destination.
• Small security teams can make a profound impact.
• Organize around self-service and enablement.
• Translate security for the layperson.
• Perfection is the enemy…get rugged.
What does Running look like?
• Operating model and process
• Open contribution
• Tools and rules
Operating model and process
• Empower everyone to participate.
• Enlighten decision makers with insights.
• Don’t reinvent the wheel—use organizational tools.
• Lightweight process.
• Pivot! Pivot! Pivot!
• Iterate.
Open contribution
• Use source control and collaboration features to
ensure the right rules are being created.
• Engage everyone in your organization.
• Track and resolve defects transparently.
Ready to build your DevSecOps platform?
insights
security
sciencesecurity
tools & data
AWS
accounts
S3
Glacier
EC2
CloudTrail
ingestion
threat intel
Demo:
Enterprise cloud security in AWS
What Next?
• Take the DevSecOps Survey at devsecops.org.
• Join the DevSecOps LinkedIn group and get involved.
• Follow us on Twitter @devsecops.
• Give us feedback on the Enterprise Cloud Security How-
To.
• Write an article for the DevSecOps community.
• Become a DevSecOps engineer.
• Spread the word!!!
Remember to complete
your evaluations!
Thank you!
@devsecops
Related sessions
SEC326 – Security Science Using Big Data
SEC312 – Reliable Design and Deployment of Security
and Compliance
SEC316 – Harden Your Architecture with Security Incident
Response Simulations (SIRS)
SEC308 – Wrangling Security Events in the Cloud

More Related Content

What's hot

What's hot (20)

What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
 
Architecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi AccountsArchitecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi Accounts
 
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
AWS Enterprise Summit Netherlands - AWS IoT
AWS Enterprise Summit Netherlands - AWS IoTAWS Enterprise Summit Netherlands - AWS IoT
AWS Enterprise Summit Netherlands - AWS IoT
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWS
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rs
 
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
Innovating IAM Protection for AWS with Dome9 - Session Sponsored by Dome9
Innovating IAM Protection for AWS with Dome9 - Session Sponsored by Dome9Innovating IAM Protection for AWS with Dome9 - Session Sponsored by Dome9
Innovating IAM Protection for AWS with Dome9 - Session Sponsored by Dome9
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 

Viewers also liked

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Justin collins - Practical Static Analysis for continuous application delivery
Justin collins - Practical Static Analysis for continuous application deliveryJustin collins - Practical Static Analysis for continuous application delivery
Justin collins - Practical Static Analysis for continuous application delivery
DevSecCon
 

Viewers also liked (20)

DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Infrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpsInfrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOps
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Justin collins - Practical Static Analysis for continuous application delivery
Justin collins - Practical Static Analysis for continuous application deliveryJustin collins - Practical Static Analysis for continuous application delivery
Justin collins - Practical Static Analysis for continuous application delivery
 

Similar to (SEC402) Enterprise Cloud Security via DevSecOps 2.0

Similar to (SEC402) Enterprise Cloud Security via DevSecOps 2.0 (20)

S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Finding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldFinding Security a Home in a DevOps World
Finding Security a Home in a DevOps World
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

(SEC402) Enterprise Cloud Security via DevSecOps 2.0

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Shannon Lietz – Intuit – Sr. Manager, Cloud Security Engineering Matt Bretan – AWS Professional Services – Senior Consultant October 2015 SEC402 Enterprise Cloud Security via DevSecOps 2.0 Crawl. Walk. Run.
  • 2. What to expect from this session • Are you ready to adopt security so compelling it changes how your company operates??? • Learn from our lessons and war stories. • Gain knowledge about how to do DevSecOps at your organization. • Discover what we are doing to learn more!
  • 3. …DevSecOps is an evolving story Copyright © 2009 José-Manuel Benitos
  • 4. 2007 2008 2009 2010 2011 2012 2013 2014 2015 48 61 82 159 280 514 ? Security, compliance, governance, and audit related launches and updates AWS constantly innovating – driven by your needs
  • 5. Cloud security Then and Now From: To: Human Interactions Recon Operations Security Intelligence UX API Security Intelligence Recon Tools Agents Operations Human Interactions
  • 6. Where are we today? • DevSecOps is different and addictive. • Cloud attacks and compromises are faster. • Investing in native cloud solutions. • Doubling down on educating security on AWS services. • Focusing on attack modeling and operationalizing security. Since 2014: + 37 DevSecOps worldwide + 2k cloud security + 3 open-source projects underway + Full day of SecDevOps @RSA + Dedicated track for security in Rugged DevOps @ Goto
  • 7. How can I catch up? Quick recap? Problem statement • DevOps requires continuous deployments • Fast decision making is critical to DevOps success • Traditional security just doesn’t scale or move fast enough Welcome, DevSecOps! • Customer focused mindset • Scale, scale, scale • Objective criteria • Proactive hunting • Continuous detection and response Bang Head Here DevSecOps Security Engineering Security Operations Compliance Operations Security Science Experiment, Automate, Test Hunt, Detect, Contain Respond, Manage, Train Learn, Measure, Forecast
  • 8. Why is this so important? The Case for Change • DevOps, Agile, and Scrum on the rise… • Workload migrations to software defined environments… • Mass adoption of the public cloud… • Talent migration to progressive cloud companies… • Startups have game-changing tech at their disposal… • Competitive landscape is becoming fierce… • The perimeter is no longer an option… • Security, now more than ever, is an arms race…
  • 9. The DevSecOps mindset • Customer focus • Open and transparent • Iteration over perfection • Hunting over reaction • Hmmm → Wait a minute, this sounds like a manifesto…insert shameless plug here: http://www.devsecops.org
  • 10. OK → Ready, Set, Crawl?
  • 11. Where to start? • Pontificate? • Checklists? • 1-pagers? 6-pagers? Documents? Page 3 of 433 Security as code
  • 12. Security as code is easy with AWS AWS provides all the APIs! • Programmatically test environments • Determine state of environment at a specific point in time • Repeatable processes • Scalable operations
  • 13. How can we learn DevSecOps? Security as Code? Security as Operations? Compliance Operations? Science? Experiment: Automate Policy Governance Experiment: Detection via Security Operations Experiment: Compliance via DevSecOps Toolkit Experiment: Science via Profiling DevOps + Security Start Here? DevOps + DevSecOps
  • 15. Lessons learned • One and done does not work. • Documenting decisions is useful but not enough. • Traditional security tools make operating a cloud environment challenging. • Need to suspend disbelief. • Enterprise cloud security is a big-data problem.
  • 16. The “who” matters Operations Red team Blue team Developer Security
  • 17. The “who” matters Copyright © 2012 Martin Patten
  • 19. Can I skip walking?
  • 20. Why walking is important… Imagine that you will need to support all of the facets of security inline with development and operations at speed. • Were your crawl experiments enough to generate DevSecOps experts? • Have you got the right level of operational maturity? • Do you have an All Star Team or a Team of All Stars? • Is your organization listening, participating, and fully engaged? • Is collaboration and communication working well? • Do you have it all figured out?
  • 21. Are you ready to make these decisions? On-Premises Partial On-Premises Outsourced w/ No Indemnification Outsourced w/ Partial Indemnification Outsourced w/ Full Indemnification Who is responsible? I N T E R N A L You You You You + Partner Partner P A R T N E R S Which minimal controls are needed? Physical Security, Secure Handling, Disposal File Or Object Encryption For Sensitive Data, Physical Security, Secure Handling, Disposal File Or Object Encryption For Sensitive Data, Partner Security, SOC Attestation File Or Object Encryption For Sensitive Data, Partner Security, SOC Attestation Partner Security, SOC Attestation Where does data transit and get stored? Company “Owned” Data Center Or Co- location Any Compute & Transit, Data Store On Premises Public Cloud, Free Services SaaS, Private Cloud, Public Cloud, Free Services, Managed Services, SaaS, Private Cloud What are the innovation benefits? Reduced Latency, Search Sensitive Data Speed, Reduced Friction, Search Sensitive Data Speed, Reduced Friction, Evolving Patterns, Community Speed, Reduced Friction, Evolving Patterns, Community Speed, Reduced Friction, Indemnification What are the potential risks? SQL Injection, Internal Threats, Mistakes, Phishing, Increased Friction, Slow Latency, SQL Injection, Internal Threats, Mistakes, Phishing, Increased Friction, Slow Inability to Search Sensitive Data, SQL Injection, Internal Threats, Mistakes, Phishing, Unknown Gov’t Requests, Reduced Financial Responsibility Inability to Search Sensitive Data, SQL Injection, Internal Threats, Mistakes, Phishing, Unknown Gov’t Requests Inability to Search Sensitive Data, SQL Injection, Internal Threats, Mistakes, Phishing, Unknown Gov’t Requests
  • 22. Or govern these policies? { “Version”: “2015-05-09”, “Statement”: { “Effect”: “Allow”, “Action”: [ “iam:ChangePassword”, “iam:GetAccountPasswordPolicy” ], “Resource”: “*” } }
  • 23. Or hunt full stack security issues?
  • 24. Or communicate simply and quickly? Discover Evaluate Control Communicate
  • 25. Or translate security like this? Begin (iam.client.list_role_policies(:role_name => role_)[:policy_names] -roldedb.list_policies(role)).each do |policy| log.warn("Deleting Policy"#{policy}", which is not part of the approved baseline.") if policydiff("{}", URI.decode(iam.client.get_role_policy( :role_name => role, :policy_name => policy )[:policy_document]), {:argv => ARGV, :diff => options.diff}) end options.dryrun ? nil : iam.client.delete_role_policy( :role_name => role, :policy_name => policy ) Account Grade: B Heal Account?
  • 27. Lessons learned • A lot of this is not new. • It’s hard work and ever evolving. • Enterprise cloud security is a bigger big-data problem than we originally thought…petabytes!!!! • Keys to success: • Detect and resolve security issues quickly. • Use native security capabilities as much as possible. • Enlist and enable the organization. • Educate inline and break it into bite-size chunks.
  • 28. Up and running in 2 weeks
  • 29. Guiding principles • DevSecOps is a journey, not a destination. • Small security teams can make a profound impact. • Organize around self-service and enablement. • Translate security for the layperson. • Perfection is the enemy…get rugged.
  • 30. What does Running look like? • Operating model and process • Open contribution • Tools and rules
  • 31. Operating model and process • Empower everyone to participate. • Enlighten decision makers with insights. • Don’t reinvent the wheel—use organizational tools. • Lightweight process. • Pivot! Pivot! Pivot! • Iterate.
  • 32. Open contribution • Use source control and collaboration features to ensure the right rules are being created. • Engage everyone in your organization. • Track and resolve defects transparently.
  • 33. Ready to build your DevSecOps platform? insights security sciencesecurity tools & data AWS accounts S3 Glacier EC2 CloudTrail ingestion threat intel
  • 35. What Next? • Take the DevSecOps Survey at devsecops.org. • Join the DevSecOps LinkedIn group and get involved. • Follow us on Twitter @devsecops. • Give us feedback on the Enterprise Cloud Security How- To. • Write an article for the DevSecOps community. • Become a DevSecOps engineer. • Spread the word!!!
  • 38. Related sessions SEC326 – Security Science Using Big Data SEC312 – Reliable Design and Deployment of Security and Compliance SEC316 – Harden Your Architecture with Security Incident Response Simulations (SIRS) SEC308 – Wrangling Security Events in the Cloud