SlideShare a Scribd company logo
1 of 52
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevOps Pipeline Security
How to use AWS to secure your DevOps Pipeline like a bank
Alan Garver AWS Sr. Professional Services Consultant
Chuck Dudley Stelligent Director Financial Services Accounts
Jamie Greco Citi Sr. VP Technical Program Management
FIN303
What to Expect from the Session
• Simple Secure Build Artifact Repository with AWS
• Advanced DevOps Pipeline Concepts
• Static Code Analysis for Infrastructure as Code
• Use AWS Config Rules and AWS Lambda to Monitor Resource Compliance
Technology Challenges in Financial Services
Regulatory
Requirements
Organizational
Boundaries
DEV OPS
Engineering
Monolithic
Applications
Enable Continuous Delivery on the Cloud
Provisioning
Monitoring
CI / CD
Orchestration
Tokenization &
Encryption
• Deploy provisioning tools
• Practice to provision & manage all architecture and data
components (e.g. operating system )
• Implement automated systems to monitor infrastructure and
applications to alert abnormal conditions.
• Align disintegrated tools, people, controls and processes
• Focus on automated builds, orchestration & deployment
capabilities.
• Manage overall orchestration governing different actions and
phases that make up the deployment pipeline (e.g. code check-
in to go-live on cloud)
• Consistent way to protect information
Establish Cloud platform and enable developers to build and rapidly deploy
Journey to Decouple the Mainframe and ESB
& Control Teams
Empower teams to accelerate decision making and delivery
Empowering Teams
DEDICATED
TEAMS
 Organize in 2-pizza teams
 Map capabilities to service owners with
dedicated teams
OWNERSHIP
 Autonomous teams that can build, test and
deploy independently
 Decision making authority for service at team
level
TRANSPARENCY
 Inspection and transparency of the team
performance, service capability and roadmap
 Services are tracked, mapped and managed
via the Service Catalog
Technical
Program
Manager
Accelerating Innovation and Product Delivery
4 DELIVER ON STRATS
BUILD GLOBAL
CLOUD FOUNDATION1
BUILD
MICROSERVICES2
EMPOWER
TEAMS3
 Create operating framework
 Establish design patterns for
microservices
 Build, re-use and extend services
 Test driven development
 Deploy cloud infrastructure
 Establish scale and availability
 Enable continuous
integration/continuous delivery
 Protect Citi information
 Build full stack, autonomous agile,
scrum teams
 Single ownership structure
 Empowered development with
decentralized functions
 Continuous integration / deployment
SPEED, COST & QUALI TY
IMPROVING
The DevOps Pipeline
Continuous Delivery Pipeline
• A secure automated transport mechanism
• Moves a resources from point A to point B
Continuous Delivery Pipeline
• Transports code from development to production
• Tests ensure integrity and validity of the resource
• Resources morph from source, to executable, to
operational
Continuous Delivery Pipeline
• Failures stop the line, and prevent breakages to
production
• Fast feedback provided to the developer
• Customized to your software development lifecycle
AWS CodePipeline
• Quickly model and
configure release stages
• View progress
at-a-glance
• Use your favorite tools
• Integrates with other
AWS services
The Build Artifact Repository
The Build Artifact Repository
Storage of Build Artifacts for later deployment in the pipeline
Why Build Artifact Repository
• Build once, deploy many times
• Version control
• Artifacts available for later deploy events (Scale Up)
• Build Server and Deployed Services don’t need to talk to
each other
Pipeline Build Artifacts
Objects assembled during a build process from code used
for testing and convergence down stream in a pipeline
Chef
Cookbook
Code
.tar
Build
Artifact
# berks vendor
Build
# chef-client
Deploy
Amazon EC2
Instance
Running
System
Examples of Build Artifacts
ruby
python
chef
puppet
Amazon Linux
chocolatey
Simple Artifact Repository with AWS
Build System
Amazon EC2 at launch
Converging Systems
Artifact Repository
Amazon S3 Bucket
1 detect commit
2
build
mvn package
3 publish
s3 put-object
4 launch
ec2 run-instances 
–-user-data
retrieve
s3 get-object
5
Pipeline Build Artifacts Like a Bank
Data Protection Entitlement Integrity
AWS KMS AWS IAM sha256sum
• Generate Data Keys for client side encryption
• Use Server Side Encryption integration with Amazon S3
• Use IAM Roles to grant access to resources
• Implement strict resource policies for S3
Buckets and KMS Keys
• Validate integrity with sha-sum
• Implement sha integrity database
Envelope Encryption with AWS KMS
$> aws kms generate-data-key 
--key-id alias/artifact-demo 
--key-spec AES_256 --output text 
--query [Plaintext,CiphertextBlob]
$> openssl enc -aes-256-cbc -salt 
–in source.tar 
–out encrypted.out 
-k ${Plaintext}
$> tar –czvf artifact.tgz 
encrypted.out 
CiphertextBlob.out
Source
encrypt
KMS
Artifact Repository on AWS with encryption
Build System
Artifact Repository
Amazon S3 Bucket
detect commit
2
build
mvn package
5 launch
ec2 run-instances 
–-user-data
3 encrypt
kms generate-data-key
enc –k Plaintext
Client Side Envelope Encryption
Server Side Encryption
4 publish
s3 put-object 
–-sse aws:kms
1
Entitle Access with Resource Policies
Artifact Repository
Amazon S3 Bucket
Artifact Encryption Key
AWS KMS Customer Master Key
S3 Bucket Policy KMS Key Policy
Entitle Access with Resource Policies
Artifact Repository
Amazon S3 Bucket
Amazon EC2 at launch
Converging Systems
Artifact Encryption Key
AWS KMS Customer Master Key
S3 Bucket Policy KMS Key Policy
retrieve
s3 get-object
1 decrypt
kms decrypt
2
Entitle Access with Resource Policies
Amazon EC2 at launch
Converging Systems
IAM Role
Instance Profile
Entitle Access with Resource Policies
Artifact Repository
Amazon S3 Bucket
Amazon EC2 at launch
Converging Systems
Artifact Encryption Key
AWS KMS Customer Master Key
S3 Bucket Policy KMS Key Policy
retrieve
s3 get-object
1 decrypt
kms decrypt
2
IAM Role
Instance Profile
Validate Artifact Integrity
$> sha256sum mysource
b2f3fb7e84761eac78eb34aaaae2793efb41f23141a31f2c mysource
$> tar –czvf artifact.tgz 
encrypted.out 
sha256sum.out 
CiphertextBlob.out
CiphtertextBlob
KMS
Encrypted
Source
Validate Artifact Integrity
Artifact Repository
Amazon S3 Bucket
1
Artifact Encryption Key
AWS KMS Customer Master Key
3
Amazon EC2 at launch
Converging Systems
retrieve & unpack
s3 get-object
decrypt
kms decrypt
2
verify
${envelope_sum} == $(sha256sum)
4 validate authorization
dynamodb query $(sha256sum)
Authorized Artifacts
Amazon DynamoDB Table
Continuous Delivery Pipeline
• A secure automated transport mechanism
• Moves a resources from point A to point B
Commit Acceptance Capacity Pre-Prod Production
The Stelligent Pipeline
GOAL:
Fast feedback for developers
PIPELINE ACTIONS:
1. Unit Tests
2. Static Code Analysis
Commit Acceptance Capacity Pre-Prod Production
The Commit Stage
GOAL:
Fast feedback for developers
Commit Acceptance Capacity Pre-Prod Production
The Commit Stage
SECURITY TESTS:
1. Security static analysis
of application code
PIPELINE ACTIONS:
1. Unit Tests
2. Static Code Analysis
GOAL:
Fast feedback for developers
Commit Acceptance Capacity Pre-Prod Production
The Commit Stage
SECURITY TESTS:
1. Security static analysis
of application code
2. Security static analysis
of infrastructure code
PIPELINE ACTIONS:
1. Unit Tests
2. Static Code Analysis
Security Static Analysis of CloudFormation
• Security static analysis builds a model of templates in
order to verify compliance with best practices and
organizational standards.
• This can be a powerful tool to stop bad things before
they happen.
• A security organization can define their policy in code
and have all development efforts unambiguously verify
against that standard without manual intervention.
Static Analysis of CloudFormation with cfn-nag
The cfn-nag tool inspects the JSON of a CloudFormation
template before convergence to find patterns that may
indicate:
• Overly permissive IAM policies
• Overly permissive security groups
• Disabled access logs
• Disabled server-side encryption
Demo
GOAL:
Comprehensive testing of the application
and its infrastructure
PIPELINE ACTIONS:
1. Integration Tests
2. Acceptance Tests
Commit Acceptance Capacity Pre-Prod Production
The Acceptance Stage
GOAL:
Comprehensive testing of the application
and its infrastructure
SECURITY TESTS:
1. Infrastructure Analysis
PIPELINE ACTIONS:
1. Integration Tests
2. Acceptance Tests
Commit Acceptance Capacity Pre-Prod Production
The Acceptance Stage
Testing Infrastructure Changes
Problems to solve:
• Prevent infrastructure changes that violate company
security policies.
• Need the ability to codify security rules and get
notifications when violations occur.
• Ability to execute on-demand compliance testing.
Testing Infrastructure Changes
AWS Config solves these problems, but…
• Pipeline enablement can be challenging.
• Console-centric.
config-rule-status
ConfigRuleStatus is an open source tool that enables continuous
monitoring and on-demand testing of security compliance for infrastructure
through the AWS Config service.
How does it solve the problem?
• Sets up AWS Config for resource monitoring.
• Creates Config Rules and Lambda functions to evaluate security compliance.
• Creates a Tester Lambda function that returns aggregated compliance status.
config-rule-status
How should it be used?
• The bundled CLI provides commands for deploying the
tool.
• The Tester Lambda function can be invoked with the
bundled CLI or the AWS CLI.
• Invoke it from a CD pipeline to catch policy violations
before they get to production.
Core Technology
config-rule-status
On-Demand
compliance testing
for AWS Resources
Demo
GOAL:
Test the system under real world conditions
The Capacity Stage
Commit Acceptance Capacity Pre-Prod Production
PIPELINE ACTIONS:
1. Performance Tests
2. Load Tests
GOAL:
Test the system under real world conditions
The Capacity Stage
Commit Acceptance Capacity Pre-Prod Production
PIPELINE ACTIONS:
1. Performance Tests
2. Load Tests
SECURITY TESTS:
1. OWASP ZAP Pen Test
2. OpenSCAP Image Testing
GOAL:
Go / no-go decision for blue/green deployment
PIPELINE ACTIONS:
1. Build Pre-Prod Stack
2. Data Migration
3. Blue/green Deployment
Commit Acceptance Capacity
Pre-Prod Production
The Production Stage
SECURITY ACTIONS:
1. Prevent out-of-band changes
2. Security metrics for feedback
loops
PIPELINE ACTIONS:
1. Build Pre-Prod Stack
2. Data Migration
3. Blue/green Deployment
GOAL:
Go / no-go decision for blue/green deployment
Commit Acceptance Capacity
Pre-Prod Production
The Production Stage
Resources
stelligent.com/fin303
Thank you!
Remember to complete
your evaluations!

More Related Content

Viewers also liked

Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Amazon Web Services
 
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...Amazon Web Services
 
AWS Lambda: Event-driven Code for Devices and the Cloud
AWS Lambda: Event-driven Code for Devices and the CloudAWS Lambda: Event-driven Code for Devices and the Cloud
AWS Lambda: Event-driven Code for Devices and the CloudAmazon Web Services
 
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)Amazon Web Services
 
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...Amazon Web Services
 
AWS Batch: Simplifying Batch Computing in the Cloud
AWS Batch: Simplifying Batch Computing in the CloudAWS Batch: Simplifying Batch Computing in the Cloud
AWS Batch: Simplifying Batch Computing in the CloudAmazon Web Services
 
Managing Your Infrastructure as Code
Managing Your Infrastructure as CodeManaging Your Infrastructure as Code
Managing Your Infrastructure as CodeAmazon Web Services
 
AWS re:Invent 2016: State of the Union: Containers (CON316)
AWS re:Invent 2016: State of the Union:  Containers (CON316)AWS re:Invent 2016: State of the Union:  Containers (CON316)
AWS re:Invent 2016: State of the Union: Containers (CON316)Amazon Web Services
 
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)Amazon Web Services
 
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)Amazon Web Services
 
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar Series
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar SeriesContinuous Delivery with AWS Lambda - AWS April 2016 Webinar Series
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar SeriesAmazon Web Services
 
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...Amazon Web Services
 
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)Amazon Web Services
 
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...Amazon Web Services
 
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...Amazon Web Services
 
Continuous Delivery to Amazon EC2 Container Service
Continuous Delivery to Amazon EC2 Container ServiceContinuous Delivery to Amazon EC2 Container Service
Continuous Delivery to Amazon EC2 Container ServiceAmazon Web Services
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...Amazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
 
AWS January 2016 Webinar Series - Getting Started with Big Data on AWS
AWS January 2016 Webinar Series - Getting Started with Big Data on AWSAWS January 2016 Webinar Series - Getting Started with Big Data on AWS
AWS January 2016 Webinar Series - Getting Started with Big Data on AWSAmazon Web Services
 

Viewers also liked (20)

AWS as a Data Platform
AWS as a Data PlatformAWS as a Data Platform
AWS as a Data Platform
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...
Deep Dive on Microservices and Amazon ECS by Raul Frias, Solutions Architect,...
 
AWS Lambda: Event-driven Code for Devices and the Cloud
AWS Lambda: Event-driven Code for Devices and the CloudAWS Lambda: Event-driven Code for Devices and the Cloud
AWS Lambda: Event-driven Code for Devices and the Cloud
 
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
 
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...
AWS re:Invent 2016: Workshop: Deploy a Swift Web Application on Amazon ECS (C...
 
AWS Batch: Simplifying Batch Computing in the Cloud
AWS Batch: Simplifying Batch Computing in the CloudAWS Batch: Simplifying Batch Computing in the Cloud
AWS Batch: Simplifying Batch Computing in the Cloud
 
Managing Your Infrastructure as Code
Managing Your Infrastructure as CodeManaging Your Infrastructure as Code
Managing Your Infrastructure as Code
 
AWS re:Invent 2016: State of the Union: Containers (CON316)
AWS re:Invent 2016: State of the Union:  Containers (CON316)AWS re:Invent 2016: State of the Union:  Containers (CON316)
AWS re:Invent 2016: State of the Union: Containers (CON316)
 
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)
AWS re:Invent 2016: Configuration Management in the Cloud (DEV305)
 
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)
AWS re:Invent 2016: Development Workflow with Docker and Amazon ECS (CON302)
 
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar Series
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar SeriesContinuous Delivery with AWS Lambda - AWS April 2016 Webinar Series
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar Series
 
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...
AWS re:Invent 2016: Infrastructure Continuous Delivery Using AWS CloudFormati...
 
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)
AWS re:Invent 2016: Automated DevOps and Continuous Delivery (DEV211)
 
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...
AWS re:Invent 2016: Netflix: Container Scheduling, Execution, and Integration...
 
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...
AWS re:Invent 2016: Workshop: Deploy a Deep Learning Framework on Amazon ECS ...
 
Continuous Delivery to Amazon EC2 Container Service
Continuous Delivery to Amazon EC2 Container ServiceContinuous Delivery to Amazon EC2 Container Service
Continuous Delivery to Amazon EC2 Container Service
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
AWS January 2016 Webinar Series - Getting Started with Big Data on AWS
AWS January 2016 Webinar Series - Getting Started with Big Data on AWSAWS January 2016 Webinar Series - Getting Started with Big Data on AWS
AWS January 2016 Webinar Series - Getting Started with Big Data on AWS
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

AWS re:Invent 2016: Use AWS to Secure Your DevOps Pipeline Like a Bank (FIN303 )

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevOps Pipeline Security How to use AWS to secure your DevOps Pipeline like a bank Alan Garver AWS Sr. Professional Services Consultant Chuck Dudley Stelligent Director Financial Services Accounts Jamie Greco Citi Sr. VP Technical Program Management FIN303
  • 2. What to Expect from the Session • Simple Secure Build Artifact Repository with AWS • Advanced DevOps Pipeline Concepts • Static Code Analysis for Infrastructure as Code • Use AWS Config Rules and AWS Lambda to Monitor Resource Compliance
  • 3. Technology Challenges in Financial Services Regulatory Requirements Organizational Boundaries DEV OPS Engineering Monolithic Applications
  • 4.
  • 5. Enable Continuous Delivery on the Cloud Provisioning Monitoring CI / CD Orchestration Tokenization & Encryption • Deploy provisioning tools • Practice to provision & manage all architecture and data components (e.g. operating system ) • Implement automated systems to monitor infrastructure and applications to alert abnormal conditions. • Align disintegrated tools, people, controls and processes • Focus on automated builds, orchestration & deployment capabilities. • Manage overall orchestration governing different actions and phases that make up the deployment pipeline (e.g. code check- in to go-live on cloud) • Consistent way to protect information Establish Cloud platform and enable developers to build and rapidly deploy
  • 6. Journey to Decouple the Mainframe and ESB
  • 7. & Control Teams Empower teams to accelerate decision making and delivery Empowering Teams DEDICATED TEAMS  Organize in 2-pizza teams  Map capabilities to service owners with dedicated teams OWNERSHIP  Autonomous teams that can build, test and deploy independently  Decision making authority for service at team level TRANSPARENCY  Inspection and transparency of the team performance, service capability and roadmap  Services are tracked, mapped and managed via the Service Catalog Technical Program Manager
  • 8. Accelerating Innovation and Product Delivery 4 DELIVER ON STRATS BUILD GLOBAL CLOUD FOUNDATION1 BUILD MICROSERVICES2 EMPOWER TEAMS3  Create operating framework  Establish design patterns for microservices  Build, re-use and extend services  Test driven development  Deploy cloud infrastructure  Establish scale and availability  Enable continuous integration/continuous delivery  Protect Citi information  Build full stack, autonomous agile, scrum teams  Single ownership structure  Empowered development with decentralized functions  Continuous integration / deployment SPEED, COST & QUALI TY IMPROVING
  • 10. Continuous Delivery Pipeline • A secure automated transport mechanism • Moves a resources from point A to point B
  • 11. Continuous Delivery Pipeline • Transports code from development to production • Tests ensure integrity and validity of the resource • Resources morph from source, to executable, to operational
  • 12. Continuous Delivery Pipeline • Failures stop the line, and prevent breakages to production • Fast feedback provided to the developer • Customized to your software development lifecycle
  • 13. AWS CodePipeline • Quickly model and configure release stages • View progress at-a-glance • Use your favorite tools • Integrates with other AWS services
  • 14. The Build Artifact Repository The Build Artifact Repository Storage of Build Artifacts for later deployment in the pipeline
  • 15. Why Build Artifact Repository • Build once, deploy many times • Version control • Artifacts available for later deploy events (Scale Up) • Build Server and Deployed Services don’t need to talk to each other
  • 16. Pipeline Build Artifacts Objects assembled during a build process from code used for testing and convergence down stream in a pipeline Chef Cookbook Code .tar Build Artifact # berks vendor Build # chef-client Deploy Amazon EC2 Instance Running System
  • 17. Examples of Build Artifacts ruby python chef puppet Amazon Linux chocolatey
  • 18. Simple Artifact Repository with AWS Build System Amazon EC2 at launch Converging Systems Artifact Repository Amazon S3 Bucket 1 detect commit 2 build mvn package 3 publish s3 put-object 4 launch ec2 run-instances –-user-data retrieve s3 get-object 5
  • 19. Pipeline Build Artifacts Like a Bank Data Protection Entitlement Integrity AWS KMS AWS IAM sha256sum • Generate Data Keys for client side encryption • Use Server Side Encryption integration with Amazon S3 • Use IAM Roles to grant access to resources • Implement strict resource policies for S3 Buckets and KMS Keys • Validate integrity with sha-sum • Implement sha integrity database
  • 20. Envelope Encryption with AWS KMS $> aws kms generate-data-key --key-id alias/artifact-demo --key-spec AES_256 --output text --query [Plaintext,CiphertextBlob] $> openssl enc -aes-256-cbc -salt –in source.tar –out encrypted.out -k ${Plaintext} $> tar –czvf artifact.tgz encrypted.out CiphertextBlob.out Source encrypt KMS
  • 21. Artifact Repository on AWS with encryption Build System Artifact Repository Amazon S3 Bucket detect commit 2 build mvn package 5 launch ec2 run-instances –-user-data 3 encrypt kms generate-data-key enc –k Plaintext Client Side Envelope Encryption Server Side Encryption 4 publish s3 put-object –-sse aws:kms 1
  • 22. Entitle Access with Resource Policies Artifact Repository Amazon S3 Bucket Artifact Encryption Key AWS KMS Customer Master Key S3 Bucket Policy KMS Key Policy
  • 23. Entitle Access with Resource Policies Artifact Repository Amazon S3 Bucket Amazon EC2 at launch Converging Systems Artifact Encryption Key AWS KMS Customer Master Key S3 Bucket Policy KMS Key Policy retrieve s3 get-object 1 decrypt kms decrypt 2
  • 24. Entitle Access with Resource Policies Amazon EC2 at launch Converging Systems IAM Role Instance Profile
  • 25. Entitle Access with Resource Policies Artifact Repository Amazon S3 Bucket Amazon EC2 at launch Converging Systems Artifact Encryption Key AWS KMS Customer Master Key S3 Bucket Policy KMS Key Policy retrieve s3 get-object 1 decrypt kms decrypt 2 IAM Role Instance Profile
  • 26. Validate Artifact Integrity $> sha256sum mysource b2f3fb7e84761eac78eb34aaaae2793efb41f23141a31f2c mysource $> tar –czvf artifact.tgz encrypted.out sha256sum.out CiphertextBlob.out CiphtertextBlob KMS Encrypted Source
  • 27. Validate Artifact Integrity Artifact Repository Amazon S3 Bucket 1 Artifact Encryption Key AWS KMS Customer Master Key 3 Amazon EC2 at launch Converging Systems retrieve & unpack s3 get-object decrypt kms decrypt 2 verify ${envelope_sum} == $(sha256sum) 4 validate authorization dynamodb query $(sha256sum) Authorized Artifacts Amazon DynamoDB Table
  • 28.
  • 29. Continuous Delivery Pipeline • A secure automated transport mechanism • Moves a resources from point A to point B
  • 30. Commit Acceptance Capacity Pre-Prod Production The Stelligent Pipeline
  • 31. GOAL: Fast feedback for developers PIPELINE ACTIONS: 1. Unit Tests 2. Static Code Analysis Commit Acceptance Capacity Pre-Prod Production The Commit Stage
  • 32. GOAL: Fast feedback for developers Commit Acceptance Capacity Pre-Prod Production The Commit Stage SECURITY TESTS: 1. Security static analysis of application code PIPELINE ACTIONS: 1. Unit Tests 2. Static Code Analysis
  • 33. GOAL: Fast feedback for developers Commit Acceptance Capacity Pre-Prod Production The Commit Stage SECURITY TESTS: 1. Security static analysis of application code 2. Security static analysis of infrastructure code PIPELINE ACTIONS: 1. Unit Tests 2. Static Code Analysis
  • 34. Security Static Analysis of CloudFormation • Security static analysis builds a model of templates in order to verify compliance with best practices and organizational standards. • This can be a powerful tool to stop bad things before they happen. • A security organization can define their policy in code and have all development efforts unambiguously verify against that standard without manual intervention.
  • 35. Static Analysis of CloudFormation with cfn-nag The cfn-nag tool inspects the JSON of a CloudFormation template before convergence to find patterns that may indicate: • Overly permissive IAM policies • Overly permissive security groups • Disabled access logs • Disabled server-side encryption
  • 36. Demo
  • 37. GOAL: Comprehensive testing of the application and its infrastructure PIPELINE ACTIONS: 1. Integration Tests 2. Acceptance Tests Commit Acceptance Capacity Pre-Prod Production The Acceptance Stage
  • 38. GOAL: Comprehensive testing of the application and its infrastructure SECURITY TESTS: 1. Infrastructure Analysis PIPELINE ACTIONS: 1. Integration Tests 2. Acceptance Tests Commit Acceptance Capacity Pre-Prod Production The Acceptance Stage
  • 39. Testing Infrastructure Changes Problems to solve: • Prevent infrastructure changes that violate company security policies. • Need the ability to codify security rules and get notifications when violations occur. • Ability to execute on-demand compliance testing.
  • 40. Testing Infrastructure Changes AWS Config solves these problems, but… • Pipeline enablement can be challenging. • Console-centric.
  • 41. config-rule-status ConfigRuleStatus is an open source tool that enables continuous monitoring and on-demand testing of security compliance for infrastructure through the AWS Config service. How does it solve the problem? • Sets up AWS Config for resource monitoring. • Creates Config Rules and Lambda functions to evaluate security compliance. • Creates a Tester Lambda function that returns aggregated compliance status.
  • 42. config-rule-status How should it be used? • The bundled CLI provides commands for deploying the tool. • The Tester Lambda function can be invoked with the bundled CLI or the AWS CLI. • Invoke it from a CD pipeline to catch policy violations before they get to production.
  • 45. Demo
  • 46. GOAL: Test the system under real world conditions The Capacity Stage Commit Acceptance Capacity Pre-Prod Production PIPELINE ACTIONS: 1. Performance Tests 2. Load Tests
  • 47. GOAL: Test the system under real world conditions The Capacity Stage Commit Acceptance Capacity Pre-Prod Production PIPELINE ACTIONS: 1. Performance Tests 2. Load Tests SECURITY TESTS: 1. OWASP ZAP Pen Test 2. OpenSCAP Image Testing
  • 48. GOAL: Go / no-go decision for blue/green deployment PIPELINE ACTIONS: 1. Build Pre-Prod Stack 2. Data Migration 3. Blue/green Deployment Commit Acceptance Capacity Pre-Prod Production The Production Stage
  • 49. SECURITY ACTIONS: 1. Prevent out-of-band changes 2. Security metrics for feedback loops PIPELINE ACTIONS: 1. Build Pre-Prod Stack 2. Data Migration 3. Blue/green Deployment GOAL: Go / no-go decision for blue/green deployment Commit Acceptance Capacity Pre-Prod Production The Production Stage