SlideShare a Scribd company logo
1 of 28
Download to read offline
Incident Response
Automation
@ Netflix
copypaste
Us.
Members of the Security
Incident Response Team
(SIRT)
Kevin Glisson
Senior Security Engineer
kglisson@netflix.com
Marc Vilanova
Senior Security Engineer
mvilanova@netflix.com
About Netflix.
Teams and individual contributors are given a high degree of freedom
● Ownership of entire of stack
● Central teams provide “paved roads”
A lot of everything
● Environments
● Technologies
Automation.
Focus on high leverage decisions
● Aggressively eliminate decisions that don’t
matter
Consistency is key
● Builds confidence (for everyone)
● Breeds familiarity
Crisis Management
People Resolve Incidents.
We need help; quickly
● Who do I contact? How do I contact them?
Provide known communication channels
● What is this new message, can ignore it? Should I pull the car over?
Set clear expectations
● Why am I here? What do you need me to do?
Incident Ramp.
Getting people engaged and oriented
● Similar to other product based approaches
Leverage existing knowledge and workflows (go to where your customers are)
● In stressful situations, muscle memory is key
Tech.
Piecing it all together.
Slack and Email
Google Docs
Demisto
+ Many More
Hi.
Tech.
Piecing it all together.
Slack and Email
Google Docs
Demisto
+ Many More
Enter text here.
Tech.
Piecing it all together.
Slack and Email
Google Docs
Demisto
+ Many More
Go with the flow.
Digital Forensics and
Incident Response
Technologies
● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3)
Open Source Forensic Artifacts
● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.)
● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.)
Orchestration
● Demisto
Work-in-progress / Future work
● Explore Osquery
● Molehill: Ability to search unstructured data collected during an incident
○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch
Forensic Artifacts Collection
Technologies
● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3)
Open Source Forensic Artifacts
● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.)
● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.)
Orchestration
● Demisto
Work-in-progress / Future work
● Explore Osquery
● Molehill: Ability to search unstructured data collected during an incident
○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch
Forensic Artifacts Collection
Technologies
● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3)
Open Source Forensic Artifacts
● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.)
● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.)
Orchestration
● Demisto
Work-in-progress / Future work
● Explore Osquery
● Molehill: Ability to search unstructured data collected during an incident
○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch
Forensic Artifacts Collection
Forensic Artifacts Collection
App Forensic Acquisition Playbook
Technologies
● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3)
Open Source Forensic Artifacts
● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.)
● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.)
Orchestration
● Demisto
Work-in-progress / Future work
● Explore Osquery
● Molehill: Ability to search unstructured data collected during an incident
○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch
Forensic Artifacts Collection
Technologies
● Python + Boto3 + AWS SSM + LiME kernel module + AWS EBS
Orchestration
● Demisto
Memory Forensics
Acquisition
● Spinnaker pipeline that builds and publishes LiME modules to our artifactory
● Triggers on every unstable foundation AMI build
Memory Forensics
Acquisition
Technologies
● Python + Boto3 + AWS SSM + LiME kernel module + AWS EBS
Orchestration
● Demisto
Memory Forensics
Acquisition
Memory Forensics
Acquisition Playbook
Memory Forensics
Acquisition Playbook
Technologies
● Python + Volatility Framework (as a library) = sirt-mem-analysis
○ Allows us to run a set of plugins 6x faster than via command line
Work-in-progress / Future work
● Explore Rekall as an alternative to Volatility
● Explore Titus¹ for parallelizing analysis
Memory Forensics
Analysis
¹ Netflix Cloud Container Runtime Platform
Technologies
● Python + Volatility Framework (as a library)
○ Allows us to run a set of plugins 6x faster than via command line
Work-in-progress / Future work
● Explore Rekall as an alternative to Volatility
● Explore Titus¹ for parallelizing analysis
Memory Forensics
Analysis
¹ Netflix Cloud Container Runtime Platform
● Container Forensics
● Process Forensics
○ Extended Core File Snapshot (ECFS)
Future Work
● Delegation wins the day
○ Through communication with peers/SMEs
○ Through automation
● There is no one “solution”
○ Organizations are radically different; remove decisions empower people.
Key Takeaways

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

What's hot (20)

Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Splunk Artificial Intelligence & Machine Learning Webinar
Splunk Artificial Intelligence & Machine Learning WebinarSplunk Artificial Intelligence & Machine Learning Webinar
Splunk Artificial Intelligence & Machine Learning Webinar
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Sharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkSharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK Framework
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Monitoring As a Service
Monitoring As a ServiceMonitoring As a Service
Monitoring As a Service
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
 

Similar to Incident Response Automation @ Netflix Q12019

Rook: Storage for Containers in Containers – data://disrupted® 2020
Rook: Storage for Containers in Containers  – data://disrupted® 2020Rook: Storage for Containers in Containers  – data://disrupted® 2020
Rook: Storage for Containers in Containers – data://disrupted® 2020
data://disrupted®
 
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at ScaleUsing AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
Data Works MD
 

Similar to Incident Response Automation @ Netflix Q12019 (20)

Nelson: Rigorous Deployment for a Functional World
Nelson: Rigorous Deployment for a Functional WorldNelson: Rigorous Deployment for a Functional World
Nelson: Rigorous Deployment for a Functional World
 
Machine learning in cybersecutiry
Machine learning in cybersecutiryMachine learning in cybersecutiry
Machine learning in cybersecutiry
 
Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2
 
NetflixOSS Meetup season 3 episode 2
NetflixOSS Meetup season 3 episode 2NetflixOSS Meetup season 3 episode 2
NetflixOSS Meetup season 3 episode 2
 
Native cloud security monitoring
Native cloud security monitoringNative cloud security monitoring
Native cloud security monitoring
 
Netflix Open Source: Building a Distributed and Automated Open Source Program
Netflix Open Source:  Building a Distributed and Automated Open Source ProgramNetflix Open Source:  Building a Distributed and Automated Open Source Program
Netflix Open Source: Building a Distributed and Automated Open Source Program
 
Building a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at NetflixBuilding a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at Netflix
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
 
QConSF18 - Disenchantment: Netflix Titus, its Feisty Team, and Daemons
QConSF18 - Disenchantment: Netflix Titus, its Feisty Team, and DaemonsQConSF18 - Disenchantment: Netflix Titus, its Feisty Team, and Daemons
QConSF18 - Disenchantment: Netflix Titus, its Feisty Team, and Daemons
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
NetflixOSS Meetup season 3 episode 1
NetflixOSS Meetup season 3 episode 1NetflixOSS Meetup season 3 episode 1
NetflixOSS Meetup season 3 episode 1
 
Triangle Devops Meetup 10/2015
Triangle Devops Meetup 10/2015Triangle Devops Meetup 10/2015
Triangle Devops Meetup 10/2015
 
Rook: Storage for Containers in Containers – data://disrupted® 2020
Rook: Storage for Containers in Containers  – data://disrupted® 2020Rook: Storage for Containers in Containers  – data://disrupted® 2020
Rook: Storage for Containers in Containers – data://disrupted® 2020
 
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at ScaleUsing AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
 
Event sourcing and CQRS: Lessons from the trenches
Event sourcing and CQRS: Lessons from the trenchesEvent sourcing and CQRS: Lessons from the trenches
Event sourcing and CQRS: Lessons from the trenches
 
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
 
OpenStack Security Project
OpenStack Security ProjectOpenStack Security Project
OpenStack Security Project
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Incident Response Automation @ Netflix Q12019

  • 2. Us. Members of the Security Incident Response Team (SIRT) Kevin Glisson Senior Security Engineer kglisson@netflix.com Marc Vilanova Senior Security Engineer mvilanova@netflix.com
  • 3. About Netflix. Teams and individual contributors are given a high degree of freedom ● Ownership of entire of stack ● Central teams provide “paved roads” A lot of everything ● Environments ● Technologies
  • 4. Automation. Focus on high leverage decisions ● Aggressively eliminate decisions that don’t matter Consistency is key ● Builds confidence (for everyone) ● Breeds familiarity
  • 6. People Resolve Incidents. We need help; quickly ● Who do I contact? How do I contact them? Provide known communication channels ● What is this new message, can ignore it? Should I pull the car over? Set clear expectations ● Why am I here? What do you need me to do?
  • 7. Incident Ramp. Getting people engaged and oriented ● Similar to other product based approaches Leverage existing knowledge and workflows (go to where your customers are) ● In stressful situations, muscle memory is key
  • 8. Tech. Piecing it all together. Slack and Email Google Docs Demisto + Many More
  • 9. Hi.
  • 10. Tech. Piecing it all together. Slack and Email Google Docs Demisto + Many More
  • 12. Tech. Piecing it all together. Slack and Email Google Docs Demisto + Many More
  • 13. Go with the flow.
  • 15. Technologies ● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3) Open Source Forensic Artifacts ● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.) ● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.) Orchestration ● Demisto Work-in-progress / Future work ● Explore Osquery ● Molehill: Ability to search unstructured data collected during an incident ○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch Forensic Artifacts Collection
  • 16. Technologies ● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3) Open Source Forensic Artifacts ● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.) ● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.) Orchestration ● Demisto Work-in-progress / Future work ● Explore Osquery ● Molehill: Ability to search unstructured data collected during an incident ○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch Forensic Artifacts Collection
  • 17. Technologies ● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3) Open Source Forensic Artifacts ● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.) ● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.) Orchestration ● Demisto Work-in-progress / Future work ● Explore Osquery ● Molehill: Ability to search unstructured data collected during an incident ○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch Forensic Artifacts Collection
  • 18. Forensic Artifacts Collection App Forensic Acquisition Playbook
  • 19. Technologies ● Python + Boto3 + AWS Systems Manager (SSM) + AWS Simple Storage Service (S3) Open Source Forensic Artifacts ● ForensicArtifacts Definitions (e.g. ConfigFiles, UnixCommon, Linux, etc.) ● Others (e.g. /usr/bin/ec2metadata, /usr/bin/printenv, /usr/bin/dpkg -l, etc.) Orchestration ● Demisto Work-in-progress / Future work ● Explore Osquery ● Molehill: Ability to search unstructured data collected during an incident ○ Evaluating AWS Elasticsearch, AWS Glue + Athena, AWS CloudSearch Forensic Artifacts Collection
  • 20. Technologies ● Python + Boto3 + AWS SSM + LiME kernel module + AWS EBS Orchestration ● Demisto Memory Forensics Acquisition
  • 21. ● Spinnaker pipeline that builds and publishes LiME modules to our artifactory ● Triggers on every unstable foundation AMI build Memory Forensics Acquisition
  • 22. Technologies ● Python + Boto3 + AWS SSM + LiME kernel module + AWS EBS Orchestration ● Demisto Memory Forensics Acquisition
  • 25. Technologies ● Python + Volatility Framework (as a library) = sirt-mem-analysis ○ Allows us to run a set of plugins 6x faster than via command line Work-in-progress / Future work ● Explore Rekall as an alternative to Volatility ● Explore Titus¹ for parallelizing analysis Memory Forensics Analysis ¹ Netflix Cloud Container Runtime Platform
  • 26. Technologies ● Python + Volatility Framework (as a library) ○ Allows us to run a set of plugins 6x faster than via command line Work-in-progress / Future work ● Explore Rekall as an alternative to Volatility ● Explore Titus¹ for parallelizing analysis Memory Forensics Analysis ¹ Netflix Cloud Container Runtime Platform
  • 27. ● Container Forensics ● Process Forensics ○ Extended Core File Snapshot (ECFS) Future Work
  • 28. ● Delegation wins the day ○ Through communication with peers/SMEs ○ Through automation ● There is no one “solution” ○ Organizations are radically different; remove decisions empower people. Key Takeaways