@WICKETT
DevSecOps and The New
Path Forward
JAMES WICKETT @ SIGNAL SCIENCES
@WICKETT
Want the slides and
referenced links?
james@signalsciences.com
@WICKETT
‣ HEAD OF RESEARCH AT SIGNAL SCIENCES
‣ ORGANIZER OF DEVOPS DAYS AUSTIN
‣ LYNDA.COM AUTHOR ON DEVOPS
‣ BLOG AT THEAGILEADMIN.COM
@WICKETT
@WICKETT
‣ DEVOPS IS CHANGING AND THERE IS A BIG RISK
TO LOSE OUR WAY.
‣ SECURITY IS IN CRISIS
‣ SECURITY AT FORWARD-LEANING SHOPS HAVE
FOUND THE NEW WAY.
‣ LET’S JUXTAPOSE THE OLD WAY AND THE NEW
WAY OF SECURITY IN DEVOPS.
SUMMARY
@WICKETT
‣ CAN SECURITY AS AN INDUSTRY RISE TO THE
DEMANDS OF DEVOPS?
‣ IS THE DEVOPS CULTURE ABLE TO HANDLE
SECURITY AND ALL OF OUR BAGGAGE?
‣ WILL SECURITY DESTROY THE DEVOPS
CULTURE?
QUESTIONS ON MY MIND
DevSecOps Deep Thoughts
@WICKETT
Maybe in order to understand devsecops, we have to
look at the word itself. Basically, it’s made up of three
separate words: de, vseco, and ps. What do these
words mean? It’s a mystery, and that’s why so is
devsecops.
- DevSecOps Deep Thoughts
@WICKETT
Whenever someone asks
me to define devsecops, I
usually think for a minute,
then I spin around and pin
the guy's arm behind his
back. NOW who's asking the
questions?
- DevSecOps Deep Thoughts
Shoutout to the @TheJewberwocky the original DevOps Deep Thoughts
@WICKETT
The original DevOps Deep Thoughts were created by the
hilarious and awesome Josh Zimmerman
(@TheJewberwocky) as Not Jack Handey which is
parody of Deep Thoughts by Jack Handey.
These DevSecOps Deep Thoughts are not nearly as
funny nor deep, but hey what do you expect of a parody
of a parody?
@WICKETT
Many people don't realize that
playing dead can help not only
with bears, but also at
important business meetings.
- Jack Handey
@WICKETT
My Journey
@WICKETT
‣ WEB AND ECOMM FOR $1B COMPANY
‣ BRUTAL ONCALL ROTATIONS
‣ +24HR DEPLOYMENTS
‣ WATERFALL, WATERFALL, WATERFALL
‣ FRIENDS ARE BORN FROM ADVERSITY
FIRST BIGCO JOB
@WICKETT
‣ IN 2007 WENT STARTUP AND AWS CLOUD
‣ LEARNED A BIT ABOUT FAILURE AND
HAPPINESS
‣ REJOINED OLD TEAM IN 2010 FOR NEW CLOUD
VENTURE BACK IN BIGCO
CLOUDING FOR PROFIT
@WICKETT
‣ DEVOPS AND INFRA AS CODE
‣ NOT CD, BUT DEPLOYS DAILY
‣ AT BIGCO DELIVERED 4 SAAS PRODUCTS IN 2
YEARS WITH DEVOPS AND CLOUD
ENTER DEVOPS
@WICKETT
‣ FOUND RUGGED SOFTWARE
‣ MET GENE KIM IN 2012 IN A BAR IN AUSTIN
‣ CREATED GAUNTLT
‣ LATER, JOINED SIGNAL SCIENCES
DEVOPS AND SECURITY
@WICKETT
Compassion for Ops
@WICKETT
10:1
Dev:Ops
@WICKETT
Labor Inequity
Permeates IT Ranks
@WICKETT
100:10:1
Dev:Ops:Sec
@WICKETT
Yet, I remained optimistic
for DevOps+Security
@WICKETT
OUR ROOTS: FRIENDSHIP
@WICKETT
FRIENDSHIP
@WICKETT
CULTURE IS THE MOST
IMPORTANT ASPECT TO DEVOPS
SUCCEEDING IN THE
ENTERPRISE
- PATRICK DEBOIS
@WICKETT
@WICKETT
‣ MUTUAL UNDERSTANDING
‣ SHARED LANGUAGE
‣ SHARED VIEWS
‣ COLLABORATIVE TOOLING
4 KEYS TO CULTURE
@WICKETT
DevSecOps is the
extension of the DevOps
culture for the inclusion
of Security
@WICKETT
Security is in Crisis
@WICKETT
Companies are spending a great deal on
security, but we read of massive computer-
related attacks. Clearly something is wrong.
The root of the problem is twofold:
we’re protecting the wrong things,
and we’re hurting productivity in the process.
THINKING SECURITY, STEVEN M. BELLOVIN 2015
@WICKETT
@WICKETT
[Security by risk assessment]
introduces a dangerous fallacy: that
structured inadequacy is almost as
good as adequacy and that
underfunded security efforts plus risk
management are about as good as
properly funded security work
@WICKETT
many security teams work
with a worldview where their
goal is to inhibit change as
much as possible
@WICKETT
“SECURITY PREFERS A SYSTEM POWERED
OFF AND UNPLUGGED”
- DEVELOPER
@WICKETT
“…THOSE STUPID DEVELOPERS”
- SECURITY PERSON
@WICKETT
Security must
Change or Die
@WICKETT
“every aspect of managing WAFs is an ongoing
process. This is the antithesis of set it and forget it
technology. That is the real point of this research.
To maximize value from your WAF you need to go
in with everyone’s eyes open to the effort required
to get and keep the WAF running productively.”
- WHITEPAPER FROM AN UNDISCLOSED WAF VENDOR
@WICKETT
@WICKETT
The World has Changed
Title Text
@WICKETT
* - yes, we know there is container reuse and writability
Serverless encourages functions as
deploy units and run as one-time*,
read-only containers*, coupled with
third party services that allow running
end-to-end applications without
worrying about system operation.
@WICKETT
VMsHardware Serverless
Inspiration from @adrianco
Waste
Value
@WICKETT
Read-only containers and
serverless shift the
security story to almost
100% application security
@WICKETT
@WICKETT
DevOps
A New Traveling Companion
for Security
(…and probably the only way to survive)
@WICKETT
High performers spend 50 percent less
time remediating security issues than
low performers.
By better integrating information security
objectives into daily work, teams achieve
higher levels of IT performance and build
more secure systems.
2016 State of DevOps Report
@WICKETT
High performing orgs achieve
quality by incorporating
security (and security teams)
into the delivery process
2016 State of DevOps Report
@WICKETT
The New Path
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
A security team who embraces
openness about what it does and
why, spreads understanding.
- Rich Smith
@WICKETT
Runtime is arguably the
most important place to
create feedback loops
@WICKETT
‣ ACCOUNT TAKEOVER ATTEMPTS
‣ AREAS OF THE SITE UNDER ATTACK
‣ MOST LIKELY VECTORS OF ATTACK
‣ BUSINESS LOGIC FLOWS
DETECT WHAT MATTERS
@WICKETT
@WICKETT
Are you under attack?
@WICKETT
Where?
@WICKETT
Which is a better feedback loop?
@WICKETT
Develop Inherit Build Deploy Operate
- Open Source: modSecurity +
ELK To gain application insight
monitoring.
- Paid NGWAF / RASP Options:
Signal Sciences, Contrast, Prevoty
Runtime Defense Tooling
- Pro-tip: Avoid adding appsec
defense at the CDN
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
‣ POLICIES AND PROCEDURES IN PLACE
‣ EFFECTIVE EXECUTION OF THOSE POLICIES TO
ALLOW YOU TO KEEP FUNCTIONING
‣ MOST OF PCI AND OTHER FRAMEWORKS
PROVIDE REASONABLY GOOD PRACTICES *IF*
YOU REMOVE ALL THE WATERFALL BITS
UNDERSTAND AUDITORS
@WICKETT
[Deploys] can be treated as
standard or routine changes
that have been pre-approved
by management, and that
don’t require a heavyweight
change review meeting.
Separation of Duties Considered Harmful
@WICKETT
Developers with Access to
Production, Oh My!!!
https://www.schellmanco.com/blog/2012/12/auditing-devops-
developers-with-access-to-production/
@WICKETT
Check out DevOps Audit
Defense Toolkit
https://cdn2.hubspot.net/hubfs/228391/Corporate/
DevOps_Audit_Defense_Toolkit_v1.0.pdf
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
‣ ADD IN CHAOS TO YOUR SYSTEM AND
APPLICATION
‣ CHAOS MONKEY
‣ ANTI-FRAGILE
‣ RELEASE IT! BOOK
CHAOS ENGINEERING
@WICKETT
@WICKETT
‣ ADDS MISCONFIG TO THE STACK AND CHECKS
TO SEE IF IT GETS DETECTED
‣ NEW OPEN SOURCE TOOL!
‣ RUNS AS A LAMBDA
CHAOS SLINGR
@WICKETT
‣ VALIDATE YOUR SYSTEM CAN HANDLE CHAOS
THROUGH THE USE OF CHAOS EXPERIMENTS
‣ MANUAL OPT-OUT OF CHAOS
‣ ENGINEERING CULTURE THAT SECURITY CAN
ADOPT
‣ MICHAEL NYGARD’S RELEASE IT (2ND EDITION)
CHAOS EXPERIMENTS
@WICKETT
‣ I AM BEING PEN TESTED ANYWAY, WHY NOT
FIND OUT WHAT THEY ARE FINDING?
‣ 24/7 PEN TESTING
‣ BUILDS DEVELOPER CONFIDENCE
‣ FINDS MIX OF LOW HANGING FRUIT AND
SOMETIMES MUCH MORE!
BUG BOUNTIES
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
The ACL is moved from
Network Layer to the
Application Layer
@WICKETT
‣ NO PERIMETER SECURITY
‣ ASSUME COMPROMISE
‣ INSTRUMENT ALL LAYERS
‣ EXTENDS FROM LAPTOPS TO WEB
APPS TO CUSTOMER ACCOUNTS
ZERO TRUST NETWORKS
@WICKETT
Replay: Wendy Nather
Modern Security Series
https://info.signalsciences.com/mfa-multi-factor-authentication-modern-
security-series
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
‣ DON’T SLOW DELIVERY
‣ CONTINUOUS TESTING AND VALIDATION
‣ TESTING ON THE SIDE OF THE PIPELINE
‣ PENETRATION TESTING OUTSIDE OF DELIVERY
FAST AND NON-BLOCKING
@WICKETT
Currently, at Signal
Sciences we do about 15
deploys per day
@WICKETT
Roughly 10,000 deploys in
the last 2.5 yrs
@WICKETT
@WICKETT
CD is how little you can
deploy at a time
@WICKETT
We optimized for cycle
time—the time from code
commit to production
Gave power to the team to deploy
@WICKETT
Signal Sciences is a
software as a service
company and a security
company
@WICKETT
Security is part of CI/CD
and the overall delivery
pipeline
@WICKETT
‣DESIGN
‣INHERIT
‣BUILD
‣DEPLOY
‣OPERATE
PIPELINE PHASES
@WICKETT
‣INHERIT
‣BUILD
‣OPERATE
SECURITY
CONSIDERATIONS
What have I bundled into my
app that leaves me
vulnerable?
Do my build acceptance
tests and integration tests
catch security issues before
release?
Am I being attacked right
now? Is it working?
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
Shifting testing left with
Red Team Mondays
at Intuit
@WICKETT
Be Mean to Your Code
@WICKETT
The goal should be to come up with a
set of automated tests that probe and
check security configurations and
runtime system behavior for security
features that will execute every time
the system is built and every time it is
deployed.
@WICKETT
Security tools are
intractably noisy and
difficult to use
@WICKETT
A method of collaboration
was needed for devs, ops
and security eng.
@WICKETT
There needed to be a new
language to span the
parties
@WICKETT
Framework with Security testing written in a natural
language that developers, security and operations can
understand.
Gauntlt wraps security testing tools but does not install tools
Gauntlt was built to be part of the CI/CD pipeline
Open source, MIT License,
gauntlt.org
@WICKETT
@slow @final
Feature: Look for cross site scripting (xss) using arachni
against a URL
Scenario: Using arachni, look for cross site scripting and verify
no issues are found
Given "arachni" is installed
And the following profile:
| name | value |
| url | http://localhost:8008 |
When I launch an "arachni" attack with:
"""
arachni —check=xss* <url>
"""
Then the output should contain "0 issues were detected."
Given
When
Then
What?
@WICKETT
@WICKETT
@WICKETT
“We have saved millions of
dollars using Gauntlt for the
largest healthcare industry
project.”
- Aaron Rinehart, UnitedHealthCare
@WICKETT
http://bit.ly/2s8P1Ll
@WICKETT
‣ 8 LABS FOR GAUNTLT
‣ HOW TO USE GAUNTLT FOR NETWORK CHECKS
‣ GAUNTLT FOR XSS, SQLI, OTHER APSES
‣ HANDLING REPORTING
‣ USING ENV VARS
‣ CI SYSTEM SETUP
WORKSHOP INCLUDES:
@WICKETT
github.com/gauntlt/gauntlt-demo
@WICKETT
@WICKETT
@WICKETT
Advice: Use Gauntlt in a
docker container
@WICKETT
https://github.com/
gauntlt/gauntlt-docker
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
@WICKETT
https://www.slideshare.net/wickett/the-emergent-cloud-security-toolchain-for-cicd
@WICKETT
@WICKETT
- This is your real LOC count!
- The Software Delivery Supply
Chain
- Publish a Bill of Materials and
trace back
Inheriting Code
- This is not just application
dependencies and libraries,
but also OS-level (remember
shellshock, heartbleed, ..)
@WICKETT
Inheritance flaws are in
containers too.
@WICKETT
@WICKETT
OVER 30% OF OFFICIAL IMAGES IN
DOCKER HUB CONTAIN HIGH PRIORITY
SECURITY VULNERABILITIES
https://banyanops.com/blog/analyzing-docker-hub/
@WICKETT
OLD PATH VS. NEW PATH
Embrace Secrecy Create Feedback Loops
Just Pass Audit! Compliance adds Value
Enforce Stability Create Chaos
Build a Wall Zero Trust Networks
Slow Validation Fast and Non-blocking
Certainty Testing Adversity Testing
Test when Done Shift Left
Process Driven The Paved Road
@WICKETT
‣ MAKE IT EASY FOR PEOPLE TO DO THE RIGHT
THING
‣ JASON CHAN, NETFLIX
‣ GOLD IMAGES
‣ BLESSED BUILDS AND DEPENDENCIES
THE PAVED ROAD
@WICKETT
Don’t be a blocker, be an
enabler of the business
@WICKETT
Empathy and Enablement
Be Fast and Non-Blocking
Don’t slow delivery
Join with continuous testing efforts
Security testing automated in every phase
Penetration Testing alongside the Pipeline
Security provides value through making security normal
@WICKETT
Want the slides and
referenced links?
james@signalsciences.com

DevSecOps and the New Path Forward

  • 1.
    @WICKETT DevSecOps and TheNew Path Forward JAMES WICKETT @ SIGNAL SCIENCES
  • 2.
    @WICKETT Want the slidesand referenced links? james@signalsciences.com
  • 3.
    @WICKETT ‣ HEAD OFRESEARCH AT SIGNAL SCIENCES ‣ ORGANIZER OF DEVOPS DAYS AUSTIN ‣ LYNDA.COM AUTHOR ON DEVOPS ‣ BLOG AT THEAGILEADMIN.COM @WICKETT
  • 4.
    @WICKETT ‣ DEVOPS ISCHANGING AND THERE IS A BIG RISK TO LOSE OUR WAY. ‣ SECURITY IS IN CRISIS ‣ SECURITY AT FORWARD-LEANING SHOPS HAVE FOUND THE NEW WAY. ‣ LET’S JUXTAPOSE THE OLD WAY AND THE NEW WAY OF SECURITY IN DEVOPS. SUMMARY
  • 5.
    @WICKETT ‣ CAN SECURITYAS AN INDUSTRY RISE TO THE DEMANDS OF DEVOPS? ‣ IS THE DEVOPS CULTURE ABLE TO HANDLE SECURITY AND ALL OF OUR BAGGAGE? ‣ WILL SECURITY DESTROY THE DEVOPS CULTURE? QUESTIONS ON MY MIND
  • 6.
  • 7.
    @WICKETT Maybe in orderto understand devsecops, we have to look at the word itself. Basically, it’s made up of three separate words: de, vseco, and ps. What do these words mean? It’s a mystery, and that’s why so is devsecops. - DevSecOps Deep Thoughts
  • 8.
    @WICKETT Whenever someone asks meto define devsecops, I usually think for a minute, then I spin around and pin the guy's arm behind his back. NOW who's asking the questions? - DevSecOps Deep Thoughts Shoutout to the @TheJewberwocky the original DevOps Deep Thoughts
  • 9.
    @WICKETT The original DevOpsDeep Thoughts were created by the hilarious and awesome Josh Zimmerman (@TheJewberwocky) as Not Jack Handey which is parody of Deep Thoughts by Jack Handey. These DevSecOps Deep Thoughts are not nearly as funny nor deep, but hey what do you expect of a parody of a parody?
  • 10.
    @WICKETT Many people don'trealize that playing dead can help not only with bears, but also at important business meetings. - Jack Handey
  • 11.
  • 12.
    @WICKETT ‣ WEB ANDECOMM FOR $1B COMPANY ‣ BRUTAL ONCALL ROTATIONS ‣ +24HR DEPLOYMENTS ‣ WATERFALL, WATERFALL, WATERFALL ‣ FRIENDS ARE BORN FROM ADVERSITY FIRST BIGCO JOB
  • 13.
    @WICKETT ‣ IN 2007WENT STARTUP AND AWS CLOUD ‣ LEARNED A BIT ABOUT FAILURE AND HAPPINESS ‣ REJOINED OLD TEAM IN 2010 FOR NEW CLOUD VENTURE BACK IN BIGCO CLOUDING FOR PROFIT
  • 14.
    @WICKETT ‣ DEVOPS ANDINFRA AS CODE ‣ NOT CD, BUT DEPLOYS DAILY ‣ AT BIGCO DELIVERED 4 SAAS PRODUCTS IN 2 YEARS WITH DEVOPS AND CLOUD ENTER DEVOPS
  • 15.
    @WICKETT ‣ FOUND RUGGEDSOFTWARE ‣ MET GENE KIM IN 2012 IN A BAR IN AUSTIN ‣ CREATED GAUNTLT ‣ LATER, JOINED SIGNAL SCIENCES DEVOPS AND SECURITY
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
    @WICKETT Yet, I remainedoptimistic for DevOps+Security
  • 21.
  • 22.
  • 23.
    @WICKETT CULTURE IS THEMOST IMPORTANT ASPECT TO DEVOPS SUCCEEDING IN THE ENTERPRISE - PATRICK DEBOIS
  • 24.
  • 25.
    @WICKETT ‣ MUTUAL UNDERSTANDING ‣SHARED LANGUAGE ‣ SHARED VIEWS ‣ COLLABORATIVE TOOLING 4 KEYS TO CULTURE
  • 26.
    @WICKETT DevSecOps is the extensionof the DevOps culture for the inclusion of Security
  • 27.
  • 28.
    @WICKETT Companies are spendinga great deal on security, but we read of massive computer- related attacks. Clearly something is wrong. The root of the problem is twofold: we’re protecting the wrong things, and we’re hurting productivity in the process. THINKING SECURITY, STEVEN M. BELLOVIN 2015
  • 29.
  • 30.
    @WICKETT [Security by riskassessment] introduces a dangerous fallacy: that structured inadequacy is almost as good as adequacy and that underfunded security efforts plus risk management are about as good as properly funded security work
  • 31.
    @WICKETT many security teamswork with a worldview where their goal is to inhibit change as much as possible
  • 32.
    @WICKETT “SECURITY PREFERS ASYSTEM POWERED OFF AND UNPLUGGED” - DEVELOPER
  • 33.
  • 34.
  • 35.
    @WICKETT “every aspect ofmanaging WAFs is an ongoing process. This is the antithesis of set it and forget it technology. That is the real point of this research. To maximize value from your WAF you need to go in with everyone’s eyes open to the effort required to get and keep the WAF running productively.” - WHITEPAPER FROM AN UNDISCLOSED WAF VENDOR
  • 36.
  • 37.
  • 38.
  • 39.
    @WICKETT * - yes,we know there is container reuse and writability Serverless encourages functions as deploy units and run as one-time*, read-only containers*, coupled with third party services that allow running end-to-end applications without worrying about system operation.
  • 40.
  • 41.
    @WICKETT Read-only containers and serverlessshift the security story to almost 100% application security
  • 42.
  • 43.
    @WICKETT DevOps A New TravelingCompanion for Security (…and probably the only way to survive)
  • 44.
    @WICKETT High performers spend50 percent less time remediating security issues than low performers. By better integrating information security objectives into daily work, teams achieve higher levels of IT performance and build more secure systems. 2016 State of DevOps Report
  • 45.
    @WICKETT High performing orgsachieve quality by incorporating security (and security teams) into the delivery process 2016 State of DevOps Report
  • 46.
  • 47.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 48.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 49.
    @WICKETT A security teamwho embraces openness about what it does and why, spreads understanding. - Rich Smith
  • 50.
    @WICKETT Runtime is arguablythe most important place to create feedback loops
  • 51.
    @WICKETT ‣ ACCOUNT TAKEOVERATTEMPTS ‣ AREAS OF THE SITE UNDER ATTACK ‣ MOST LIKELY VECTORS OF ATTACK ‣ BUSINESS LOGIC FLOWS DETECT WHAT MATTERS
  • 52.
  • 53.
  • 54.
  • 55.
    @WICKETT Which is abetter feedback loop?
  • 56.
    @WICKETT Develop Inherit BuildDeploy Operate - Open Source: modSecurity + ELK To gain application insight monitoring. - Paid NGWAF / RASP Options: Signal Sciences, Contrast, Prevoty Runtime Defense Tooling - Pro-tip: Avoid adding appsec defense at the CDN
  • 57.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 58.
    @WICKETT ‣ POLICIES ANDPROCEDURES IN PLACE ‣ EFFECTIVE EXECUTION OF THOSE POLICIES TO ALLOW YOU TO KEEP FUNCTIONING ‣ MOST OF PCI AND OTHER FRAMEWORKS PROVIDE REASONABLY GOOD PRACTICES *IF* YOU REMOVE ALL THE WATERFALL BITS UNDERSTAND AUDITORS
  • 59.
    @WICKETT [Deploys] can betreated as standard or routine changes that have been pre-approved by management, and that don’t require a heavyweight change review meeting.
  • 60.
    Separation of DutiesConsidered Harmful
  • 61.
    @WICKETT Developers with Accessto Production, Oh My!!! https://www.schellmanco.com/blog/2012/12/auditing-devops- developers-with-access-to-production/
  • 62.
    @WICKETT Check out DevOpsAudit Defense Toolkit https://cdn2.hubspot.net/hubfs/228391/Corporate/ DevOps_Audit_Defense_Toolkit_v1.0.pdf
  • 64.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 65.
    @WICKETT ‣ ADD INCHAOS TO YOUR SYSTEM AND APPLICATION ‣ CHAOS MONKEY ‣ ANTI-FRAGILE ‣ RELEASE IT! BOOK CHAOS ENGINEERING
  • 66.
  • 67.
    @WICKETT ‣ ADDS MISCONFIGTO THE STACK AND CHECKS TO SEE IF IT GETS DETECTED ‣ NEW OPEN SOURCE TOOL! ‣ RUNS AS A LAMBDA CHAOS SLINGR
  • 68.
    @WICKETT ‣ VALIDATE YOURSYSTEM CAN HANDLE CHAOS THROUGH THE USE OF CHAOS EXPERIMENTS ‣ MANUAL OPT-OUT OF CHAOS ‣ ENGINEERING CULTURE THAT SECURITY CAN ADOPT ‣ MICHAEL NYGARD’S RELEASE IT (2ND EDITION) CHAOS EXPERIMENTS
  • 69.
    @WICKETT ‣ I AMBEING PEN TESTED ANYWAY, WHY NOT FIND OUT WHAT THEY ARE FINDING? ‣ 24/7 PEN TESTING ‣ BUILDS DEVELOPER CONFIDENCE ‣ FINDS MIX OF LOW HANGING FRUIT AND SOMETIMES MUCH MORE! BUG BOUNTIES
  • 70.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 71.
    @WICKETT The ACL ismoved from Network Layer to the Application Layer
  • 72.
    @WICKETT ‣ NO PERIMETERSECURITY ‣ ASSUME COMPROMISE ‣ INSTRUMENT ALL LAYERS ‣ EXTENDS FROM LAPTOPS TO WEB APPS TO CUSTOMER ACCOUNTS ZERO TRUST NETWORKS
  • 73.
    @WICKETT Replay: Wendy Nather ModernSecurity Series https://info.signalsciences.com/mfa-multi-factor-authentication-modern- security-series
  • 74.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 75.
    @WICKETT ‣ DON’T SLOWDELIVERY ‣ CONTINUOUS TESTING AND VALIDATION ‣ TESTING ON THE SIDE OF THE PIPELINE ‣ PENETRATION TESTING OUTSIDE OF DELIVERY FAST AND NON-BLOCKING
  • 76.
    @WICKETT Currently, at Signal Scienceswe do about 15 deploys per day
  • 77.
  • 78.
  • 79.
    @WICKETT CD is howlittle you can deploy at a time
  • 80.
    @WICKETT We optimized forcycle time—the time from code commit to production
  • 81.
    Gave power tothe team to deploy
  • 82.
    @WICKETT Signal Sciences isa software as a service company and a security company
  • 83.
    @WICKETT Security is partof CI/CD and the overall delivery pipeline
  • 84.
  • 85.
    @WICKETT ‣INHERIT ‣BUILD ‣OPERATE SECURITY CONSIDERATIONS What have Ibundled into my app that leaves me vulnerable? Do my build acceptance tests and integration tests catch security issues before release? Am I being attacked right now? Is it working?
  • 86.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 87.
    @WICKETT Shifting testing leftwith Red Team Mondays at Intuit
  • 88.
  • 89.
    @WICKETT The goal shouldbe to come up with a set of automated tests that probe and check security configurations and runtime system behavior for security features that will execute every time the system is built and every time it is deployed.
  • 90.
    @WICKETT Security tools are intractablynoisy and difficult to use
  • 91.
    @WICKETT A method ofcollaboration was needed for devs, ops and security eng.
  • 92.
    @WICKETT There needed tobe a new language to span the parties
  • 93.
    @WICKETT Framework with Securitytesting written in a natural language that developers, security and operations can understand. Gauntlt wraps security testing tools but does not install tools Gauntlt was built to be part of the CI/CD pipeline Open source, MIT License, gauntlt.org
  • 94.
    @WICKETT @slow @final Feature: Lookfor cross site scripting (xss) using arachni against a URL Scenario: Using arachni, look for cross site scripting and verify no issues are found Given "arachni" is installed And the following profile: | name | value | | url | http://localhost:8008 | When I launch an "arachni" attack with: """ arachni —check=xss* <url> """ Then the output should contain "0 issues were detected." Given When Then What?
  • 95.
  • 96.
  • 97.
    @WICKETT “We have savedmillions of dollars using Gauntlt for the largest healthcare industry project.” - Aaron Rinehart, UnitedHealthCare
  • 98.
  • 99.
    @WICKETT ‣ 8 LABSFOR GAUNTLT ‣ HOW TO USE GAUNTLT FOR NETWORK CHECKS ‣ GAUNTLT FOR XSS, SQLI, OTHER APSES ‣ HANDLING REPORTING ‣ USING ENV VARS ‣ CI SYSTEM SETUP WORKSHOP INCLUDES:
  • 100.
  • 101.
  • 102.
  • 103.
    @WICKETT Advice: Use Gauntltin a docker container
  • 104.
  • 105.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 106.
  • 107.
  • 108.
  • 109.
    @WICKETT - This isyour real LOC count! - The Software Delivery Supply Chain - Publish a Bill of Materials and trace back Inheriting Code - This is not just application dependencies and libraries, but also OS-level (remember shellshock, heartbleed, ..)
  • 110.
  • 111.
  • 112.
    @WICKETT OVER 30% OFOFFICIAL IMAGES IN DOCKER HUB CONTAIN HIGH PRIORITY SECURITY VULNERABILITIES https://banyanops.com/blog/analyzing-docker-hub/
  • 113.
    @WICKETT OLD PATH VS.NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  • 114.
    @WICKETT ‣ MAKE ITEASY FOR PEOPLE TO DO THE RIGHT THING ‣ JASON CHAN, NETFLIX ‣ GOLD IMAGES ‣ BLESSED BUILDS AND DEPENDENCIES THE PAVED ROAD
  • 115.
    @WICKETT Don’t be ablocker, be an enabler of the business
  • 116.
    @WICKETT Empathy and Enablement BeFast and Non-Blocking Don’t slow delivery Join with continuous testing efforts Security testing automated in every phase Penetration Testing alongside the Pipeline Security provides value through making security normal
  • 117.
    @WICKETT Want the slidesand referenced links? james@signalsciences.com