SlideShare a Scribd company logo
1 of 37
From Gates to Guardrails:
Alternate Approaches to
Product Security
LASCON 2013
Jason Chan
chan@netflix.com
About Me
•  Engineering Director @ Netflix:
–  Security: Product, App, Ops, IR, etc.

•  Previously:
–  Led security team @ VMware
–  Consultant - @stake, iSEC Partners
About Netflix
AGILE/CD/CLOUD/DEVOPS
CHARACTERISTICS
SAFELY HANDLING
SPEED & SCALE
Netflix Environment
• 
• 
• 
• 
• 
• 

~200 production pushes/day
40m+ subscribers
Support for 1000+ devices
Service in 40+ countries
Concurrent delivery from 3 AWS regions
~1/3 of US download bandwidth at peak
CULTURE
Recruiting
Infrastructure/Systems/
Cloud

AppSec

Development

Monitoring & Response

Online Operations
Waiting, working,
Easy planning and
complete
reporting
Per-user
filters
VISIBILITY
Dashboards for
Security Data
Sub- Services
and
Dashboards

Dashboards for
Regional
SecurityDrill-down
Relevant Events
for Key Services and Lookback
Meaningful
subject
Alert
configuration

What to do?

Useful links
for more data

Embedded
graph
Access to changes
by app, region,
environment, etc.

Lookback in time
as needed
Chat integration
lets engineers
easily access info
App
name
Jenkins
(CI) job

Currently
running clusters
by region/
environment
Cluster
ID

Deployment
details
AMI version
SCM commit
Link to
relevant
JIRA(s)

Modified
files

Source
diffs
AUTOMATION
1000+ tests to
compare proposed vs.
existing
AWS
components
Configuration
history

Details (rules)
ImmutableServer Pattern
•  “ . . . a server that once deployed, is
never modified, merely replaced with a
new updated instance.”
–  http://martinfowler.com/bliki/
ImmutableServer.html
Wrapping Up
•  Cloud/DevOps/Agile/CD are
transformative (for org & security)
•  Orgs embracing tend to deal in speed
and scale
•  Look to culture, visibility, and automation
as security enablers in these
environments
Summary
Meeting’s Over – Questions?
Netflix Links
•  http://techblog.netflix.com
•  http://netflix.github.io/#repo
•  http://www.slideshare.net/netflix
Photo Credits
• 
• 
• 
• 
• 
• 
• 
• 

Conzelman Road: http://www.california-travels.com/2012/05/04/pointbonita-lighthouse/
Canary: http://www.lafebervet.com/avian-medicine-list/basicinformation-sheets-for-the-canary/
Visibility: http://photography.nationalgeographic.com/wallpaper/
photography/photo-tips/city-photos/golden-gate-bridge-fog/
Scale: http://www.livestockscales.info/
Guinea fowl: http://danrouthphotography.blogspot.com/2009/07/
running-bird.html
Culture Club: http://www.last.fm/music/Culture+Club/This+Time:+The
+First+Four+Years
Babou: http://wildstar-central.com/index.php?threads/extaticaswallpapers-post-my-1200-post-_.4400/
Derek: http://www.fastcocreate.com/3016905/kindness-is-the-newirony-ricky-gervais-on-bringing-an-unlikely-hero-to-netflix-with-derek

More Related Content

What's hot

What's hot (20)

580827935-Mckinsey-Training-1-3.pdf
580827935-Mckinsey-Training-1-3.pdf580827935-Mckinsey-Training-1-3.pdf
580827935-Mckinsey-Training-1-3.pdf
 
e-Conomy SEA 2021: Kỷ nguyên số của Đông Nam Á
e-Conomy SEA 2021: Kỷ nguyên số của Đông Nam Áe-Conomy SEA 2021: Kỷ nguyên số của Đông Nam Á
e-Conomy SEA 2021: Kỷ nguyên số của Đông Nam Á
 
Employee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer OutcomesEmployee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer Outcomes
 
Cloud value in cash management
Cloud value in cash managementCloud value in cash management
Cloud value in cash management
 
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
 
McKinsey Survey: Saudi consumer sentiment during the coronavirus crisis
McKinsey Survey: Saudi consumer sentiment during the coronavirus crisisMcKinsey Survey: Saudi consumer sentiment during the coronavirus crisis
McKinsey Survey: Saudi consumer sentiment during the coronavirus crisis
 
Shattering the Glass Screen: Gender inequality in media and entertainment
 Shattering the Glass Screen: Gender inequality in media and entertainment Shattering the Glass Screen: Gender inequality in media and entertainment
Shattering the Glass Screen: Gender inequality in media and entertainment
 
2020 Women in the Workplace Participant Briefing
2020 Women in the Workplace Participant Briefing2020 Women in the Workplace Participant Briefing
2020 Women in the Workplace Participant Briefing
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
Riding the crest of digital health in APAC
Riding the crest of digital health in APACRiding the crest of digital health in APAC
Riding the crest of digital health in APAC
 
Cloud Native Apps with GitOps
Cloud Native Apps with GitOps Cloud Native Apps with GitOps
Cloud Native Apps with GitOps
 
The CEO guide to China's future
The CEO guide to China's futureThe CEO guide to China's future
The CEO guide to China's future
 
Federal Technology Vision 2021: Full U.S. Federal Survey Findings | Accenture
Federal Technology Vision 2021: Full U.S. Federal Survey Findings | AccentureFederal Technology Vision 2021: Full U.S. Federal Survey Findings | Accenture
Federal Technology Vision 2021: Full U.S. Federal Survey Findings | Accenture
 
2022 COVID-19 Consumer Healthcare Insights-Feb 2022.pdf
2022 COVID-19 Consumer Healthcare Insights-Feb 2022.pdf2022 COVID-19 Consumer Healthcare Insights-Feb 2022.pdf
2022 COVID-19 Consumer Healthcare Insights-Feb 2022.pdf
 
McKinsey Quarterly 50th Anniversary Highlights
McKinsey Quarterly 50th Anniversary HighlightsMcKinsey Quarterly 50th Anniversary Highlights
McKinsey Quarterly 50th Anniversary Highlights
 
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
 
AI in the Financial Services Industry
AI in the Financial Services IndustryAI in the Financial Services Industry
AI in the Financial Services Industry
 
Unleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | AccentureUnleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | Accenture
 
Container Orchestration
Container OrchestrationContainer Orchestration
Container Orchestration
 
McKinsey Global Institute Report - A labor market that works: Connecting tale...
McKinsey Global Institute Report - A labor market that works: Connecting tale...McKinsey Global Institute Report - A labor market that works: Connecting tale...
McKinsey Global Institute Report - A labor market that works: Connecting tale...
 

Viewers also liked

Practical Cloud Security
Practical Cloud SecurityPractical Cloud Security
Practical Cloud Security
Jason Chan
 
Real World Cloud Application Security
Real World Cloud Application SecurityReal World Cloud Application Security
Real World Cloud Application Security
Jason Chan
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
Jason Chan
 
Ibm cloud nativenetflixossfinal
Ibm cloud nativenetflixossfinalIbm cloud nativenetflixossfinal
Ibm cloud nativenetflixossfinal
aspyker
 

Viewers also liked (20)

Resilience and Compliance at Speed and Scale
Resilience and Compliance at Speed and ScaleResilience and Compliance at Speed and Scale
Resilience and Compliance at Speed and Scale
 
Amazon Web Services Security
Amazon Web Services SecurityAmazon Web Services Security
Amazon Web Services Security
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
 
Splitting the Check on Compliance and Security
Splitting the Check on Compliance and SecuritySplitting the Check on Compliance and Security
Splitting the Check on Compliance and Security
 
Defending Netflix from Abuse
Defending Netflix from AbuseDefending Netflix from Abuse
Defending Netflix from Abuse
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Practical Cloud Security
Practical Cloud SecurityPractical Cloud Security
Practical Cloud Security
 
Practical Security Automation
Practical Security AutomationPractical Security Automation
Practical Security Automation
 
Careers in Security
Careers in SecurityCareers in Security
Careers in Security
 
Real World Cloud Application Security
Real World Cloud Application SecurityReal World Cloud Application Security
Real World Cloud Application Security
 
Resilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedResilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons Learned
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Analyze System and Code Interactions
Analyze System and Code InteractionsAnalyze System and Code Interactions
Analyze System and Code Interactions
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit Perspectives
 
Cloud Security @ Netflix
Cloud Security @ NetflixCloud Security @ Netflix
Cloud Security @ Netflix
 
Ibm cloud nativenetflixossfinal
Ibm cloud nativenetflixossfinalIbm cloud nativenetflixossfinal
Ibm cloud nativenetflixossfinal
 
Re:invent 2016 Container Scheduling, Execution and AWS Integration
Re:invent 2016 Container Scheduling, Execution and AWS IntegrationRe:invent 2016 Container Scheduling, Execution and AWS Integration
Re:invent 2016 Container Scheduling, Execution and AWS Integration
 
Netflix Global Applications - NoSQL Search Roadshow
Netflix Global Applications - NoSQL Search RoadshowNetflix Global Applications - NoSQL Search Roadshow
Netflix Global Applications - NoSQL Search Roadshow
 

Similar to From Gates to Guardrails: Alternate Approaches to Product Security

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 

Similar to From Gates to Guardrails: Alternate Approaches to Product Security (20)

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
Netflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open SourceNetflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open Source
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
 
Introduction to the AWS Cloud – Russell Hall
Introduction to the AWS Cloud – Russell HallIntroduction to the AWS Cloud – Russell Hall
Introduction to the AWS Cloud – Russell Hall
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Deep dive into service fabric after 2 years
Deep dive into service fabric after 2 yearsDeep dive into service fabric after 2 years
Deep dive into service fabric after 2 years
 
4. aws enterprise summit seoul 기존 엔터프라이즈 it 솔루션 클라우드로 이전하기 - thomas park
4. aws enterprise summit seoul   기존 엔터프라이즈 it 솔루션 클라우드로 이전하기 - thomas park4. aws enterprise summit seoul   기존 엔터프라이즈 it 솔루션 클라우드로 이전하기 - thomas park
4. aws enterprise summit seoul 기존 엔터프라이즈 it 솔루션 클라우드로 이전하기 - thomas park
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Webinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frog
Webinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frogWebinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frog
Webinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frog
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
AWS Summit Atlanta Keynote
AWS Summit Atlanta KeynoteAWS Summit Atlanta Keynote
AWS Summit Atlanta Keynote
 
Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
 
Don’t Fly Blind – Gain AWS Visibility to Ensure Security and Optimise Operati...
Don’t Fly Blind – Gain AWS Visibility to Ensure Security and Optimise Operati...Don’t Fly Blind – Gain AWS Visibility to Ensure Security and Optimise Operati...
Don’t Fly Blind – Gain AWS Visibility to Ensure Security and Optimise Operati...
 
Cloud computing ppt.
Cloud computing ppt.Cloud computing ppt.
Cloud computing ppt.
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

From Gates to Guardrails: Alternate Approaches to Product Security