SlideShare a Scribd company logo
1 of 20
Download to read offline
Rugged Building Materials and
Creating Agility with Security
David Etue (@djetue)
Rugged Building
Materials
•  SecDevOps, Rugged DevOps,
DevSecOps, DevOps: Whatever you want
to call it, we all need security (and
compliance)
•  Very little security can exist without asset,
configuration and change management
•  If we write good code, choose our
components wisely, and manage it well,
what else is left?
“Security” Holding Up
DevOps Deployments
DevOps: The Worst-Kept Secret to Winning in the Application Economy by CA Technologies, October 2014
Security Struggling With
Cloud Too…
451	
  Research	
  -­‐	
  Cloud	
  Compu4ng	
  Wave	
  7	
  
Traditional Security Controls
Don’t Map Well to Cloud and
DevOps
Source:	
  Control	
  Quo.ent:	
  Adap.ve	
  Strategies	
  For	
  Gracefully	
  Losing	
  Control	
  (RSA	
  US	
  2013)	
  by	
  Josh	
  
Corman	
  and	
  David	
  Etue.	
  	
  
Microservices, Agility and
Portability Require Focus “Up
The Stack”
IaaS and PaaS Redefining How Security
Controls Are Evaluated and Deployed (and
Who Owns Them)
Security Wants
Automation Too…
•  DevOps wants security
to be:
–  Orchestrable
–  API-driven
–  Automatically assessed
–  Portable
–  Risk-based / appropriate
•  Security wants:
–  Security closer to the
data
–  Lower cost of
Compliance
–  Analyst productivity
–  Better inventory / asset
management
–  More uniformity
–  Faster updates (and
patches)
–  Not to be “Dr No”
…They just might not know it yet
Big	
  Gap	
  Between	
  Desired	
  
State	
  and	
  Security	
  Solu4ons	
  
“As	
  Code”	
  
Core Security 

Building Blocks
•  Identity to determine who (or what) did (or failed to do) something
•  Controls on what privilege users and privilege infrastructure (code)
can do
–  Separation of duties
–  Least privilege
•  Encryption as a tool to separate data
(and secrets) from inappropriate access
–  Privilege Users (internal)
–  Privilege Users (cloud / service provider)
–  Government Agencies
–  Adversaries
•  Logging and Auditing to enable:
–  Granular what, where, when, and how
(and sometimes why)
–  Demonstration of compliance
–  Incident response
Identity
•  Lots of solutions for humans
–  IAM, PIM/PAM, Cloud IAM, etc.
–  APIs and Provisioning becoming
a key platform feature
–  Key focus: He/She Who Can
Deploy (or Un-deploy) is god…
•  Less solutions for systems, services,
processes and things, but evolving
–  UUIDs (or similar) matter 
–  Automation means infrastructure
and code becoming “privileged”
Creden4als	
  To	
  The	
  Produc4on	
  Stack	
  Are	
  Cri4cal!	
  
What Is A Secret
•  m-w.com: kept hidden from others : known to only a few
people
•  Examples of Secrets
–  Password
–  Symmetric Encryption Key
–  Private Encryption Key
–  API Key
–  Token
Important Secret attributes:
•  Where is it stored?
•  Where is it used?
•  Who / what is authorized to use it?
•  What is it authorized to do?
How Not To Protect a
Secret
•  Embed it in source code 
–  Bonus points for posting to Github once its
in there…
•  Put it in a configuration file or script,
next to what the secret opens 
•  Encrypt it with a key embedded in the
code (or script)
Protecting A Secret
Attributes of Securing a Secret (from Conjur)
•  Self-Auditing
•  Fully programmable with fine granularity
•  Highly available across any cloud, hybrid, and global
architecture
•  The secrets should be encrypted when "at rest" in
the secrets server
•  Each secret should be encrypted with a unique key,
which is itself encrypted by a master key (or set of
master keys)
My Addition: Secrets to secrets is a recursive problem…“Distributed”
or “derived” secrets should be granular and less trusted.
•  Cryptography should be profesionally audited, and ideally open-sourced.
•  Secrets should be encrypted in transit, using e.g. TLS
•  SSL verification must be ON!
Secret (and Crypto)
Management Systems
•  DIY (Do It Yourself)
•  Traditional Crypto Key
Managers
–  Definitely for “Keys”
–  But also for other objects
(e.g., KMIP Blobs)
•  Cloud Solutions
–  AWS CloudHSM
–  AWS KMS
–  AWS S3 (+KMS +IAM)
–  Azure Key Vaults…
•  Conjur Secrets
Management 
•  Vault from Hashicorp
•  KeyWhiz (open source
from Square)
•  Barbican (OpenStack)
•  Chef-Vault?
•  And More…
Know	
  Your	
  Capabili4es	
  
and	
  Security	
  Needs	
  
Crypto
•  Powerful tool, but crypto
#fail hurts
– Accidentally destroy a key =
destroy data/value
– Poor implementations easily
breakable
Crypto	
  Allows	
  Your	
  To	
  Put	
  Data	
  In	
  Hos4le	
  
Environment	
  With	
  Near	
  Mathema4cal	
  Reliability…	
  
If	
  Implemented	
  Properly	
  
Key Hierarchies and
Roots of Trust
	
  
	
  
Trust	
  Anchor	
  
(e.g.,	
  HSM,	
  TPM,	
  etc.)	
  	
  
Key	
  Management	
  
Applica=ons	
  	
  
and	
  Workloads	
  
Highest	
  
Assurance	
  
Most
Flexible
Key	
  Management	
  and	
  Assurance	
  Levels	
  MaTer…	
  
Logging and Auditing 
•  Can be boring, but is essential
•  Great starting point to
automate security and
compliance testing
•  DevOps teams better
prepared than anyone—if you
can do a rollback…
•  Capture and maintain key
attributes (6 “W”s)
•  Secure / tamper evident
•  Work with compliance team to
automate reports
Takeaways
•  Find common ground with security on
security and compliance automation
•  Focus on privilege users and
infrastructure
•  If you have a secret, make it secret
– Don’t take crypto lightly…
•  Make security portable
Thanks !

More Related Content

What's hot

The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddleAlert Logic
 
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp VaultCodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp VaultCodiLime
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud Amazon Web Services
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Attack and defense in the public cloud by Robert Wood
Attack and defense in the public cloud by Robert WoodAttack and defense in the public cloud by Robert Wood
Attack and defense in the public cloud by Robert WoodEC-Council
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security StrategyTeri Radichel
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on securityCloudHesive
 
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Amazon Web Services
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAlert Logic
 
Jobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to SecurityJobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to SecurityTheodore Kim
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no tryJames Strong
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Mary Racter
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementMary Racter
 

What's hot (20)

The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen Middle
 
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp VaultCodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Attack and defense in the public cloud by Robert Wood
Attack and defense in the public cloud by Robert WoodAttack and defense in the public cloud by Robert Wood
Attack and defense in the public cloud by Robert Wood
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Jobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to SecurityJobvite: A Holistic Approach to Security
Jobvite: A Holistic Approach to Security
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no try
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret Management
 

Similar to Rugged Building Materials and Creating Agility with Security

Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessToni de la Fuente
 
Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22WesComer2
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsIn the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsGarth Boyd
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeCloudHesive
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upDileep Kalidindi
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementDefconRussia
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Aws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detailAws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detailPawel Rzepa
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive SecurityAndy Hoernecke
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?Ken Johnson
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
Harnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfHarnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfMike Felch
 

Similar to Rugged Building Materials and Creating Agility with Security (20)

Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
 
Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsIn the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implement
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
Aws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detailAws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detail
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
Harnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfHarnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdf
 

Recently uploaded

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Rugged Building Materials and Creating Agility with Security

  • 1. Rugged Building Materials and Creating Agility with Security David Etue (@djetue)
  • 2.
  • 3. Rugged Building Materials •  SecDevOps, Rugged DevOps, DevSecOps, DevOps: Whatever you want to call it, we all need security (and compliance) •  Very little security can exist without asset, configuration and change management •  If we write good code, choose our components wisely, and manage it well, what else is left?
  • 4. “Security” Holding Up DevOps Deployments DevOps: The Worst-Kept Secret to Winning in the Application Economy by CA Technologies, October 2014
  • 5. Security Struggling With Cloud Too… 451  Research  -­‐  Cloud  Compu4ng  Wave  7  
  • 6. Traditional Security Controls Don’t Map Well to Cloud and DevOps Source:  Control  Quo.ent:  Adap.ve  Strategies  For  Gracefully  Losing  Control  (RSA  US  2013)  by  Josh   Corman  and  David  Etue.    
  • 7. Microservices, Agility and Portability Require Focus “Up The Stack” IaaS and PaaS Redefining How Security Controls Are Evaluated and Deployed (and Who Owns Them)
  • 8. Security Wants Automation Too… •  DevOps wants security to be: –  Orchestrable –  API-driven –  Automatically assessed –  Portable –  Risk-based / appropriate •  Security wants: –  Security closer to the data –  Lower cost of Compliance –  Analyst productivity –  Better inventory / asset management –  More uniformity –  Faster updates (and patches) –  Not to be “Dr No” …They just might not know it yet Big  Gap  Between  Desired   State  and  Security  Solu4ons   “As  Code”  
  • 9. Core Security 
 Building Blocks •  Identity to determine who (or what) did (or failed to do) something •  Controls on what privilege users and privilege infrastructure (code) can do –  Separation of duties –  Least privilege •  Encryption as a tool to separate data (and secrets) from inappropriate access –  Privilege Users (internal) –  Privilege Users (cloud / service provider) –  Government Agencies –  Adversaries •  Logging and Auditing to enable: –  Granular what, where, when, and how (and sometimes why) –  Demonstration of compliance –  Incident response
  • 10. Identity •  Lots of solutions for humans –  IAM, PIM/PAM, Cloud IAM, etc. –  APIs and Provisioning becoming a key platform feature –  Key focus: He/She Who Can Deploy (or Un-deploy) is god… •  Less solutions for systems, services, processes and things, but evolving –  UUIDs (or similar) matter –  Automation means infrastructure and code becoming “privileged” Creden4als  To  The  Produc4on  Stack  Are  Cri4cal!  
  • 11. What Is A Secret •  m-w.com: kept hidden from others : known to only a few people •  Examples of Secrets –  Password –  Symmetric Encryption Key –  Private Encryption Key –  API Key –  Token Important Secret attributes: •  Where is it stored? •  Where is it used? •  Who / what is authorized to use it? •  What is it authorized to do?
  • 12. How Not To Protect a Secret •  Embed it in source code –  Bonus points for posting to Github once its in there… •  Put it in a configuration file or script, next to what the secret opens •  Encrypt it with a key embedded in the code (or script)
  • 13. Protecting A Secret Attributes of Securing a Secret (from Conjur) •  Self-Auditing •  Fully programmable with fine granularity •  Highly available across any cloud, hybrid, and global architecture •  The secrets should be encrypted when "at rest" in the secrets server •  Each secret should be encrypted with a unique key, which is itself encrypted by a master key (or set of master keys) My Addition: Secrets to secrets is a recursive problem…“Distributed” or “derived” secrets should be granular and less trusted. •  Cryptography should be profesionally audited, and ideally open-sourced. •  Secrets should be encrypted in transit, using e.g. TLS •  SSL verification must be ON!
  • 14. Secret (and Crypto) Management Systems •  DIY (Do It Yourself) •  Traditional Crypto Key Managers –  Definitely for “Keys” –  But also for other objects (e.g., KMIP Blobs) •  Cloud Solutions –  AWS CloudHSM –  AWS KMS –  AWS S3 (+KMS +IAM) –  Azure Key Vaults… •  Conjur Secrets Management •  Vault from Hashicorp •  KeyWhiz (open source from Square) •  Barbican (OpenStack) •  Chef-Vault? •  And More… Know  Your  Capabili4es   and  Security  Needs  
  • 15. Crypto •  Powerful tool, but crypto #fail hurts – Accidentally destroy a key = destroy data/value – Poor implementations easily breakable Crypto  Allows  Your  To  Put  Data  In  Hos4le   Environment  With  Near  Mathema4cal  Reliability…   If  Implemented  Properly  
  • 16. Key Hierarchies and Roots of Trust     Trust  Anchor   (e.g.,  HSM,  TPM,  etc.)     Key  Management   Applica=ons     and  Workloads   Highest   Assurance   Most Flexible Key  Management  and  Assurance  Levels  MaTer…  
  • 17. Logging and Auditing •  Can be boring, but is essential •  Great starting point to automate security and compliance testing •  DevOps teams better prepared than anyone—if you can do a rollback… •  Capture and maintain key attributes (6 “W”s) •  Secure / tamper evident •  Work with compliance team to automate reports
  • 18. Takeaways •  Find common ground with security on security and compliance automation •  Focus on privilege users and infrastructure •  If you have a secret, make it secret – Don’t take crypto lightly… •  Make security portable
  • 19.