How to be your Security Team's Best Friend

Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
How to be your Security
Team’s Best Friend
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Talk Agenda
1. Introduction
2. CIS Critical Security Controls
3. More Security Thoughts
Standard Disclaimer: The opinions expressed in this talk are my own and do
not represent the views of my employer.
Non-Standard Disclaimer: I hope you like cat photos.
2
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
About Me
PAST
CURRENT
CONTACT
3
● UNIX SysAdmin/Operations background
● Transitioned to Security Incident Response/Security Research
● Senior Security Engineer at
● Mentor for SANS’ Women’s CyberTalent Immersion Academy
● Twitter: @unixgeekem
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
4
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
The CIS Critical Security Controls
● Industry consensus guidelines
● 3 types: Basic, Foundational, and Organizational1
5
1. #TeamOxfordComma
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
6
Not
Rocket
Science
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
7
Hardware Inventory
#1:
Hardware /
Asset
Inventory
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 1: Inventory and Control of Hardware Assets
Questions you need to answer about your hardware:
● Network Access Control - how do you know what’s on your network?
● Automation - how do you keep your assets in a known state?
● Asset Management - how do you keep track of assets?
○ No, saying “a spreadsheet” or “a database” doesn’t count
8
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Shadow IT
9
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
10
Software Inventory #2:
Software
Inventory
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 2: Inventory and Control of Software Assets
Questions you need to answer about your software:
● What software is on your systems?
● Who installed the software?
● What does the software do?
11
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Track Expiration Dates Too
● Software Licenses
● Domains
● SSL Certificates
Don’t be this site
12
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Vulnerability Management
13
#3:
Continuous
Vulnerability
Management
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 3: Continuous Vulnerability Management: Scanning
● Logos create buzz!
● Scan early, scan often
● Scan from inside and outside your perimeter
14
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
15
A digression: Threat + Vulnerability = Risk
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 3: Continuous Vulnerability Management: Patching
● Understand your risks, and remediate the serious vulnerabilities.
○ Highest risk first is the best practice
● Use your automation to ensure updates are applied everywhere.
○ Though maybe you test first before you upgrade Python/Ruby in
your Production environment...
16
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
17
#4:
Control
Admin
Privileges
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 4: Controlled Use of Admin Privileges
● Separate out admin accounts from user accounts if you can.
● Use groups or roles.
● Consider functional names for your groups.
○ “sec-logging-read-only” is more informative than “logging”
18
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
19
#5:
Secure
Default
Configs
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 5: Secure Configuration for Hardware and Software on Mobile
Devices, Laptops, Workstations, and Servers
● Base your secure configs on a security standard.
● Use Automation/Configuration Management tools to enforce security.
○ Make sure changes are known and tracked (Change Management)
● Regularly evaluate the security of your Gold Images.
● Start with user directives, then automate them as your company
evolves.
20
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
21
#6:
Log All
the
Things,
and
Review
the Logs
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
● Log all the things.
○ Systems, security devices, applications, access points
● Outbound traffic is always interesting.
● Collect all your logs somewhere and review them.
○ Side rant: SIEM, the buzzword
22
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Plus 14 More
● Email and Web Browser Protections
● Malware Defenses
● Limitation and Control of Network Ports,
Protocols, and Services
● Data Recovery Capabilities
● Secure Configuration for Network Devices,
such as Firewalls, Routers, and Switches
● Boundary Defense
● Data Protection
23
● Controlled Access Based on the Need to
Know
● Wireless Access Control
● Account Monitoring and Control
● Implement a Security Awareness and
Training Program
● Application Software Security
● Incident Response and Management
● Penetration Tests and Red Team Exercises
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Data Protection: it’s been in the news a
lot lately
24
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Think before you check into GitHub
So many interesting things can be found in publicly-available GitHub repositories:
● Hardcoded passwords
● AWS Keys
● SSH Keys
● PGP Private Keys
● Internal hostnames
25
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Think AFTER you check into GitHub
So you’ve checked in some sensitive information?
● If you commit over it, it’s still in your commit
history.
● Remove that commit.
● Rotate those credentials.
● Use TruffleHog to search for any remaining
sensitive data in your old commits.
26
P.S. May 25th is Towel Day
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Remember those S3 Buckets
● AWS now sets S3 Buckets to be private by default.
● Amazon Macie monitors S3 to find insecure buckets.
● Bucket names are important too.
○ S3 bucket names are unique, and it’s easy to enumerate the names.
Hackers may guess that important data is stored in buckets whose
names start with Prod, or with your company name.
27
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
But Wait, There’s More
28
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security Mindset
In QA, and when you’re trying to think like a user, you say “what would an ignorant user
do?” and you click on everything and put in weird inputs.
In Security, you say “what would a malicious user do?” and once again you click on
everything and put in weird inputs (these may have control characters, encrypted content,
or code in them too), and you think about what a hacker might do if she got an odd or
inconsistent result, or if she tried to change a form or an input URL. When you try to
anticipate all the ways that your software and technologies can be manipulated, that’s an
example of the security mindset.
29
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Passwords: please use them (or passphrases)
Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental.
What if there was a company that didn’t set a root password for their
databases…
What if there was a company that didn’t change default credentials to the
admin interface of their website…
What if there was a company that let everyone ssh in as root…
30
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security and Technical Debt
Like logging, security is harder to do well when you’re adding it on after the
fact.
“I’ll set up logging later” - will management let you fix that later if they don’t
agree it’s important to work on logging now?
31
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security technical debt is not friendly credit card
debt. Security technical debt is the kind where the
debt collector mails you a piece of someone
precious to you as a reminder when a payment is
overdue. --unixorn on Hangops
32
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Some other good Security Practices
● Use secure coding principles (OWASP can help define these).
○ Remember to sanitize those inputs (aka Data Validation)
● Build security tests into your CI/CD pipeline.
● External reviewers can find things you miss.
● Diverse teammates bring different perspectives.
● Everyone clicks on things they shouldn’t. Don’t blame the people.
33
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
TL;DR - Ops probably already is your security team’s best friend.
You’re already doing most of the
things I discussed, right? If not,
please consider doing them. Your
security team will thank you.
34
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Thank you
35
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Got Questions?
● #devopsdays on Twitter
● @unixgeekem on Twitter
● @unixgeekem on Hangops
36
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
References
● CIS Critical Security Controls: https://www.cisecurity.org/controls/
● NIST 800-53 Framework: https://nvd.nist.gov/800-53
● https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/
● Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA
● Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4
● truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog
● Security Training: https://www.sans.org/
● GDPR Info: http://gdprandyou.ie/
● OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project
● Cat images from pexels.com
37
1 of 37

Recommended

LISA18 - How to be your Security Team's Best Friend by
LISA18 - How to be your Security Team's Best FriendLISA18 - How to be your Security Team's Best Friend
LISA18 - How to be your Security Team's Best FriendEmilyGladstoneCole
250 views42 slides
IntroSec Con - Building Your Blue Team Arsenal - glitch by
IntroSec Con - Building Your Blue Team Arsenal - glitchIntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitchJasonRomero21
902 views20 slides
How to get the best out of DevSecOps - an operations perspective by
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveColin Domoney
112 views42 slides
Bug Bounties and The Path to Secure Software by 451 Research by
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchHackerOne
705 views22 slides
DevSecOps at Agile 2019 by
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
509 views64 slides
How GitLab and HackerOne help organizations innovate faster without compromis... by
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...HackerOne
6.9K views28 slides

More Related Content

What's hot

The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers by
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com
87 views20 slides
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je... by
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon
679 views32 slides
Continuous security testing - sharing responsibility by
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityVodqaBLR
235 views37 slides
AllDayDevOps Security Chaos Engineering 2019 by
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 Aaron Rinehart
434 views85 slides
Devops Indonesia - DevSecOps - The Open Source Way by
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayYusuf Hadiwinata Sutandar
1.7K views60 slides
Building a (Really) Secure Cloud Product by
Building a (Really) Secure Cloud ProductBuilding a (Really) Secure Cloud Product
Building a (Really) Secure Cloud ProductGuy K. Kloss
752 views36 slides

What's hot(20)

The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers by DevOps.com
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
DevOps.com87 views
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je... by DevSecCon
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon679 views
Continuous security testing - sharing responsibility by VodqaBLR
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
VodqaBLR235 views
AllDayDevOps Security Chaos Engineering 2019 by Aaron Rinehart
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019
Aaron Rinehart434 views
Building a (Really) Secure Cloud Product by Guy K. Kloss
Building a (Really) Secure Cloud ProductBuilding a (Really) Secure Cloud Product
Building a (Really) Secure Cloud Product
Guy K. Kloss752 views
OWASP AppSec Global 2019 Security & Chaos Engineering by Aaron Rinehart
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos Engineering
Aaron Rinehart243 views
Securing an NGINX deployment for K8s by DevOps Indonesia
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
DevOps Indonesia140 views
Threat modeling with architectural risk patterns by Stephen de Vries
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
Stephen de Vries3K views
New Era of Software with modern Application Security (v0.6) by Dinis Cruz
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)
Dinis Cruz2.4K views
Pivotal APJ Security Chaos Engineering by Aaron Rinehart
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos Engineering
Aaron Rinehart144 views
DevSecOps Days Istanbul 2020 Security Chaos Engineering by Aaron Rinehart
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
Aaron Rinehart56 views
What Every Developer And Tester Should Know About Software Security by Anne Oikarinen
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen793 views
To boldly go where no one has gone before: life after the DevSecOps transform... by Jakub "Kuba" Sendor
To boldly go where no one has gone before: life after the DevSecOps transform...To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling) by Dinis Cruz
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Dinis Cruz769 views
PyConPL 2017 - with python: security by Piotr Dyba
PyConPL 2017 - with python: securityPyConPL 2017 - with python: security
PyConPL 2017 - with python: security
Piotr Dyba795 views
The Log4Shell Vulnerability – explained: how to stay secure by Kaspersky
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Kaspersky1.2K views
AllDayDevOps 2019 AppSensor by jtmelton
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensor
jtmelton98 views
AllTheTalks Security Chaos Engineering by Aaron Rinehart
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
Aaron Rinehart250 views

Similar to How to be your Security Team's Best Friend

Security by Design: An Introduction to Drupal Security by
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecurityTara Arnold
50 views28 slides
Security by design: An Introduction to Drupal Security by
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecurityMediacurrent
1.5K views28 slides
Making Security Agile - Oleg Gryb by
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybSeniorStoryteller
768 views30 slides
19BCP072_Presentation_Final.pdf by
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdfKunjJoshi14
16 views30 slides
Agile Secure Development by
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
829 views30 slides
Security and DevOps are Really Best Friends by
Security and DevOps are Really Best FriendsSecurity and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsEmilyGladstoneCole
205 views47 slides

Similar to How to be your Security Team's Best Friend(20)

Security by Design: An Introduction to Drupal Security by Tara Arnold
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
Tara Arnold50 views
Security by design: An Introduction to Drupal Security by Mediacurrent
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
Mediacurrent1.5K views
19BCP072_Presentation_Final.pdf by KunjJoshi14
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
KunjJoshi1416 views
Agile Secure Development by Bosnia Agile
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
Bosnia Agile829 views
Dev Ops & Secops & Bears, oh my! by Dwolla
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!
Dwolla114 views
Break up the Monolith: Testing Microservices by Marcus Merrell
Break up the Monolith: Testing MicroservicesBreak up the Monolith: Testing Microservices
Break up the Monolith: Testing Microservices
Marcus Merrell263 views
LoginCat - Zero Trust Integrated Cybersecurity by Rohit Kapoor
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor227 views
HIS 2017 Paul Sherwood- towards trustable software by jamieayre
HIS 2017 Paul Sherwood- towards trustable software HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software
jamieayre343 views
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker by Jorge Orchilles
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerDEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
Jorge Orchilles794 views
Adversary Driven Defense in the Real World by James Wickett
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
James Wickett695 views
Security Champions - Introduce them in your Organisation by Ives Laaf
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
Ives Laaf332 views
O365Engage17 - Protecting O365 Data in a Modern World by NCCOMMS
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
NCCOMMS215 views
8.8 Las Vegas - Adversary Emulation con C2 Matrix by Jorge Orchilles
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
Jorge Orchilles334 views
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015 by Cory Scott
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Cory Scott4.2K views

Recently uploaded

Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 slides
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
16 views29 slides
Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
298 views92 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
53 views46 slides
Piloting & Scaling Successfully With Microsoft Viva by
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
12 views160 slides

Recently uploaded(20)

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software257 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10237 views

How to be your Security Team's Best Friend

  • 1. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 How to be your Security Team’s Best Friend
  • 2. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Talk Agenda 1. Introduction 2. CIS Critical Security Controls 3. More Security Thoughts Standard Disclaimer: The opinions expressed in this talk are my own and do not represent the views of my employer. Non-Standard Disclaimer: I hope you like cat photos. 2
  • 3. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 About Me PAST CURRENT CONTACT 3 ● UNIX SysAdmin/Operations background ● Transitioned to Security Incident Response/Security Research ● Senior Security Engineer at ● Mentor for SANS’ Women’s CyberTalent Immersion Academy ● Twitter: @unixgeekem
  • 4. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 4
  • 5. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 The CIS Critical Security Controls ● Industry consensus guidelines ● 3 types: Basic, Foundational, and Organizational1 5 1. #TeamOxfordComma
  • 6. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 6 Not Rocket Science
  • 7. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 7 Hardware Inventory #1: Hardware / Asset Inventory
  • 8. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 1: Inventory and Control of Hardware Assets Questions you need to answer about your hardware: ● Network Access Control - how do you know what’s on your network? ● Automation - how do you keep your assets in a known state? ● Asset Management - how do you keep track of assets? ○ No, saying “a spreadsheet” or “a database” doesn’t count 8
  • 9. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Shadow IT 9
  • 10. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 10 Software Inventory #2: Software Inventory
  • 11. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 2: Inventory and Control of Software Assets Questions you need to answer about your software: ● What software is on your systems? ● Who installed the software? ● What does the software do? 11
  • 12. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Track Expiration Dates Too ● Software Licenses ● Domains ● SSL Certificates Don’t be this site 12
  • 13. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Vulnerability Management 13 #3: Continuous Vulnerability Management
  • 14. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 3: Continuous Vulnerability Management: Scanning ● Logos create buzz! ● Scan early, scan often ● Scan from inside and outside your perimeter 14
  • 15. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 15 A digression: Threat + Vulnerability = Risk
  • 16. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 3: Continuous Vulnerability Management: Patching ● Understand your risks, and remediate the serious vulnerabilities. ○ Highest risk first is the best practice ● Use your automation to ensure updates are applied everywhere. ○ Though maybe you test first before you upgrade Python/Ruby in your Production environment... 16
  • 17. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 17 #4: Control Admin Privileges
  • 18. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 4: Controlled Use of Admin Privileges ● Separate out admin accounts from user accounts if you can. ● Use groups or roles. ● Consider functional names for your groups. ○ “sec-logging-read-only” is more informative than “logging” 18
  • 19. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 19 #5: Secure Default Configs
  • 20. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers ● Base your secure configs on a security standard. ● Use Automation/Configuration Management tools to enforce security. ○ Make sure changes are known and tracked (Change Management) ● Regularly evaluate the security of your Gold Images. ● Start with user directives, then automate them as your company evolves. 20
  • 21. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 21 #6: Log All the Things, and Review the Logs
  • 22. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs ● Log all the things. ○ Systems, security devices, applications, access points ● Outbound traffic is always interesting. ● Collect all your logs somewhere and review them. ○ Side rant: SIEM, the buzzword 22
  • 23. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Plus 14 More ● Email and Web Browser Protections ● Malware Defenses ● Limitation and Control of Network Ports, Protocols, and Services ● Data Recovery Capabilities ● Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches ● Boundary Defense ● Data Protection 23 ● Controlled Access Based on the Need to Know ● Wireless Access Control ● Account Monitoring and Control ● Implement a Security Awareness and Training Program ● Application Software Security ● Incident Response and Management ● Penetration Tests and Red Team Exercises
  • 24. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Data Protection: it’s been in the news a lot lately 24
  • 25. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Think before you check into GitHub So many interesting things can be found in publicly-available GitHub repositories: ● Hardcoded passwords ● AWS Keys ● SSH Keys ● PGP Private Keys ● Internal hostnames 25
  • 26. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Think AFTER you check into GitHub So you’ve checked in some sensitive information? ● If you commit over it, it’s still in your commit history. ● Remove that commit. ● Rotate those credentials. ● Use TruffleHog to search for any remaining sensitive data in your old commits. 26 P.S. May 25th is Towel Day
  • 27. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Remember those S3 Buckets ● AWS now sets S3 Buckets to be private by default. ● Amazon Macie monitors S3 to find insecure buckets. ● Bucket names are important too. ○ S3 bucket names are unique, and it’s easy to enumerate the names. Hackers may guess that important data is stored in buckets whose names start with Prod, or with your company name. 27
  • 28. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 But Wait, There’s More 28
  • 29. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security Mindset In QA, and when you’re trying to think like a user, you say “what would an ignorant user do?” and you click on everything and put in weird inputs. In Security, you say “what would a malicious user do?” and once again you click on everything and put in weird inputs (these may have control characters, encrypted content, or code in them too), and you think about what a hacker might do if she got an odd or inconsistent result, or if she tried to change a form or an input URL. When you try to anticipate all the ways that your software and technologies can be manipulated, that’s an example of the security mindset. 29
  • 30. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Passwords: please use them (or passphrases) Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental. What if there was a company that didn’t set a root password for their databases… What if there was a company that didn’t change default credentials to the admin interface of their website… What if there was a company that let everyone ssh in as root… 30
  • 31. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security and Technical Debt Like logging, security is harder to do well when you’re adding it on after the fact. “I’ll set up logging later” - will management let you fix that later if they don’t agree it’s important to work on logging now? 31
  • 32. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security technical debt is not friendly credit card debt. Security technical debt is the kind where the debt collector mails you a piece of someone precious to you as a reminder when a payment is overdue. --unixorn on Hangops 32
  • 33. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Some other good Security Practices ● Use secure coding principles (OWASP can help define these). ○ Remember to sanitize those inputs (aka Data Validation) ● Build security tests into your CI/CD pipeline. ● External reviewers can find things you miss. ● Diverse teammates bring different perspectives. ● Everyone clicks on things they shouldn’t. Don’t blame the people. 33
  • 34. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 TL;DR - Ops probably already is your security team’s best friend. You’re already doing most of the things I discussed, right? If not, please consider doing them. Your security team will thank you. 34
  • 35. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Thank you 35
  • 36. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Got Questions? ● #devopsdays on Twitter ● @unixgeekem on Twitter ● @unixgeekem on Hangops 36
  • 37. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 References ● CIS Critical Security Controls: https://www.cisecurity.org/controls/ ● NIST 800-53 Framework: https://nvd.nist.gov/800-53 ● https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/ ● Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA ● Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4 ● truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog ● Security Training: https://www.sans.org/ ● GDPR Info: http://gdprandyou.ie/ ● OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project ● Cat images from pexels.com 37