• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 

DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012

on

  • 5,402 views

From DevOpsDays Austin 2012.

From DevOpsDays Austin 2012.


Video: http://www.ustream.tv/recorded/21568549

Statistics

Views

Total Views
5,402
Views on SlideShare
5,144
Embed Views
258

Actions

Likes
17
Downloads
108
Comments
4

6 Embeds 258

http://www.client9.com 207
https://twitter.com 23
http://www.linkedin.com 13
http://localhost 10
https://www.linkedin.com 4
https://app2.crowdbase.com 1

Accessibility

Categories

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

14 of 4 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n

DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012 DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012 Presentation Transcript

  • DevOpsSec Applying DevOps Principles to SecurityNick Galbreath nickg@etsy.com @ngalbreath DevOpsDays, Austin Texas, April 3, 2012http://client9.com/20120403 nickg@client9.com
  • Slides! Video!• Originally presented on April 3, 2012• Latest Slides! Streaming Video! http://client9.com/20120403• Related interview: http://youtu.be/Afd0u5DGxr8• Original video stream: http://www.ustream.tv/recorded/21568549
  • whoami• Development background• Lots o’ startups, book, patents,blahblahblah• Director of Engineering at Etsy covering • Security, Fraud, Biz Analytics, Email Infra, Internal Systems, and everything else not www.etsy.com “Enterprise” • Second time working with Allspaw!• “Oh you mean there is a name for this?”
  • ContextMy biases for this talk is (Web) ApplicationSecurity, not classic Network Security or ITSecurity.
  • Double-click to edit• Double-click to edit uhhhhhh....
  • Uhhhhhhh What are“DevOps Principles”
  • Blah blah blah• Decentralization• Shared Resources• Risk based management• Catholic vs protestant methologies• Whitelist vs. blacklist mentality• Transparency.
  • Trust But Verify
  • ...with theacknowledgement that• We are working in a complex system• And in complex systems failure happens• And failure can happen when everyone does nothing wrong• And given this, how can one increase reward and reduce risk for the business
  • What does this mean for....People?Processes (workflow)?Machines?
  • An Only Slightly Contrived Example• I trust MCR to run our network• I can verify this by looking at our dataporn• He trusts me that when things go wrong, the graphs won’t be used to burn him.• He can verify this by... seeing our Post Mortems in action (they are open at Etsy)
  • Uhhhh....Why DevOpsSec and not DevOpsFoo?
  • Squeezed from Both Sides Unreviewed Code going out, Untrusted Data coming in DATA UGH CODE Makes stability and responsibility “complicated”, even more so if there are walls between groups.
  • Latent ProblemsThere are operational problems right nowjust not manifested.There are security problems right now justnot exploited.
  • Cultural Problems• Both have severe failure causes• Both Ops and Security have a “say no” perception• “Operations” and “Security” are services groups but frequently not viewed as such
  • Ok, back to theregularly scheduled programming
  • DevOpsSec E 2 Applying DevOps Principles to Security A KNick Galbreath nickg@etsy.com @ngalbreath DevOpsDays, Austin Texas, April 3, 2012http://client9.com/20120403 nickg@client9.com
  • MTTRMean Time To Resolve
  • SHIT HAPPENSSecurity problems will occur
  • How Fast Can You Deploy or Rebuild• Your Firewall,VPN, Load Balancer• Your Operating System, Critical Servers• Your Database, server, schema, data• Your Application, patches• Any other configuration file in a consistent, sane manner
  • Being able to deploy quickly is my #1 security featureThis implies a standardized, automatedsystem and configuration management.
  • I Call BullshitDoesn’t the rapid rate ofchange in a continuousintegration environmentmean things are less secure? Well compare this to....
  • We’ll rush that security fix.It will go out in next releasein about 6 weeks. former vendor at Etsy
  • MTTDMean Time To Detect
  • It’s ok if we have a few extrafiremen waiting around incase there is a fire I’m more concerned we won’t know there is a fire until the house is burnt down Conversation between Chad Dickerson and Nick Galbreath, Etsy 2011
  • Segmentation Faults• Why is your server falling over?• From the same IP address.• Over and over Maybe time to patch? Also check out your server 500 errors.
  • Database Syntax Errors Almost game over here. Whose is responsible for these anyways?Demand zero-tolerance for database syntax errors.
  • SQLi AttacksThe shittest check that works.Will undercount by at least 10xProTip #1: using regexp for sqli is failProTip #2: write a unit test for this.
  • And Graph ItSecurity is no longer a binary event.
  • Got that?Security is not a binary event. You are beingattacked constantly.THIS IS AWESOME
  • Attack Driven Testing Security testing in dev is hard. Use actual attacks/probes to guide testing.• Server 500 errors• Core Dumps Can you automate• CSRF Failures verification?• XSS Attempts• Login Failures• Password Resets
  • TESTINGIf infrastructure is code, then doesn’t it need testing too?
  • assertyour production environment Who knew that writing solid C code is similar to running a complex system. Writing Solid Code Steve Maguire 1993
  • assert this• This page is always SSL• This page requires sign-in• This page never is publicly available• Google never crawls this page• This page is not being routed by the CDN• This port is never open
  • Reuse your unit test framework to test production config
  • Reuse yourcontinuous integration environment ClamAV. Yes, we antivirus our source code.
  • Other Topics in DevOpsSec
  • Post Mortems• All security issues are “P1” or “P2” (fix now, or fix by end of week)• Even for internal applications.• All get a post-mortem• Great educational experience and knowledge transfer
  • Hiring• Strict no asshole policy.• Security is a services business.• “Product Security” is in-house consultancy.• Can you take people who are interested and train them? TBD. http://www.sans.org/ https://www.owasp.org/
  • Extend the Perimeter• Working on a training program for both in- house employees, contractors, and external vendors.• “Device Tune-Up Day” -- employees bring their home computers in for a tune-up.
  • Nick Galbreath nickg@etsy.com @ngalbreath DevOpsDays Austin Tx 2012http://client9.com/20120403 nickg@client9.com