SlideShare a Scribd company logo
LONDON 18-19 OCT 2018
Is your supply chain your Achille's heel ?
COLIN DOMONEY
LONDON 18-19 OCT 2018
About the Presenter
@colindomoney
• Built lots of hardware and software
• Done AppSec at scale in large enterprise
• Worked in vendor-land in AppSec
• Currently a transformation consultant
• Veteran DevSecCon presenter
• Interested in all things new and shiny
LONDON 18-19 OCT 2018
Thank You’s and Acknowledgements
@controlplaneio
@lukeb0nd @sublimino
Santiago Torres @ In-Toto
@torresariass
veracity
/vəˈrasɪti/
noun
conformity to facts; accuracy.
provenance
/ˈprɒv(ə)nəns/
noun
the place of origin or earliest known history of something.
LONDON 18-19 OCT 2018
How Do Other Industries
Manage Their Supply Chains
LONDON 18-19 OCT 2018
Big Pharmaceuticals Understand Supply Chains Surely ?
LONDON 18-19 OCT 2018
Then I Remembered This …
LONDON 18-19 OCT 2018
Consumer Electronics Understand Supply Chains Surely ?
LONDON 18-19 OCT 2018
And Then This Happened !
“Having a well-done, nation-state-
level hardware implant surface
would be like witnessing a unicorn
jumping over a rainbow”
Joe Grand
LONDON 18-19 OCT 2018
Software Supply Chain
Failure Modes
LONDON 18-19 OCT 2018
Vulnerable 3rd Party Components
LONDON 18-19 OCT 2018
Typosquatting
LONDON 18-19 OCT 2018
The CCleaner Malware Attack
• Malware distributed via official download site
• Affected 2.7 million users
• Initial entry point via a compromised developer
account
• Three stage deployment compromising
intermediate build machines
LONDON 18-19 OCT 2018
Trust, but Verify
• Ensure developers aren’t ‘optimising’ your
security testing out of the pipeline
• Validate what is scanned is what is deployed
• Validate that what you test is representative of
the actual application
• Hunt for shadow build infrastructure
• Get early warnings for new development
LONDON 18-19 OCT 2018
Build Pipelines : Then and
Now, and Beyond
LONDON 18-19 OCT 2018
Before DevOps …
LONDON 18-19 OCT 2018
DevSecOps … SecDevOps …
CAB
LONDON 18-19 OCT 2018
Making It Go Faster – Just Remove all Security Measures
LONDON 18-19 OCT 2018
Software Supply Chain Basics
LONDON 18-19 OCT 2018
Prescribe a Policy for OSS Use
• Prescribe a policy for the use of OSS based on:
• Risk appetite
• Business criticality
• Time to market
• Organisational maturity
• Provide a recommended architecture of
commonly used and pre-approved components
• Educate your security team in the use of OSS
components and risk determination
LONDON 18-19 OCT 2018
Control Your Repositories
• Use a caching binary repository server (such as
Nexus)
• Maintain a blacklist of known bad (and hence
banned) components
• Maintain a whitelist of known good (and hence
approved) components
• Quarantine unknown components until assessed
• In extremis disable access to public internet
repositories
LONDON 18-19 OCT 2018
Hardening your Build
Pipeline
LONDON 18-19 OCT 2018
Using Your Pipeline as a Bitcoin Miner
• Exploits CVE-2107-1000353 in Jenkins disclosed in
April 2017
• Deploys XMRig miner and a RAT
• Over $3 million mined thus far
https://www.csoonline.com/article/3256314/security/hackers-exploit-jenkins-
servers-make-3-million-by-mining-monero.html
LONDON 18-19 OCT 2018
Harden Your CI/CD Infrastructure
• Harden the hosts, ensure patching is rigorously applied
• Lock down your tools (Jenkins is wide open by default)
• Lock down and harden your config management tools
• Ensure that keys, credentials and secrets are protected
• Secure access to all repositories
• Review and audit your access controls to your pipeline
• Treat your pipeline as you would your production infrastructure
https://www.oreilly.com/ideas/9-tips-for-a-more-secure-continuous-delivery-pipeline
LONDON 18-19 OCT 2018
In-Depth with In-Toto
LONDON 18-19 OCT 2018
The Update Framework
TUF’s primary goals are:
• Framework that can be used to secure systems
• Minimise the impact of key compromises
• Be flexible and easy to integrate
Guards against the following attacks:
• Replay attacks of same file
• Compromised and vulnerable versions
• Key compromise in signing files
Implemented as Notary by Docker (originally)
http://www.eweek.com/security/cncf-brings-in-notary-the-update-framework-to-
boost-container-security
LONDON 18-19 OCT 2018
What Is In-Toto
Motivation:
“Although many frameworks ensuring security in the "last mile" (e.g., software
updaters) exist, they may be providing integrity and authentication to a product that is
already vulnerable; it is possible that, by the time the package makes it to a software
update repository, it has already been compromised.”
Goals:
“in-toto aims to provide integrity, authentication and auditability to the supply chain as
a whole. This means that all the steps within the supply chain are clearly laid out, that
the parties involved in carrying out a step are explicitly stated, and that each step
carried out meets the requirements specified by the actor responsible for this software
product.”
LONDON 18-19 OCT 2018
In-Toto Basic Terminology
Materials: the elements used (e.g., files) to perform a step in the supply chain.
Product: the result of carrying out a step. Products are recorded as part of link
metadata.
Link: metadata information gathered while performing a supply chain step or
inspection, signed by the functionary that performed the step or the client that
performed the inspection
Verification: the process by which data and metadata included in the final product is
used to ensure its correctness.
LONDON 18-19 OCT 2018
In-Toto Actors
Project Owner: Defines the layout of the software supply chain.
Functionary: Performs a step in the supply chain and provides a piece of link metadata
as a record that such a step was carried out.
Client: Performs verification on the final product by checking the provided layout and
link metadata.
LONDON 18-19 OCT 2018
In-Toto Layouts - Steps
• A recipe for taking materials and producing an
output product.
• Steps can be chained, and sub-layouts can be
specified.
LONDON 18-19 OCT 2018
In-Toto Layouts - Inspect
• Executes at the final stage of verification to verify
the resultant product matches that specified in the
layout.
• Takes an input list of expected materials and
expected products.
• Returns a go/no-go result.
LONDON 18-19 OCT 2018
In-Toto Links
• Record information about the execution
environment.
• Cryptographically signed by the functionary
carrying out the action.
LONDON 18-19 OCT 2018
And Finally : In-Toto In Action
A Passing Verification:
A Failing Verification: https://in-toto.github.io/
LONDON 18-19 OCT 2018
In-Toto in a Jenkins Server
stage('Build') {
agent {
docker {
#image name here
}
}
steps {
withCredentials([#any credentials here]) {
in_toto_wrap(['stepName': 'Build',
'keyPath': "${WORKER_KEY}",
'transport': "redis://${REDIS_ENDPOINT}:6379"]){
#your actual step here
}
}
}
}
}
LONDON 18-19 OCT 2018
Getting It Right By Design :
Cloud Native and Containers
LONDON 18-19 OCT 2018
Point Solutions Are Not Enough
LONDON 18-19 OCT 2018
What Can You Trust ?
• Git ensures integrity but not identity
• Anyone can pretend to commit as
someone else !
• Most people assume Git is a trusted
source
• Signing and verification are easy
• Enterprise key management not so
much !
https://mikegerwitz.com/papers/git-horror-story
https://medium.com/@pjbgf/spoofing-git-commits-7bef357d72f0
LONDON 18-19 OCT 2018
Security-hardened Container Supply Chain
Base Image Code Build Application Image Deploy
Controlled base
images
Hash based
addressing
Static analysis
Dependency analysis
Hermetic
Reproducible
Rootless
Vulnerability
scanning
Configuration
scanning
Admission control
Runtime
configurations
Docker Hub TUF
Notary
Grafeas
In-Toto
Clair
Aqua Microscanner
Kubernetes
Kritis
LONDON 18-19 OCT 2018
Securing Builds with Metadata
• Pipeline metadata is rich and varied
• Initiating users and/or events
• Installed dependencies and their versions
• Veracity test data (unit/integration/acceptance tests)
• Security test data
• Data can be used for:
• Recording i.e. audit
• Report/enforcing i.e. policy
LONDON 18-19 OCT 2018
Storing Metadata with Google Grafeas
• Google’s open-source project to audit and govern the
software supply chain
• Stores metadata about artefacts and their
vulnerabilities
• Twistlock, Aqua, JFrog Xray, BlackDuck can send
metadata to Grafeas
• Possible to query that metadata to gate builds and
deployments
LONDON 18-19 OCT 2018
Grafeas in Action
LONDON 18-19 OCT 2018
The Art of the Possible
LONDON 18-19 OCT 2018
In-Toto in a Container SDLC
LONDON 18-19 OCT 2018
DevSecOps … with In-Toto
CAB
LONDON 18-19 OCT 2018
Avoid the Horror
• Practice basic hygiene
• Trust with caution
• Trust but verify
• Understand your abuse cases
• Embrace new ways of working
• Backport the best of new technology
LONDON 18-19 OCT 2018
[Last slide for thank you
message, links, etc]
@colindomoney

More Related Content

What's hot

CheckPoint Software
CheckPoint SoftwareCheckPoint Software
CheckPoint Software
Janis Gloystein
 
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
apidays LIVE Paris - Principles for API security by Alan Glickenhouseapidays LIVE Paris - Principles for API security by Alan Glickenhouse
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
apidays
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon
 
AsyncAPI specification
AsyncAPI specificationAsyncAPI specification
AsyncAPI specification
fmvilas
 
In pursuit of architectural agility: experimenting with microservices
In pursuit of architectural agility: experimenting with microservicesIn pursuit of architectural agility: experimenting with microservices
In pursuit of architectural agility: experimenting with microservices
Alberto Simioni
 
Eclipse kura
Eclipse kuraEclipse kura
Eclipse kura
Isham Mohamed Iqbal
 
API Management and Internet of Things
API Management and Internet of Things API Management and Internet of Things
API Management and Internet of Things
WSO2
 
IoT Platform Meetup - Sensolus
IoT Platform Meetup - SensolusIoT Platform Meetup - Sensolus
IoT Platform Meetup - Sensolus
Filip Kolář
 
Innovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOH
Thibault Cantegrel
 
Zetta js Hands on IoT
Zetta js   Hands on IoT Zetta js   Hands on IoT
Zetta js Hands on IoT
Anil Sagar
 
IoT Platform Meetup - IBM
IoT Platform Meetup - IBMIoT Platform Meetup - IBM
IoT Platform Meetup - IBM
Filip Kolář
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays
 
Monitoring with Elastic Machine Learning at Sky
Monitoring with Elastic Machine Learning at SkyMonitoring with Elastic Machine Learning at Sky
Monitoring with Elastic Machine Learning at Sky
Elasticsearch
 
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
apidays
 
Security tools
Security toolsSecurity tools
Security tools
Adri Jovin
 
AI-Driven Fraud Detection
AI-Driven Fraud DetectionAI-Driven Fraud Detection
AI-Driven Fraud Detection
Codit
 
KIWI IoT Presentation
KIWI IoT PresentationKIWI IoT Presentation
KIWI IoT Presentation
Jeff Katz
 

What's hot (20)

CheckPoint Software
CheckPoint SoftwareCheckPoint Software
CheckPoint Software
 
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
apidays LIVE Paris - Principles for API security by Alan Glickenhouseapidays LIVE Paris - Principles for API security by Alan Glickenhouse
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
 
AsyncAPI specification
AsyncAPI specificationAsyncAPI specification
AsyncAPI specification
 
In pursuit of architectural agility: experimenting with microservices
In pursuit of architectural agility: experimenting with microservicesIn pursuit of architectural agility: experimenting with microservices
In pursuit of architectural agility: experimenting with microservices
 
Eclipse kura
Eclipse kuraEclipse kura
Eclipse kura
 
API Management and Internet of Things
API Management and Internet of Things API Management and Internet of Things
API Management and Internet of Things
 
IoT Platform Meetup - Sensolus
IoT Platform Meetup - SensolusIoT Platform Meetup - Sensolus
IoT Platform Meetup - Sensolus
 
Innovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOH
 
Zetta js Hands on IoT
Zetta js   Hands on IoT Zetta js   Hands on IoT
Zetta js Hands on IoT
 
IoT Platform Meetup - IBM
IoT Platform Meetup - IBMIoT Platform Meetup - IBM
IoT Platform Meetup - IBM
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
 
Narayana
NarayanaNarayana
Narayana
 
Monitoring with Elastic Machine Learning at Sky
Monitoring with Elastic Machine Learning at SkyMonitoring with Elastic Machine Learning at Sky
Monitoring with Elastic Machine Learning at Sky
 
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
 
Security tools
Security toolsSecurity tools
Security tools
 
AI-Driven Fraud Detection
AI-Driven Fraud DetectionAI-Driven Fraud Detection
AI-Driven Fraud Detection
 
KIWI IoT Presentation
KIWI IoT PresentationKIWI IoT Presentation
KIWI IoT Presentation
 

Similar to DevSecCon London 2018: Is your supply chain your achille's heel

Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?
Fernando Montenegro
 
Blockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computingBlockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computing
InfinIT - Innovationsnetværket for it
 
Blockchain IoT Workshop for the Aviation Planning Conference
Blockchain IoT Workshop for the Aviation Planning ConferenceBlockchain IoT Workshop for the Aviation Planning Conference
Blockchain IoT Workshop for the Aviation Planning Conference
Jim Gitney
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
Kai Wähner
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of Things
Valerie Lampkin
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Comparison of Open Source Frameworks for Integrating the Internet of Things
Comparison of Open Source Frameworks for Integrating the Internet of ThingsComparison of Open Source Frameworks for Integrating the Internet of Things
Comparison of Open Source Frameworks for Integrating the Internet of Things
Kai Wähner
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
AmitH42
 
SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech
Quentin Samelson
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational Insights
Robb Boyd
 
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdfUC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
Wlamir Molinari
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
 
FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)
FIWARE
 
20170820 FIWARE at CAMPIE
20170820 FIWARE at CAMPIE20170820 FIWARE at CAMPIE
20170820 FIWARE at CAMPIE
stefano de panfilis
 
The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...
Codemotion
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
 
COMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slidesCOMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slides
Comit Projects Ltd
 
DevOps, Kubernetes and Istio
DevOps, Kubernetes and IstioDevOps, Kubernetes and Istio
DevOps, Kubernetes and Istio
John Jardin
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
SupratimNandi3
 

Similar to DevSecCon London 2018: Is your supply chain your achille's heel (20)

Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?
 
Blockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computingBlockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computing
 
Blockchain IoT Workshop for the Aviation Planning Conference
Blockchain IoT Workshop for the Aviation Planning ConferenceBlockchain IoT Workshop for the Aviation Planning Conference
Blockchain IoT Workshop for the Aviation Planning Conference
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of Things
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Comparison of Open Source Frameworks for Integrating the Internet of Things
Comparison of Open Source Frameworks for Integrating the Internet of ThingsComparison of Open Source Frameworks for Integrating the Internet of Things
Comparison of Open Source Frameworks for Integrating the Internet of Things
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
 
SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational Insights
 
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdfUC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
UC18NA-D3D202-Dianomic-IZoratti-Introduction-To-FogLAMP.pdf
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)
 
20170820 FIWARE at CAMPIE
20170820 FIWARE at CAMPIE20170820 FIWARE at CAMPIE
20170820 FIWARE at CAMPIE
 
The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
COMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slidesCOMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slides
 
DevOps, Kubernetes and Istio
DevOps, Kubernetes and IstioDevOps, Kubernetes and Istio
DevOps, Kubernetes and Istio
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
 

More from DevSecCon

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
DevSecCon
 
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon
 
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon
 
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon
 
DevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless world
DevSecCon
 

More from DevSecCon (20)

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
 
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
 
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
 
DevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless world
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

DevSecCon London 2018: Is your supply chain your achille's heel

  • 1. LONDON 18-19 OCT 2018 Is your supply chain your Achille's heel ? COLIN DOMONEY
  • 2. LONDON 18-19 OCT 2018 About the Presenter @colindomoney • Built lots of hardware and software • Done AppSec at scale in large enterprise • Worked in vendor-land in AppSec • Currently a transformation consultant • Veteran DevSecCon presenter • Interested in all things new and shiny
  • 3. LONDON 18-19 OCT 2018 Thank You’s and Acknowledgements @controlplaneio @lukeb0nd @sublimino Santiago Torres @ In-Toto @torresariass
  • 4.
  • 6. provenance /ˈprɒv(ə)nəns/ noun the place of origin or earliest known history of something.
  • 7. LONDON 18-19 OCT 2018 How Do Other Industries Manage Their Supply Chains
  • 8. LONDON 18-19 OCT 2018 Big Pharmaceuticals Understand Supply Chains Surely ?
  • 9. LONDON 18-19 OCT 2018 Then I Remembered This …
  • 10. LONDON 18-19 OCT 2018 Consumer Electronics Understand Supply Chains Surely ?
  • 11. LONDON 18-19 OCT 2018 And Then This Happened ! “Having a well-done, nation-state- level hardware implant surface would be like witnessing a unicorn jumping over a rainbow” Joe Grand
  • 12.
  • 13. LONDON 18-19 OCT 2018 Software Supply Chain Failure Modes
  • 14. LONDON 18-19 OCT 2018 Vulnerable 3rd Party Components
  • 15. LONDON 18-19 OCT 2018 Typosquatting
  • 16. LONDON 18-19 OCT 2018 The CCleaner Malware Attack • Malware distributed via official download site • Affected 2.7 million users • Initial entry point via a compromised developer account • Three stage deployment compromising intermediate build machines
  • 17. LONDON 18-19 OCT 2018 Trust, but Verify • Ensure developers aren’t ‘optimising’ your security testing out of the pipeline • Validate what is scanned is what is deployed • Validate that what you test is representative of the actual application • Hunt for shadow build infrastructure • Get early warnings for new development
  • 18. LONDON 18-19 OCT 2018 Build Pipelines : Then and Now, and Beyond
  • 19. LONDON 18-19 OCT 2018 Before DevOps …
  • 20. LONDON 18-19 OCT 2018 DevSecOps … SecDevOps … CAB
  • 21. LONDON 18-19 OCT 2018 Making It Go Faster – Just Remove all Security Measures
  • 22.
  • 23. LONDON 18-19 OCT 2018 Software Supply Chain Basics
  • 24. LONDON 18-19 OCT 2018 Prescribe a Policy for OSS Use • Prescribe a policy for the use of OSS based on: • Risk appetite • Business criticality • Time to market • Organisational maturity • Provide a recommended architecture of commonly used and pre-approved components • Educate your security team in the use of OSS components and risk determination
  • 25. LONDON 18-19 OCT 2018 Control Your Repositories • Use a caching binary repository server (such as Nexus) • Maintain a blacklist of known bad (and hence banned) components • Maintain a whitelist of known good (and hence approved) components • Quarantine unknown components until assessed • In extremis disable access to public internet repositories
  • 26. LONDON 18-19 OCT 2018 Hardening your Build Pipeline
  • 27. LONDON 18-19 OCT 2018 Using Your Pipeline as a Bitcoin Miner • Exploits CVE-2107-1000353 in Jenkins disclosed in April 2017 • Deploys XMRig miner and a RAT • Over $3 million mined thus far https://www.csoonline.com/article/3256314/security/hackers-exploit-jenkins- servers-make-3-million-by-mining-monero.html
  • 28. LONDON 18-19 OCT 2018 Harden Your CI/CD Infrastructure • Harden the hosts, ensure patching is rigorously applied • Lock down your tools (Jenkins is wide open by default) • Lock down and harden your config management tools • Ensure that keys, credentials and secrets are protected • Secure access to all repositories • Review and audit your access controls to your pipeline • Treat your pipeline as you would your production infrastructure https://www.oreilly.com/ideas/9-tips-for-a-more-secure-continuous-delivery-pipeline
  • 29. LONDON 18-19 OCT 2018 In-Depth with In-Toto
  • 30. LONDON 18-19 OCT 2018 The Update Framework TUF’s primary goals are: • Framework that can be used to secure systems • Minimise the impact of key compromises • Be flexible and easy to integrate Guards against the following attacks: • Replay attacks of same file • Compromised and vulnerable versions • Key compromise in signing files Implemented as Notary by Docker (originally) http://www.eweek.com/security/cncf-brings-in-notary-the-update-framework-to- boost-container-security
  • 31. LONDON 18-19 OCT 2018 What Is In-Toto Motivation: “Although many frameworks ensuring security in the "last mile" (e.g., software updaters) exist, they may be providing integrity and authentication to a product that is already vulnerable; it is possible that, by the time the package makes it to a software update repository, it has already been compromised.” Goals: “in-toto aims to provide integrity, authentication and auditability to the supply chain as a whole. This means that all the steps within the supply chain are clearly laid out, that the parties involved in carrying out a step are explicitly stated, and that each step carried out meets the requirements specified by the actor responsible for this software product.”
  • 32. LONDON 18-19 OCT 2018 In-Toto Basic Terminology Materials: the elements used (e.g., files) to perform a step in the supply chain. Product: the result of carrying out a step. Products are recorded as part of link metadata. Link: metadata information gathered while performing a supply chain step or inspection, signed by the functionary that performed the step or the client that performed the inspection Verification: the process by which data and metadata included in the final product is used to ensure its correctness.
  • 33. LONDON 18-19 OCT 2018 In-Toto Actors Project Owner: Defines the layout of the software supply chain. Functionary: Performs a step in the supply chain and provides a piece of link metadata as a record that such a step was carried out. Client: Performs verification on the final product by checking the provided layout and link metadata.
  • 34. LONDON 18-19 OCT 2018 In-Toto Layouts - Steps • A recipe for taking materials and producing an output product. • Steps can be chained, and sub-layouts can be specified.
  • 35. LONDON 18-19 OCT 2018 In-Toto Layouts - Inspect • Executes at the final stage of verification to verify the resultant product matches that specified in the layout. • Takes an input list of expected materials and expected products. • Returns a go/no-go result.
  • 36. LONDON 18-19 OCT 2018 In-Toto Links • Record information about the execution environment. • Cryptographically signed by the functionary carrying out the action.
  • 37. LONDON 18-19 OCT 2018 And Finally : In-Toto In Action A Passing Verification: A Failing Verification: https://in-toto.github.io/
  • 38. LONDON 18-19 OCT 2018 In-Toto in a Jenkins Server stage('Build') { agent { docker { #image name here } } steps { withCredentials([#any credentials here]) { in_toto_wrap(['stepName': 'Build', 'keyPath': "${WORKER_KEY}", 'transport': "redis://${REDIS_ENDPOINT}:6379"]){ #your actual step here } } } } }
  • 39. LONDON 18-19 OCT 2018 Getting It Right By Design : Cloud Native and Containers
  • 40. LONDON 18-19 OCT 2018 Point Solutions Are Not Enough
  • 41. LONDON 18-19 OCT 2018 What Can You Trust ? • Git ensures integrity but not identity • Anyone can pretend to commit as someone else ! • Most people assume Git is a trusted source • Signing and verification are easy • Enterprise key management not so much ! https://mikegerwitz.com/papers/git-horror-story https://medium.com/@pjbgf/spoofing-git-commits-7bef357d72f0
  • 42. LONDON 18-19 OCT 2018 Security-hardened Container Supply Chain Base Image Code Build Application Image Deploy Controlled base images Hash based addressing Static analysis Dependency analysis Hermetic Reproducible Rootless Vulnerability scanning Configuration scanning Admission control Runtime configurations Docker Hub TUF Notary Grafeas In-Toto Clair Aqua Microscanner Kubernetes Kritis
  • 43. LONDON 18-19 OCT 2018 Securing Builds with Metadata • Pipeline metadata is rich and varied • Initiating users and/or events • Installed dependencies and their versions • Veracity test data (unit/integration/acceptance tests) • Security test data • Data can be used for: • Recording i.e. audit • Report/enforcing i.e. policy
  • 44. LONDON 18-19 OCT 2018 Storing Metadata with Google Grafeas • Google’s open-source project to audit and govern the software supply chain • Stores metadata about artefacts and their vulnerabilities • Twistlock, Aqua, JFrog Xray, BlackDuck can send metadata to Grafeas • Possible to query that metadata to gate builds and deployments
  • 45. LONDON 18-19 OCT 2018 Grafeas in Action
  • 46. LONDON 18-19 OCT 2018 The Art of the Possible
  • 47. LONDON 18-19 OCT 2018 In-Toto in a Container SDLC
  • 48. LONDON 18-19 OCT 2018 DevSecOps … with In-Toto CAB
  • 49. LONDON 18-19 OCT 2018 Avoid the Horror • Practice basic hygiene • Trust with caution • Trust but verify • Understand your abuse cases • Embrace new ways of working • Backport the best of new technology
  • 50. LONDON 18-19 OCT 2018 [Last slide for thank you message, links, etc] @colindomoney