SlideShare a Scribd company logo
1 of 15
Securing our Cloud DevOps Cycle
Ahmed Abugharbia
Security Practitioner and SANS Instructor
3
$whoami
• CDW:
→ Security, Incident Handling, DevOps/DevSecOps
and Cloud technologies
• Instructor, SANS Institute
→ Teaching SEC540 and SEC534
• Based in Chicago
• Contact information
→ Email: ahmed.abugharbia@gmail.com
→ Linkedin: https://www.linkedin.com/in/ahmadabugharbieh/
→ Website: https://cyberdojo.cloud
• Ahmed Abugharbia
 DevOps
 DevOps Tools
 DevSecOps and Cloud Security
 Demo
Agenda
4
• DevOps combines Development and
Operations
• Requires a different culture
• Requires many tools
• Requires different skills
• How is that related to Cloud Security?
5
DevOps – Introduction
• No manual changes in Cloud
• Infrastructure as Code
• Cloudformation, Terraform
• Configuration as Code
• Ansible, Chef, Puppet
• Containers
• Dockerfile
• Application
• Java, Python, C++, etc
• Documentation
• Terraform-docs -> Readme.md
• Tests
• Unit tests, integration tests, security test
• Deployment Scripts
• Jenkins Groovy, YAML
6
DevOps – Everything as Code
7
DevOps – Tools
Engineers and AI
are producing code
Code is stored and
managed in SCM
An orchestrator Manages
the deployment pipelines
External Secret Managers
can be used
Cloud infrastructure is
built/updated
Question:
How can Jenkins access
the cloud?
• Can run in a containerized environment
• BuildSpec is written in YAML
• Can receive parameters as inputs
• Stages
• Manages and runs needed commands and
scripts
• Pipelines are attached to SCM
repositories
• Monitor for changes in a specific branch.
Mostly main
8
DevOps – AWS CodePipelines
DevOps – AWS CodePipelines
9
• The VS Code supports many security plugins, a few
examples:
• Semgrep/DevSkim/Puma Scan
• Checkov/CFN Nag
• SonarLint/ESLint
• Hadolint
• InSpec
• Open Policy Agent
• Allows engineers to detect security issues as
they are being created
• Plugins require the original tools to be installed
on the dev station
• It might be a good practice to create a
“development environment"
10
DevSecOps – IDE Security Plugins
• Static Analysis tools scan flat files for
security issues
• We must consider the technology stack
• Security tools must be:
• Fast
• Able to run headless
• Able to generate an automation-friendly output
• JSON, JUNIT, XML, etc.
• Tools:
• Cfn_nag
• Terrasec
• Hadolint
• Semgrep
• Owasp Dependency-Check
11
DevSecOps – Static Code Analysis
• Scan running applications
• Interact with the applications
• GNU vs Headless
• Time consuming
• Resources hungry
• Special skills are needed
• Many options out there
• SQLMap
• OWASP ZAP
• BURP Suite
• Arachni
12
DevSecOps – Dynamic Security Testing
• Store secrets encrypted
• Secrets can be:
• Passwords, Private keys, certificates, API
Keys, Configuration
• Jenkins has a “Credentials Plugin”
• Many free Open-Source options
• Vault OSS, Conjur OSS
• Cloud Providers have their own
implementations
• AWS KMS, AWS SSM Parameter Store,
Azure Key Vault
• Can be a target for attackers
13
DevSecOps – Secrets Management
• Cloud Providers offer many services for
monitoring, detection and response
• CloudWatch can be used to detect certain
events
• AWS Lambdas can be used to respond to a
certain detection
• There are free open-source solutions out
there
• Cloud Custodian
• We can design out own
• Can all be designed as Infrastructure as Code
14
DevSecOps – Continuous Monitoring
Thank you!

More Related Content

Similar to Ahmed Abugharbia - Securing Cloud DevOps Cycle.pptx

BYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFiBYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFi
DataWorks Summit
 
OpenShift Origin: Build a PaaS Just Like Red Hats
OpenShift Origin: Build a PaaS Just Like Red HatsOpenShift Origin: Build a PaaS Just Like Red Hats
OpenShift Origin: Build a PaaS Just Like Red Hats
Mark Atwood
 

Similar to Ahmed Abugharbia - Securing Cloud DevOps Cycle.pptx (20)

Aleksei Dremin - Application Security Pipeline - phdays9
Aleksei Dremin - Application Security Pipeline - phdays9Aleksei Dremin - Application Security Pipeline - phdays9
Aleksei Dremin - Application Security Pipeline - phdays9
 
Greenfields tech decisions
Greenfields tech decisionsGreenfields tech decisions
Greenfields tech decisions
 
Campus days Azure HDInsight automation
Campus days Azure HDInsight automationCampus days Azure HDInsight automation
Campus days Azure HDInsight automation
 
java in cloud - adopt cloud dev's DHARMA
java in cloud - adopt cloud dev's DHARMAjava in cloud - adopt cloud dev's DHARMA
java in cloud - adopt cloud dev's DHARMA
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?
 
BYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFiBYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFi
 
ContainerDayVietnam2016: Docker at scale with Mesos
ContainerDayVietnam2016: Docker at scale with MesosContainerDayVietnam2016: Docker at scale with Mesos
ContainerDayVietnam2016: Docker at scale with Mesos
 
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
Ten Commandments of Secure Coding - OWASP Top Ten Proactive ControlsTen Commandments of Secure Coding - OWASP Top Ten Proactive Controls
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
 
Apereo OAE - Bootcamp
Apereo OAE - BootcampApereo OAE - Bootcamp
Apereo OAE - Bootcamp
 
DevOps Security: A New Paradigm
DevOps Security: A New ParadigmDevOps Security: A New Paradigm
DevOps Security: A New Paradigm
 
Automating security tests for Continuous Integration
Automating security tests for Continuous IntegrationAutomating security tests for Continuous Integration
Automating security tests for Continuous Integration
 
we45 DEFCON Workshop - Building AppSec Automation with Python
we45 DEFCON Workshop - Building AppSec Automation with Pythonwe45 DEFCON Workshop - Building AppSec Automation with Python
we45 DEFCON Workshop - Building AppSec Automation with Python
 
How Serverless Changes DevOps
How Serverless Changes DevOpsHow Serverless Changes DevOps
How Serverless Changes DevOps
 
Middleware in Golang: InVision's Rye
Middleware in Golang: InVision's RyeMiddleware in Golang: InVision's Rye
Middleware in Golang: InVision's Rye
 
Webcast: DevOps in AWS is different! How can containers help?
Webcast: DevOps in AWS is different! How can containers help? Webcast: DevOps in AWS is different! How can containers help?
Webcast: DevOps in AWS is different! How can containers help?
 
OpenShift Origin: Build a PaaS Just Like Red Hats
OpenShift Origin: Build a PaaS Just Like Red HatsOpenShift Origin: Build a PaaS Just Like Red Hats
OpenShift Origin: Build a PaaS Just Like Red Hats
 
Cloud for agile_sw_projects-final
Cloud for agile_sw_projects-finalCloud for agile_sw_projects-final
Cloud for agile_sw_projects-final
 
Smart Platform Infrastructure with AWS
Smart Platform Infrastructure with AWSSmart Platform Infrastructure with AWS
Smart Platform Infrastructure with AWS
 
Continuous Deployment with Containers
Continuous Deployment with ContainersContinuous Deployment with Containers
Continuous Deployment with Containers
 

More from AWS Chicago

More from AWS Chicago (20)

AWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user group
 
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
 
WilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxWilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptx
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
 
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaStreamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Ross Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxRoss Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptx
 
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfrobsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Mohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxMohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptx
 
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxNick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
 
Pat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfPat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdf
 
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
 
MichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxMichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptx
 
Michal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfMichal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdf
 
Kamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxKamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptx
 
John Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxJohn Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptx
 
JuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxJuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptx
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Ahmed Abugharbia - Securing Cloud DevOps Cycle.pptx

  • 1.
  • 2. Securing our Cloud DevOps Cycle Ahmed Abugharbia Security Practitioner and SANS Instructor
  • 3. 3 $whoami • CDW: → Security, Incident Handling, DevOps/DevSecOps and Cloud technologies • Instructor, SANS Institute → Teaching SEC540 and SEC534 • Based in Chicago • Contact information → Email: ahmed.abugharbia@gmail.com → Linkedin: https://www.linkedin.com/in/ahmadabugharbieh/ → Website: https://cyberdojo.cloud • Ahmed Abugharbia
  • 4.  DevOps  DevOps Tools  DevSecOps and Cloud Security  Demo Agenda 4
  • 5. • DevOps combines Development and Operations • Requires a different culture • Requires many tools • Requires different skills • How is that related to Cloud Security? 5 DevOps – Introduction
  • 6. • No manual changes in Cloud • Infrastructure as Code • Cloudformation, Terraform • Configuration as Code • Ansible, Chef, Puppet • Containers • Dockerfile • Application • Java, Python, C++, etc • Documentation • Terraform-docs -> Readme.md • Tests • Unit tests, integration tests, security test • Deployment Scripts • Jenkins Groovy, YAML 6 DevOps – Everything as Code
  • 7. 7 DevOps – Tools Engineers and AI are producing code Code is stored and managed in SCM An orchestrator Manages the deployment pipelines External Secret Managers can be used Cloud infrastructure is built/updated Question: How can Jenkins access the cloud?
  • 8. • Can run in a containerized environment • BuildSpec is written in YAML • Can receive parameters as inputs • Stages • Manages and runs needed commands and scripts • Pipelines are attached to SCM repositories • Monitor for changes in a specific branch. Mostly main 8 DevOps – AWS CodePipelines
  • 9. DevOps – AWS CodePipelines 9
  • 10. • The VS Code supports many security plugins, a few examples: • Semgrep/DevSkim/Puma Scan • Checkov/CFN Nag • SonarLint/ESLint • Hadolint • InSpec • Open Policy Agent • Allows engineers to detect security issues as they are being created • Plugins require the original tools to be installed on the dev station • It might be a good practice to create a “development environment" 10 DevSecOps – IDE Security Plugins
  • 11. • Static Analysis tools scan flat files for security issues • We must consider the technology stack • Security tools must be: • Fast • Able to run headless • Able to generate an automation-friendly output • JSON, JUNIT, XML, etc. • Tools: • Cfn_nag • Terrasec • Hadolint • Semgrep • Owasp Dependency-Check 11 DevSecOps – Static Code Analysis
  • 12. • Scan running applications • Interact with the applications • GNU vs Headless • Time consuming • Resources hungry • Special skills are needed • Many options out there • SQLMap • OWASP ZAP • BURP Suite • Arachni 12 DevSecOps – Dynamic Security Testing
  • 13. • Store secrets encrypted • Secrets can be: • Passwords, Private keys, certificates, API Keys, Configuration • Jenkins has a “Credentials Plugin” • Many free Open-Source options • Vault OSS, Conjur OSS • Cloud Providers have their own implementations • AWS KMS, AWS SSM Parameter Store, Azure Key Vault • Can be a target for attackers 13 DevSecOps – Secrets Management
  • 14. • Cloud Providers offer many services for monitoring, detection and response • CloudWatch can be used to detect certain events • AWS Lambdas can be used to respond to a certain detection • There are free open-source solutions out there • Cloud Custodian • We can design out own • Can all be designed as Infrastructure as Code 14 DevSecOps – Continuous Monitoring