SlideShare a Scribd company logo
COMPLIANCE
AS
CODE
EBRU CUCEN
@ebrucucen 2019/02/11
WHO AM I?
▸ DevOps Consultant at Contino,
spent 11 years of 16 years of
career in consulting financial
institutions delivering
applications/platforms

Banksoft, AXA, BUPA, Investec,
VanquisBank, LloydsBank
▸ Life time student, with more
questions than answers,
developer in heart, loves APIs,
automation, cloud/hybrid
solutions, vegan, mum…
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
AGENDA
PART I
1. Compliance
2. Compliance On Azure
‣ Data Sources
‣ Metrics/Logs
‣ Monitoring
‣ Log Analytics
PART II
3. Governance on Azure
‣ Security Center
‣ BluePrints
4. AzSK
‣ CI/CD
‣ Customize
@ebrucucen 2019/02/11
THIS TALK IS NOT
▸ By a security expert
▸ a personal experience/battles with the Operations/
Security/Risk teams
▸ About saving money
▸ almost every solution will incur cost
@ebrucucen 2019/02/11
I. COMPLIANCE
CONFORMING TO A RULE, SUCH AS A
SPECIFICATION, POLICY, STANDARD OR LAW
@ebrucucen 2019/02/11
COMPLIANCE CHALLENGES
▸ Data Protection Compliance
▸ Risk assessment, auditing, operations, technology
▸ Industrial regulations and standards <> tech knowledge
▸ Multi-device/cloud/
▸ Cost:
▸ >200 updates from 750 regulatory bodies
▸ 32% of companies spend >4h/w to create/amend reports











Human effort required for organisational compliance
@ebrucucen 2019/02/11
COMPLIANCE ON CLOUD?
▸ Azure Complied with Shared Responsibility Model
▸ Azure
“MORE CERTIFICATIONS THAN ANY OTHER CLOUD PROVIDER”
@ebrucucen 2019/02/11
AZURE SUPPORT
▸ Documents
▸ Audit Reports
▸ Data Protection Guides
▸ Azure Security and Compliance BluePrints
https://servicetrust.microsoft.com/ViewPage/BlueprintOverview

http://aka.ms/pciblueprint

https://docs.microsoft.com/en-us/azure/security/blueprints/pcidss-paaswa-overview#compliance-documentation
Government Blueprints

FedRAMP Blueprint

UK OFFICIAL Blueprint

NIST SP 800-171 Blueprint

AU-PROTECTED

Additional Frameworks
Finance Blueprints



FFIEC Blueprint

PCI-DSS Blueprint
Healthcare Blueprints



HIPAA / HITRUST Blueprint

UK NHS Blueprint
Retail Blueprints



PCI-DSS Blueprint
Customer Responsibility Matrix

Reference Architecture

Implementation Matrix

Overview

Threat Model
Data Analytics/Data Warehouse/IAAS/PAAS
@ebrucucen 2019/02/11
QUICK INSIGHT
▸ What does PCI-DSS BluePrint look like?
http://aka.ms/pciblueprint
@ebrucucen 2019/02/11
II. AZURE BASICS FOR COMPLIANCE DATA
@ebrucucen 2019/02/11
Azure MonitorData Sources
@ebrucucen 2019/02/11
▸ Are collected at regular intervals
▸ One minute by default
▸ Unique: Category = Metric + Namespace
▸ Stored for 93 days
▸ Multi-dimensional
▸ Properties [up to 10]
▸ Resource
▸ Type of Measurement
▸ Value
▸ Time
DATA SOURCES - METRICS
@ebrucucen 2019/02/11
▸ Properties
▸ Irregular
▸ Stored for x days
▸ Metrics -> Logs
▸ Types
▸ Control/Management Plane
▸ Data Plane
▸ Processed Events
DATA SOURCES - LOGS
@ebrucucen 2019/02/11
▸ Properties
▸ Irregular
▸ Stored for x days
▸ Metrics -> Logs
▸ Types
▸ Control/Management Plane
▸ Data Plane
▸ Processed Events
DATA SOURCES - LOGS
Audit Logs
Azure Tenant
Metrics
Application
Azure Subscription
Service Health
Activity Logs
Azure Resources
Diagnostic Logs
Monitoring Solutions
Guest OS
Application Insights
Dependency Agent
Log Analytics Agent
Diagnostics Extension
Azure
Custom API
Data Collector API
Non-Azure
Service Configuration
@ebrucucen 2019/02/11
AZURE AD LOGS
▸ Editions: Basic, Free, Premium P1, Premium P2
▸ Diagnostics Settings
▸ Audit Logs
▸ Sign-in Logs (PP2)
▸ Security Signals (opt-in IPC)
▸ Users at risk
▸ Risky sign-ins
▸ Activity Data is available 2 hours after turning on reporting
▸ 30 days of retention reports (PP1/PP2)
▸ 30/90 days of retention of security signals (PP1/PP2)
@ebrucucen 2019/02/11
AZURE SERVICES
AZURE PLATFORM
@ebrucucen 2019/02/11
VIRTUAL MACHINES
APPLICATIONS
@ebrucucen 2019/02/11
LOG ANALYTICS
▸ Kusto query language
@ebrucucen 2019/02/11
LOG ANALYTICS WORKSPACE
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
SOLUTIONS TO QUERY
@ebrucucen 2019/02/11
▸ Low Latency (min 1 min interval)
▸ Control over metric condition
▸ Combined monitoring of multiple metrics
▸ Modular notification system
▸ Tip: Unify your alerts/sampling intervals for sanity
ALERTS (NEW)
@ebrucucen 2019/02/11
DEMO
▸ WebApp & VM
▸ Metrics/Logs
▸ Query
▸ Alert
@ebrucucen 2019/02/11
PART II
@ebrucucen 2019/02/11
SECURITY
@ebrucucen 2019/02/11
SECURITY
DON’T YOU DARE!
@ebrucucen 2019/02/11
SECURE?
✓ Data Protection
✓ Identity and Access Management
✓ Network Security
✓ Threat Protection
✓ Security Management
https://www.cisecurity.org/benchmark/azure/
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
AZURE SPACE COVERED
@ebrucucen 2019/02/11
AZURE SECURITY CENTRE
https://www.gartner.com/reviews/market/cloud-workload-protection-platforms/vendors
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
COMPLIANCE DASHBOARD
@ebrucucen 2019/02/11
SECURITY CENTRE
▸ One Step Closer to Automation
@ebrucucen 2019/02/11
DEMO
▸ Security Dashboard
▸ Issues
▸ Recommendations
@ebrucucen 2019/02/11
AZURE MANAGEMENT/GOVERNANCE
▸ How to do Compliance As Code with Azure
@ebrucucen 2019/02/11
MANAGEMENT GROUPS
@ebrucucen 2019/02/11
RESOURCE GRAPH
where type =~ 'Microsoft.Compute/virtualMachines'
| project name, properties.storageProfile.osDisk.osType
| top 5 by name desc
Search-AzGraph -Query "project tags | summarize buildschema(tags)”
# Use Resource Graph to get all NICs and store in the 'nic' variable
az graph query -q "where type =~ 'Microsoft.Compute/virtualMachines' | project nic =
tostring(properties['networkProfile']['networkInterfaces'][0]['id']) | where isnotempty(nic) | distinct nic |
limit 20" --output table | tail -n +3 > nics.txt
# Review the output of the query stored in 'nics.txt'
cat nics.txt
# Use Resource Graph with the 'nics.txt' file to get all related public IP addresses and store in 'publicIp.txt'
file
az graph query -q="where type =~ 'Microsoft.Network/networkInterfaces' | where id in ('$(awk -vORS="','" '{print
$0}' nics.txt | sed 's/,$//')') | project publicIp = tostring(properties['ipConfigurations'][0]['properties']
['publicIPAddress']['id']) | where isnotempty(publicIp) | distinct publicIp" --output table | tail -n +3 > ips.txt
# Review the output of the query stored in 'ips.txt'
cat ips.txt
# Use Resource Graph with the 'ips.txt' file to get the IP address of the public IP address resources
az graph query -q="where type =~ 'Microsoft.Network/publicIPAddresses' | where id in ('$(awk -vORS="','" '{print
$0}' ips.txt | sed 's/,$//')') | project ip = tostring(properties['ipAddress']) | where isnotempty(ip) | distinct
ip" --output table
ALL VM PUBLIC IPS: (AZ CLI)
ALL TAG NAMES: (POWERSHELL)
FIRST 5 VM OS TYPES: (KUSTO QUERY*)
https://docs.microsoft.com/en-us/azure/kusto/query/index
@ebrucucen 2019/02/11
▸ Enforce
▸ ASC on?
▸ Level of compliance?
▸ Threat detection/protection?
▸ Monitoring and auditing on?
▸ Network Security
▸ JIT and NSG for everything
▸ Adaptive Application Controls
▸ SIEM?
▸ WAF (Tested)?
▸ Integrate other sec tools (IPS/IDS/HIPS/Other)
POLICY (SET)
WHAT?
PAAS?
IAAS?
NETWORK?
HOW?
IDENTITY & ACCESS
MANAGEMENT?
DATA & ENCRYPTION?
AUDIT DEPLOY APPENDDENY
@ebrucucen 2019/02/11
BLUEPRINTS
@ebrucucen 2019/02/11
AZURE MANAGEMENT/GOVERNANCE
@ebrucucen 2019/02/11
HOW TO PIPELINE?
@ebrucucen 2019/02/11
SECURE PIPELINE?
APPLICATION
CI/CD
NIGHTLY
TEST RUNS
Static code analysis
Code Review
WI Linking
Static Code Analysis
OSS Vulnerability Scan
Unit Tests
Code Metrics
Passive Pen Test
SSL Scanner

Infrastructure Scan
Infrastructure Scan
Load and Performance Testing
Automated Regression Testing
Infrastructure Scan
Active Pen Test
Infrastructure Scan
LOCAL/

PR CI DEV TEST
FEEDBACK
Code Review Comments

Static Code Rules Warnings
OSS Library Vulnerabilities

OSS Licence Violations

Failed Unit Testing

Static Code Rule Warnings
Pen Test Issues

SSL Issues

Performance Issues

Regression Issues
Pen Test Issues

Infrastructure Issues
@ebrucucen 2019/02/11
SECURE PIPELINE?
APPLICATION
CI/CD
NIGHTLY
TEST RUNS
Static code analysis
Code Review
WI Linking
Static Code Analysis
OSS Vulnerability Scan
Unit Tests
Code Metrics
Passive Pen Test
SSL Scanner

Infrastructure Scan
Infrastructure Scan
Load and Performance Testing
Automated Regression Testing
Infrastructure Scan
Active Pen Test
Infrastructure Scan
LOCAL/

PR CI DEV TEST
FEEDBACK
Code Review Comments

Static Code Rules Warnings
OSS Library Vulnerabilities

OSS Licence Violations

Failed Unit Testing

Static Code Rule Warnings
Pen Test Issues

SSL Issues

Performance Issues

Regression Issues
Pen Test Issues

Infrastructure Issues
POLICY
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
AZ-SK
@ebrucucen 2019/02/11
AZSK - OVERVIEW
▸ Requires SPN / OMS
▸ Runs Default policies
▸ Creates a Log/PDF Report for each execution
▸ Generates Manual/AutoFix scripts
@ebrucucen 2019/02/11
DEMO: AZSK
▸ Set up Policy Configuration
▸ CI/CD
▸ Check ARM Template
▸ Security Verification Test
@ebrucucen 2019/02/11
CONTINUOUS ASSURANCE
@ebrucucen 2019/02/11
CONTINUOUS ASSURANCE
@ebrucucen 2019/02/11
PLAN B -DEMO FAILS
▸ GSS
@ebrucucen 2019/02/11
@ebrucucen 2019/02/11
PLAN B - #3 CI/CD
@ebrucucen 2019/02/11
▸ IOP
PLAN B -DEMO FAILS
@ebrucucen 2019/02/11
PLAN B: DEMO FAILS CI/CD
@ebrucucen 2019/02/11
EXTRAS: WEB APP - BEST PRACTICES
▸ Use Certs
▸ Authenticate users (with)
▸ Advanced auth
▸ Configure TLS mutual auth
▸ Managed Identity
▸ Reference secrets from Key Vault
▸ Restrict IPs
▸ Turn on Web Server/Application Logging
▸ Automate Backups
https://docs.microsoft.com/en-us/azure/app-service/web-sites-purchase-ssl-web-site
@ebrucucen 2019/02/11
EXTRAS: HARDENING VM
▸ Control VM access
▸ Reduce variability in your setup and
deployment of VMs
▸ Secure privileged access
▸ Use multiple VMs for better availability
▸ Protect against malware
▸ Keep VMs current
▸ Deploy and test a backup solution
▸ Encrypt your virtual hard disk files
https://docs.microsoft.com/en-us/azure/security/azure-security-iaas
@ebrucucen 2019/02/11
EXTRAS: HARDENING IDENTITY MANAGEMENT


Protect privileged accounts with MFA
1. Strengthen your credentials.
2. Reduce your attack surface area.
3. Automate threat response.
4. Increase your awareness of auditing
and monitoring.
5. Enable more predictable and complete
end-user security with self-help
https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps
@ebrucucen 2019/02/11
EXTRAS: IDENTITY MANAGEMENT BEST PRACTICES
1. Treat Identity as the primary security perimeter
2. Centralise Identity Management
3. Enable SSO
4. Turn on Conditional Access
5. Enforce MFA
6. Use RBAC
7. Lower exposure of privileged accounts (JIT, 2 EmergencyAccess)
8. Actively monitor for suspicious activities
@ebrucucen 2019/02/11
EXTRAS: NETWORK SECURITY BEST PRACTICES
1. Logically segment subnets
2. Control routing behaviour
3. Enable forced tunnelling
4. Use virtual network appliances
5. Deploy perimeter network for security zones
6. Avoid exposure to Internet with dedicated WAN links
7. Optimise uptime and performance
8. Disable RDP/SSH to VMs
@ebrucucen 2019/02/11
EXTRAS: THREAT MODELLING
Threat Security property Potential Azure platform mitigation
Spoofing Authentication Require HTTPS connections.
Tampering Integrity
Validate SSL/TLS certificates.Applications that use SSL/TLS must fully
verify the X.509 certificates of the entities they connect to. Use Azure
Key Vault certificates to manage your x509 certificates.
Repudiation Non-repudiation Enable Azure monitoring and diagnostics.
Information
Disclosure
Confidentiality Encrypt sensitive data at rest and in transit.
Denial of
Service
Availability
Monitor performance metrics for potential denial of service conditions.
Implement connection filters. Azure DDoS protection combined with
application design best practices provides defense against DDoS
attacks.
Elevation of
Privilege
Authorization Use Azure Active Directory Privileged Identity Management.
@ebrucucen 2019/02/11
REFERENCES - BOOKS
▸ Microsoft Security Center

https://www.amazon.co.uk/Microsoft-Azure-Security-Center-Practices-ebook/
dp/B07D5J97JV
▸ Pentesting Azure Applications

https://www.amazon.co.uk/Pentesting-Azure-Definitive-Attack-Defense/dp/
1593278632
▸ Deep dive Presentation:

https://www.sans.org/cyber-security-summit/archives/file/summit-
archive-1540308627.pdf
▸ AZSK: 

https://github.com/azsk/DevOpsKit-docs
▸ Security White Papers

https://docs.microsoft.com/en-us/azure/security/security-white-papers
@ebrucucen 2019/02/11
BRK3062 - Architecting Security and Governance Across your Azure Subscriptions
THR2291 - Secure architecting for Azure
BRK2368 - Practical guide for using Azure Security Center to protect hybrid cloud environment
BRK3384 - Best practices for protecting modern cloud application architectures
BRK2021 - Azure security & management
THR3085 - The wizarding world of Microsoft CloudApp Security
GS008 - Microsoft security: How the cloud helps us all be more secure
REFERENCES - VIDEOS IGNITE/2018
@ebrucucen 2019/02/11
SO AS A SUMMARY
▸ Enable Security Center
▸ Enable all the logs you can
▸ Automate your policy management: Think AZSK!
▸ Give AppDevs freedom on the ring fenced cloud!
@ebrucucen 2019/02/11
QUESTIONS?
@ebrucucen 2019/02/11
QUESTIONS?
THANK YOU

More Related Content

What's hot

Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Synopsys Software Integrity Group
 
Moving Data Efficiently with Real-Time Streaming
Moving Data Efficiently with Real-Time StreamingMoving Data Efficiently with Real-Time Streaming
Moving Data Efficiently with Real-Time Streaming
WSO2
 
Driving a PHP Application with MultiValue Data
Driving a PHP Application with MultiValue DataDriving a PHP Application with MultiValue Data
Driving a PHP Application with MultiValue Data
Rocket Software
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShift
Kangaroot
 
Pivotal Cloud Foundry 2.4: A First Look
Pivotal Cloud Foundry 2.4: A First LookPivotal Cloud Foundry 2.4: A First Look
Pivotal Cloud Foundry 2.4: A First Look
VMware Tanzu
 
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEAAchieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
NGINX, Inc.
 
12-Factor Apps
12-Factor Apps12-Factor Apps
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Perforce
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
Sonatype
 
APIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & ManagementAPIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & Management
NGINX, Inc.
 
DevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBMDevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBM
atSistemas
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Denim Group
 
Architecting for now & the future with NGINX London April 19
Architecting for now & the future with NGINX London April 19Architecting for now & the future with NGINX London April 19
Architecting for now & the future with NGINX London April 19
NGINX, Inc.
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
NGINX, Inc.
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
NGINX, Inc.
 
Barbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackBarbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackjarito030506
 
Perforce Innovations Showcase 
Perforce Innovations Showcase Perforce Innovations Showcase 
Perforce Innovations Showcase 
Perforce
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
VMware Tanzu
 

What's hot (20)

Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
 
Moving Data Efficiently with Real-Time Streaming
Moving Data Efficiently with Real-Time StreamingMoving Data Efficiently with Real-Time Streaming
Moving Data Efficiently with Real-Time Streaming
 
Driving a PHP Application with MultiValue Data
Driving a PHP Application with MultiValue DataDriving a PHP Application with MultiValue Data
Driving a PHP Application with MultiValue Data
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShift
 
Pivotal Cloud Foundry 2.4: A First Look
Pivotal Cloud Foundry 2.4: A First LookPivotal Cloud Foundry 2.4: A First Look
Pivotal Cloud Foundry 2.4: A First Look
 
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEAAchieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
 
12-Factor Apps
12-Factor Apps12-Factor Apps
12-Factor Apps
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
APIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & ManagementAPIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & Management
 
DevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBMDevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBM
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Architecting for now & the future with NGINX London April 19
Architecting for now & the future with NGINX London April 19Architecting for now & the future with NGINX London April 19
Architecting for now & the future with NGINX London April 19
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 
DevOps Presentation
DevOps PresentationDevOps Presentation
DevOps Presentation
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
 
Barbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackBarbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStack
 
Perforce Innovations Showcase 
Perforce Innovations Showcase Perforce Innovations Showcase 
Perforce Innovations Showcase 
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 

Similar to Compliance As Code

SplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security NinjitsuSplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security Ninjitsu
Splunk
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Priyanka Aash
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 
Kubernetes from the Ground Up
Kubernetes from the Ground UpKubernetes from the Ground Up
Kubernetes from the Ground Up
Dustin Humphries
 
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
Ashnikbiz
 
Live Coding 12 Factor App
Live Coding 12 Factor AppLive Coding 12 Factor App
Live Coding 12 Factor App
Emily Jiang
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
Splunk
 
DevOps Powered by Splunk
DevOps Powered by SplunkDevOps Powered by Splunk
DevOps Powered by Splunk
Splunk
 
Flight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at DocusignFlight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at Docusign
Synopsys Software Integrity Group
 
batbern43 Events - Lessons learnt building an Enterprise Data Bus
batbern43 Events - Lessons learnt building an Enterprise Data Busbatbern43 Events - Lessons learnt building an Enterprise Data Bus
batbern43 Events - Lessons learnt building an Enterprise Data Bus
BATbern
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
Splunk
 
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
VMware Tanzu
 
DevSecCon singapore 2019 Kunal Relan
DevSecCon singapore 2019 Kunal RelanDevSecCon singapore 2019 Kunal Relan
DevSecCon singapore 2019 Kunal Relan
Kunal Relan
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
Splunk und Multi-Cloud
Splunk und Multi-CloudSplunk und Multi-Cloud
Splunk und Multi-Cloud
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Building 12-factor Cloud Native Microservices
Building 12-factor Cloud Native MicroservicesBuilding 12-factor Cloud Native Microservices
Building 12-factor Cloud Native Microservices
Jakarta_EE
 
(Micro?)services architecture in practice
(Micro?)services architecture in practice(Micro?)services architecture in practice
(Micro?)services architecture in practice
The Software House
 

Similar to Compliance As Code (20)

SplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security NinjitsuSplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security Ninjitsu
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Kubernetes from the Ground Up
Kubernetes from the Ground UpKubernetes from the Ground Up
Kubernetes from the Ground Up
 
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Live Coding 12 Factor App
Live Coding 12 Factor AppLive Coding 12 Factor App
Live Coding 12 Factor App
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
 
DevOps Powered by Splunk
DevOps Powered by SplunkDevOps Powered by Splunk
DevOps Powered by Splunk
 
Flight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at DocusignFlight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at Docusign
 
batbern43 Events - Lessons learnt building an Enterprise Data Bus
batbern43 Events - Lessons learnt building an Enterprise Data Busbatbern43 Events - Lessons learnt building an Enterprise Data Bus
batbern43 Events - Lessons learnt building an Enterprise Data Bus
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
 
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
 
DevSecCon singapore 2019 Kunal Relan
DevSecCon singapore 2019 Kunal RelanDevSecCon singapore 2019 Kunal Relan
DevSecCon singapore 2019 Kunal Relan
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
 
Splunk und Multi-Cloud
Splunk und Multi-CloudSplunk und Multi-Cloud
Splunk und Multi-Cloud
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Building 12-factor Cloud Native Microservices
Building 12-factor Cloud Native MicroservicesBuilding 12-factor Cloud Native Microservices
Building 12-factor Cloud Native Microservices
 
(Micro?)services architecture in practice
(Micro?)services architecture in practice(Micro?)services architecture in practice
(Micro?)services architecture in practice
 

More from Ebru Cucen Çüçen

Evolution of Graph Algorithms – Benefits and Challenges
Evolution of Graph Algorithms – Benefits and ChallengesEvolution of Graph Algorithms – Benefits and Challenges
Evolution of Graph Algorithms – Benefits and Challenges
Ebru Cucen Çüçen
 
How to Decentralise Controls (Hint: BDD on Policies)
How to Decentralise Controls (Hint: BDD on Policies)How to Decentralise Controls (Hint: BDD on Policies)
How to Decentralise Controls (Hint: BDD on Policies)
Ebru Cucen Çüçen
 
Observability
ObservabilityObservability
Observability
Ebru Cucen Çüçen
 
Observability
ObservabilityObservability
Observability
Ebru Cucen Çüçen
 
Ebru cucen cloudnativeconference_20190925
Ebru cucen cloudnativeconference_20190925Ebru cucen cloudnativeconference_20190925
Ebru cucen cloudnativeconference_20190925
Ebru Cucen Çüçen
 
GCP - 101
GCP - 101GCP - 101
DevOps
DevOpsDevOps
Automating AWS And Azure Resources with Octopus Deploy
Automating AWS And Azure Resources with Octopus DeployAutomating AWS And Azure Resources with Octopus Deploy
Automating AWS And Azure Resources with Octopus Deploy
Ebru Cucen Çüçen
 
CI/CD Pipeline with Octopus Deploy
CI/CD Pipeline with Octopus DeployCI/CD Pipeline with Octopus Deploy
CI/CD Pipeline with Octopus Deploy
Ebru Cucen Çüçen
 
Azure WebApp Deployment Slots
Azure WebApp Deployment Slots Azure WebApp Deployment Slots
Azure WebApp Deployment Slots
Ebru Cucen Çüçen
 

More from Ebru Cucen Çüçen (10)

Evolution of Graph Algorithms – Benefits and Challenges
Evolution of Graph Algorithms – Benefits and ChallengesEvolution of Graph Algorithms – Benefits and Challenges
Evolution of Graph Algorithms – Benefits and Challenges
 
How to Decentralise Controls (Hint: BDD on Policies)
How to Decentralise Controls (Hint: BDD on Policies)How to Decentralise Controls (Hint: BDD on Policies)
How to Decentralise Controls (Hint: BDD on Policies)
 
Observability
ObservabilityObservability
Observability
 
Observability
ObservabilityObservability
Observability
 
Ebru cucen cloudnativeconference_20190925
Ebru cucen cloudnativeconference_20190925Ebru cucen cloudnativeconference_20190925
Ebru cucen cloudnativeconference_20190925
 
GCP - 101
GCP - 101GCP - 101
GCP - 101
 
DevOps
DevOpsDevOps
DevOps
 
Automating AWS And Azure Resources with Octopus Deploy
Automating AWS And Azure Resources with Octopus DeployAutomating AWS And Azure Resources with Octopus Deploy
Automating AWS And Azure Resources with Octopus Deploy
 
CI/CD Pipeline with Octopus Deploy
CI/CD Pipeline with Octopus DeployCI/CD Pipeline with Octopus Deploy
CI/CD Pipeline with Octopus Deploy
 
Azure WebApp Deployment Slots
Azure WebApp Deployment Slots Azure WebApp Deployment Slots
Azure WebApp Deployment Slots
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Compliance As Code

  • 2. @ebrucucen 2019/02/11 WHO AM I? ▸ DevOps Consultant at Contino, spent 11 years of 16 years of career in consulting financial institutions delivering applications/platforms
 Banksoft, AXA, BUPA, Investec, VanquisBank, LloydsBank ▸ Life time student, with more questions than answers, developer in heart, loves APIs, automation, cloud/hybrid solutions, vegan, mum… @ebrucucen 2019/02/11
  • 3. @ebrucucen 2019/02/11 AGENDA PART I 1. Compliance 2. Compliance On Azure ‣ Data Sources ‣ Metrics/Logs ‣ Monitoring ‣ Log Analytics PART II 3. Governance on Azure ‣ Security Center ‣ BluePrints 4. AzSK ‣ CI/CD ‣ Customize
  • 4. @ebrucucen 2019/02/11 THIS TALK IS NOT ▸ By a security expert ▸ a personal experience/battles with the Operations/ Security/Risk teams ▸ About saving money ▸ almost every solution will incur cost
  • 5. @ebrucucen 2019/02/11 I. COMPLIANCE CONFORMING TO A RULE, SUCH AS A SPECIFICATION, POLICY, STANDARD OR LAW
  • 6. @ebrucucen 2019/02/11 COMPLIANCE CHALLENGES ▸ Data Protection Compliance ▸ Risk assessment, auditing, operations, technology ▸ Industrial regulations and standards <> tech knowledge ▸ Multi-device/cloud/ ▸ Cost: ▸ >200 updates from 750 regulatory bodies ▸ 32% of companies spend >4h/w to create/amend reports
 
 
 
 
 
 Human effort required for organisational compliance
  • 7. @ebrucucen 2019/02/11 COMPLIANCE ON CLOUD? ▸ Azure Complied with Shared Responsibility Model ▸ Azure “MORE CERTIFICATIONS THAN ANY OTHER CLOUD PROVIDER”
  • 8. @ebrucucen 2019/02/11 AZURE SUPPORT ▸ Documents ▸ Audit Reports ▸ Data Protection Guides ▸ Azure Security and Compliance BluePrints https://servicetrust.microsoft.com/ViewPage/BlueprintOverview
 http://aka.ms/pciblueprint
 https://docs.microsoft.com/en-us/azure/security/blueprints/pcidss-paaswa-overview#compliance-documentation Government Blueprints
 FedRAMP Blueprint
 UK OFFICIAL Blueprint
 NIST SP 800-171 Blueprint
 AU-PROTECTED
 Additional Frameworks Finance Blueprints
 
 FFIEC Blueprint
 PCI-DSS Blueprint Healthcare Blueprints
 
 HIPAA / HITRUST Blueprint
 UK NHS Blueprint Retail Blueprints
 
 PCI-DSS Blueprint Customer Responsibility Matrix
 Reference Architecture
 Implementation Matrix
 Overview
 Threat Model Data Analytics/Data Warehouse/IAAS/PAAS
  • 9. @ebrucucen 2019/02/11 QUICK INSIGHT ▸ What does PCI-DSS BluePrint look like? http://aka.ms/pciblueprint
  • 10. @ebrucucen 2019/02/11 II. AZURE BASICS FOR COMPLIANCE DATA
  • 12. @ebrucucen 2019/02/11 ▸ Are collected at regular intervals ▸ One minute by default ▸ Unique: Category = Metric + Namespace ▸ Stored for 93 days ▸ Multi-dimensional ▸ Properties [up to 10] ▸ Resource ▸ Type of Measurement ▸ Value ▸ Time DATA SOURCES - METRICS
  • 13. @ebrucucen 2019/02/11 ▸ Properties ▸ Irregular ▸ Stored for x days ▸ Metrics -> Logs ▸ Types ▸ Control/Management Plane ▸ Data Plane ▸ Processed Events DATA SOURCES - LOGS
  • 14. @ebrucucen 2019/02/11 ▸ Properties ▸ Irregular ▸ Stored for x days ▸ Metrics -> Logs ▸ Types ▸ Control/Management Plane ▸ Data Plane ▸ Processed Events DATA SOURCES - LOGS Audit Logs Azure Tenant Metrics Application Azure Subscription Service Health Activity Logs Azure Resources Diagnostic Logs Monitoring Solutions Guest OS Application Insights Dependency Agent Log Analytics Agent Diagnostics Extension Azure Custom API Data Collector API Non-Azure Service Configuration
  • 15. @ebrucucen 2019/02/11 AZURE AD LOGS ▸ Editions: Basic, Free, Premium P1, Premium P2 ▸ Diagnostics Settings ▸ Audit Logs ▸ Sign-in Logs (PP2) ▸ Security Signals (opt-in IPC) ▸ Users at risk ▸ Risky sign-ins ▸ Activity Data is available 2 hours after turning on reporting ▸ 30 days of retention reports (PP1/PP2) ▸ 30/90 days of retention of security signals (PP1/PP2)
  • 22. @ebrucucen 2019/02/11 ▸ Low Latency (min 1 min interval) ▸ Control over metric condition ▸ Combined monitoring of multiple metrics ▸ Modular notification system ▸ Tip: Unify your alerts/sampling intervals for sanity ALERTS (NEW)
  • 23. @ebrucucen 2019/02/11 DEMO ▸ WebApp & VM ▸ Metrics/Logs ▸ Query ▸ Alert
  • 27. @ebrucucen 2019/02/11 SECURE? ✓ Data Protection ✓ Identity and Access Management ✓ Network Security ✓ Threat Protection ✓ Security Management https://www.cisecurity.org/benchmark/azure/
  • 30. @ebrucucen 2019/02/11 AZURE SECURITY CENTRE https://www.gartner.com/reviews/market/cloud-workload-protection-platforms/vendors
  • 33. @ebrucucen 2019/02/11 SECURITY CENTRE ▸ One Step Closer to Automation
  • 34. @ebrucucen 2019/02/11 DEMO ▸ Security Dashboard ▸ Issues ▸ Recommendations
  • 35. @ebrucucen 2019/02/11 AZURE MANAGEMENT/GOVERNANCE ▸ How to do Compliance As Code with Azure
  • 37. @ebrucucen 2019/02/11 RESOURCE GRAPH where type =~ 'Microsoft.Compute/virtualMachines' | project name, properties.storageProfile.osDisk.osType | top 5 by name desc Search-AzGraph -Query "project tags | summarize buildschema(tags)” # Use Resource Graph to get all NICs and store in the 'nic' variable az graph query -q "where type =~ 'Microsoft.Compute/virtualMachines' | project nic = tostring(properties['networkProfile']['networkInterfaces'][0]['id']) | where isnotempty(nic) | distinct nic | limit 20" --output table | tail -n +3 > nics.txt # Review the output of the query stored in 'nics.txt' cat nics.txt # Use Resource Graph with the 'nics.txt' file to get all related public IP addresses and store in 'publicIp.txt' file az graph query -q="where type =~ 'Microsoft.Network/networkInterfaces' | where id in ('$(awk -vORS="','" '{print $0}' nics.txt | sed 's/,$//')') | project publicIp = tostring(properties['ipConfigurations'][0]['properties'] ['publicIPAddress']['id']) | where isnotempty(publicIp) | distinct publicIp" --output table | tail -n +3 > ips.txt # Review the output of the query stored in 'ips.txt' cat ips.txt # Use Resource Graph with the 'ips.txt' file to get the IP address of the public IP address resources az graph query -q="where type =~ 'Microsoft.Network/publicIPAddresses' | where id in ('$(awk -vORS="','" '{print $0}' ips.txt | sed 's/,$//')') | project ip = tostring(properties['ipAddress']) | where isnotempty(ip) | distinct ip" --output table ALL VM PUBLIC IPS: (AZ CLI) ALL TAG NAMES: (POWERSHELL) FIRST 5 VM OS TYPES: (KUSTO QUERY*) https://docs.microsoft.com/en-us/azure/kusto/query/index
  • 38. @ebrucucen 2019/02/11 ▸ Enforce ▸ ASC on? ▸ Level of compliance? ▸ Threat detection/protection? ▸ Monitoring and auditing on? ▸ Network Security ▸ JIT and NSG for everything ▸ Adaptive Application Controls ▸ SIEM? ▸ WAF (Tested)? ▸ Integrate other sec tools (IPS/IDS/HIPS/Other) POLICY (SET) WHAT? PAAS? IAAS? NETWORK? HOW? IDENTITY & ACCESS MANAGEMENT? DATA & ENCRYPTION? AUDIT DEPLOY APPENDDENY
  • 42. @ebrucucen 2019/02/11 SECURE PIPELINE? APPLICATION CI/CD NIGHTLY TEST RUNS Static code analysis Code Review WI Linking Static Code Analysis OSS Vulnerability Scan Unit Tests Code Metrics Passive Pen Test SSL Scanner
 Infrastructure Scan Infrastructure Scan Load and Performance Testing Automated Regression Testing Infrastructure Scan Active Pen Test Infrastructure Scan LOCAL/
 PR CI DEV TEST FEEDBACK Code Review Comments
 Static Code Rules Warnings OSS Library Vulnerabilities
 OSS Licence Violations
 Failed Unit Testing
 Static Code Rule Warnings Pen Test Issues
 SSL Issues
 Performance Issues
 Regression Issues Pen Test Issues
 Infrastructure Issues
  • 43. @ebrucucen 2019/02/11 SECURE PIPELINE? APPLICATION CI/CD NIGHTLY TEST RUNS Static code analysis Code Review WI Linking Static Code Analysis OSS Vulnerability Scan Unit Tests Code Metrics Passive Pen Test SSL Scanner
 Infrastructure Scan Infrastructure Scan Load and Performance Testing Automated Regression Testing Infrastructure Scan Active Pen Test Infrastructure Scan LOCAL/
 PR CI DEV TEST FEEDBACK Code Review Comments
 Static Code Rules Warnings OSS Library Vulnerabilities
 OSS Licence Violations
 Failed Unit Testing
 Static Code Rule Warnings Pen Test Issues
 SSL Issues
 Performance Issues
 Regression Issues Pen Test Issues
 Infrastructure Issues POLICY
  • 46. @ebrucucen 2019/02/11 AZSK - OVERVIEW ▸ Requires SPN / OMS ▸ Runs Default policies ▸ Creates a Log/PDF Report for each execution ▸ Generates Manual/AutoFix scripts
  • 47. @ebrucucen 2019/02/11 DEMO: AZSK ▸ Set up Policy Configuration ▸ CI/CD ▸ Check ARM Template ▸ Security Verification Test
  • 50. @ebrucucen 2019/02/11 PLAN B -DEMO FAILS ▸ GSS
  • 54. @ebrucucen 2019/02/11 PLAN B: DEMO FAILS CI/CD
  • 55. @ebrucucen 2019/02/11 EXTRAS: WEB APP - BEST PRACTICES ▸ Use Certs ▸ Authenticate users (with) ▸ Advanced auth ▸ Configure TLS mutual auth ▸ Managed Identity ▸ Reference secrets from Key Vault ▸ Restrict IPs ▸ Turn on Web Server/Application Logging ▸ Automate Backups https://docs.microsoft.com/en-us/azure/app-service/web-sites-purchase-ssl-web-site
  • 56. @ebrucucen 2019/02/11 EXTRAS: HARDENING VM ▸ Control VM access ▸ Reduce variability in your setup and deployment of VMs ▸ Secure privileged access ▸ Use multiple VMs for better availability ▸ Protect against malware ▸ Keep VMs current ▸ Deploy and test a backup solution ▸ Encrypt your virtual hard disk files https://docs.microsoft.com/en-us/azure/security/azure-security-iaas
  • 57. @ebrucucen 2019/02/11 EXTRAS: HARDENING IDENTITY MANAGEMENT 
 Protect privileged accounts with MFA 1. Strengthen your credentials. 2. Reduce your attack surface area. 3. Automate threat response. 4. Increase your awareness of auditing and monitoring. 5. Enable more predictable and complete end-user security with self-help https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps
  • 58. @ebrucucen 2019/02/11 EXTRAS: IDENTITY MANAGEMENT BEST PRACTICES 1. Treat Identity as the primary security perimeter 2. Centralise Identity Management 3. Enable SSO 4. Turn on Conditional Access 5. Enforce MFA 6. Use RBAC 7. Lower exposure of privileged accounts (JIT, 2 EmergencyAccess) 8. Actively monitor for suspicious activities
  • 59. @ebrucucen 2019/02/11 EXTRAS: NETWORK SECURITY BEST PRACTICES 1. Logically segment subnets 2. Control routing behaviour 3. Enable forced tunnelling 4. Use virtual network appliances 5. Deploy perimeter network for security zones 6. Avoid exposure to Internet with dedicated WAN links 7. Optimise uptime and performance 8. Disable RDP/SSH to VMs
  • 60. @ebrucucen 2019/02/11 EXTRAS: THREAT MODELLING Threat Security property Potential Azure platform mitigation Spoofing Authentication Require HTTPS connections. Tampering Integrity Validate SSL/TLS certificates.Applications that use SSL/TLS must fully verify the X.509 certificates of the entities they connect to. Use Azure Key Vault certificates to manage your x509 certificates. Repudiation Non-repudiation Enable Azure monitoring and diagnostics. Information Disclosure Confidentiality Encrypt sensitive data at rest and in transit. Denial of Service Availability Monitor performance metrics for potential denial of service conditions. Implement connection filters. Azure DDoS protection combined with application design best practices provides defense against DDoS attacks. Elevation of Privilege Authorization Use Azure Active Directory Privileged Identity Management.
  • 61. @ebrucucen 2019/02/11 REFERENCES - BOOKS ▸ Microsoft Security Center
 https://www.amazon.co.uk/Microsoft-Azure-Security-Center-Practices-ebook/ dp/B07D5J97JV ▸ Pentesting Azure Applications
 https://www.amazon.co.uk/Pentesting-Azure-Definitive-Attack-Defense/dp/ 1593278632 ▸ Deep dive Presentation:
 https://www.sans.org/cyber-security-summit/archives/file/summit- archive-1540308627.pdf ▸ AZSK: 
 https://github.com/azsk/DevOpsKit-docs ▸ Security White Papers
 https://docs.microsoft.com/en-us/azure/security/security-white-papers
  • 62. @ebrucucen 2019/02/11 BRK3062 - Architecting Security and Governance Across your Azure Subscriptions THR2291 - Secure architecting for Azure BRK2368 - Practical guide for using Azure Security Center to protect hybrid cloud environment BRK3384 - Best practices for protecting modern cloud application architectures BRK2021 - Azure security & management THR3085 - The wizarding world of Microsoft CloudApp Security GS008 - Microsoft security: How the cloud helps us all be more secure REFERENCES - VIDEOS IGNITE/2018
  • 63. @ebrucucen 2019/02/11 SO AS A SUMMARY ▸ Enable Security Center ▸ Enable all the logs you can ▸ Automate your policy management: Think AZSK! ▸ Give AppDevs freedom on the ring fenced cloud!