SlideShare a Scribd company logo
Brian Henerey
Director of Technology & Operations, OpinionLab
bhenerey@gmail.com | @bhenerey | October 2014
Controlling Devops
Me
• Working in tech since 1998
• Discovered Puppet – 2006
• Discovered Devops – 2010
• First Devopsdays – TODAY!
Trust us, we’re Engineers!
• Did you delete those users accounts?
• Do those automated backups work?
• Do you know what code was released to Prod?
• Who authorized those changes?
• Who reviewed them?
• Are people ssh-ing into Prod? Did they make
any changes?
• How many people have access to customer
data?
Trust, Actually
• Trust is a core element of Devops
• We want to trust and empower our people, that’s
why we hired them
• Yet, we need some controls in place…
This Talk...
• I’m going to briefly describe what a SOC2 is and
how it works
• I’m going to tell how to rub some Devops on one
SOC(2) it to me
A Report on the Controls at a Service Organization
Relevant to:
– Security
– Availability
– Confidentiality
– Processing Integrity
– Privacy
These are called ‘Trust Services Principles’. Defined
here: http://en.wikipedia.org/wiki/Service_Organization_Controls
American Institute of CPAs (AICPA)
Why would you want one?
• To assert that your company meets all the
criteria of the Trust Services Principles
• You want an external auditor to make a
statement that you’ve done this
Who has SOC2 reports?
• SaaS’s
• Datacenters
• AWS (http://blogs.aws.amazon.com/security/blog/tag/SOC+2)
How does a SOC2 work?
You/Your Org
• Write System Description
• Write Controls
• Write Policies based on Controls
• Write Assertion about your System
Auditor
• Helps you prepare the above
• Performs audit for 3-12 months
• Produces Auditor’s report
What does the have to do with
Devops?
1. Accountants are more familiar with traditional IT
practices
– Devops practices require different controls
2. A SOC2 is driven by mitigating risk.
– So is DevOPs
What about ITIL?
• ITIL is the baby that got thrown out with the
bathwater.
• This is just my experience.
Over-optimized for speed
• There’s a ton more emphasis on speed of
feature delivery than creating operable systems
• You can not wish the operational pain away
• So let’s put some controls in place at the start
Getting started with Controls
TSP
Criteria
Risk
Example
Control
Your
Control
Evidence
What is a Control?
• Your organization’s practice for mitigating
specific risks
• Tip: You’re better off with multiple controls to
address each Risk
What kind of Controls are there?
• AICPA introduced the ‘common criteria’ which
cover:
– Organization and management
– Communications
– Risk management and design and implementation of
controls
– Monitoring of controls
– Logical and physical access of controls
– System Operations
– Change Management
Example Control
• Risk: “Breaches and incidents recur because
preventive measures are not implemented after a
previous event. “
• Control: “At least monthly, the Technology
Management Team meet to review the Operations
Review Register and discuss plan for resolution of
issues, or recap of resolved issues.”
Evidence of Control Performing Well
• “Monthly meeting minutes OR checklist of categories
of issues/projects discussed at meetings, attendees,
date, and indication if any projects/issues need to be
communicated to other employees.”
• Tip: this is what you want automated or baked into
your processes as much as possible. No one likes
busy work
Is a Control a Policy?
No.
• Controls are used only by the auditor
• Policies and Procedures are written for
employees with clear instructions on how to
perform their jobs.
How do I write a control?
Auditor
interviews me
Auditor
writes
Review
together
How many controls will I need?
• Around 200
– Maybe 20% of these are duplicates. The means the
same control addresses multiple risks.
• I spent 50-60 hours with the auditor writing
controls over 2-3 months
These are your Controls!
• Start off by writing what your company actually
does
• The most valuable part of writing these controls
is discovering areas to improve
What do Accountants like?
• Clarity
• Hierarchy-based Approval
• Consistency
• Ownership
• Accountability
How is Devops different?
• More collaboration
• More autonomy
• Less segregation of responsibilities
• Broader range of impact
– Systems, code, security, networks, databases
• More bottom-up leadership
Devops Criteria for writing Controls
• Lightweight
• Minimal impact to workflow
• No bureaucracy
• No busy work
• Automate/bake-in all the evidence
• Team members empowered to do their jobs
Up-front versus Back-end Controls
• Up-front control is more powerful, but more
stifling
– People cheat the system in favor of ‘getting things
done’
• Devops controls are on the back-end: The team
is trusted to make changes. We’ll review what
changed after the fact.
– Need multiple controls to increase the effectiveness
Don’t fear the policy
• Okay, maybe fear it a bit.
Leverage your ticketing system
• Already has history
• Already can create reports
• Easy to add approval to it
• Can automate ticket creation for
weekly/monthly/quarterly tasks
• Easy to add screenshots or attachments as
evidence
Leverage your version control
• Name your branches/commits based on Ticket-
ID
• Can review list of commits after deployment to
make sure changes were approved/intended
Leverage your tools + logging
• Have your tools create log events
– Who’s using the tool
– Datestamp
– What change was made
– i.e. Chef-handler for logstash
• https://github.com/lusis/logstash_handler
Side benefit of doing this
• The more you think about your organization,
you’ll probably find things you should really be
doing but aren’t.
• You’ll also find you aren’t consistent in your
behavior, which is why you need layers of
Control.
Example: Alert fatigue
• You probably already have a policy on
responding to alerts
• If you’re not following this process, perhaps it’s
because you have too many alerts, or they’re
un-actionable
• If it’s hard to follow your process, it’s because
you have debt in your system which should be
paid down
Detailed example of a Control
Common Criteria 5.6
“Logical access security measures have been
implemented to protect against security,
availability, or confidentiality threats from sources
outside the boundaries of the system.”
CC5.6 continued
Risk
“Threats to the system are obtained through
external points of connectivity”
CC5.6 Control examples 1
“For VOC system infrastructure components,
logical access is controlled through each
component's native security using group/role
based permissions when possible. The Windows
network is further protected by a 3rd party multi-
factor authentication system.”
Evidence: Network diagram that includes VOC
infrastructure components
CC5.6 Control example 2
“For VOC custom developed applications, logical
access is controlled through role-based security
with configurations stored in the applications'
underlying database. For the 3rd party reporting
tool that is integrated with the VOC custom
developed applications, logical access is controlled
through that tool's native security.”
Evidence: Diagram or documentation that
identifies the software/applications that comprise
the VOC system
CC5.6 Control example 3
“Firewalls are initially setup as deny all and then
configured to allow access for approved services.
At least quarterly, the configuration of each firewall
is reviewed by the Technology Operations Team
and updated as deemed necessary according to
industry best practices.”
Evidence: Quarterly review of firewall configuration
indicating who reviewed, date reviewed, and steps
taken (e.g. firewall rules updated to…).
CC5.7 Control example 4
“Remote access to VOCF systems and
infrastructure components requires single factor
VPN authentication followed by a second factor
authentication at the server or network level.
Certain VOCF system component require two
factor authentication.”
Evidence: VPN configuration screen prints
Thanks!!
Questions?
Special thanks to
Mike Becker
Partner-in-charge, Risks and Controls
@ FGMK
Judge a man by his questions
rather than his answers
-Voltaire

More Related Content

What's hot

How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditing
Lepide USA Inc
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1aGene Kim
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
Automating Enterprise IT Management
Automating Enterprise IT ManagementAutomating Enterprise IT Management
Automating Enterprise IT Management
John Gilligan
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
AlgoSec
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
Jorge García
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...
John Gilligan
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
Cprime
 
4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education ITKaseya
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
SafetyChain Software
 
Patch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare ITPatch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare IT Kaseya
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
Maytal Levi
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
 
Upgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication systemUpgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication system
James Keener
 
TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)
TDiTechnologies
 

What's hot (20)

How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditing
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Ahmed
AhmedAhmed
Ahmed
 
Automating Enterprise IT Management
Automating Enterprise IT ManagementAutomating Enterprise IT Management
Automating Enterprise IT Management
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Patch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare ITPatch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare IT
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
Upgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication systemUpgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication system
 
TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)
 

Similar to DevOpsDays Chicago 2014 - Controlling Devops

DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Wendy Knox Everette
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
Marie Pagnotta
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
Steffan Stringer
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
Joel Cardella
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
Gene Kim
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
Jack Nichelson
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
Chris Gates
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
InSync Conference
 
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docxCHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
christinemaritza
 
Compliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management toolCompliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management tool
karisma hirapara
 
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]Barun Kumar
 
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
Puppet
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015
Bob Sokol
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
Jules Pierre-Louis
 

Similar to DevOpsDays Chicago 2014 - Controlling Devops (20)

We Bought Some Tools
We Bought Some ToolsWe Bought Some Tools
We Bought Some Tools
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docxCHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
 
Compliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management toolCompliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management tool
 
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
 
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

DevOpsDays Chicago 2014 - Controlling Devops

  • 1. Brian Henerey Director of Technology & Operations, OpinionLab bhenerey@gmail.com | @bhenerey | October 2014 Controlling Devops
  • 2. Me • Working in tech since 1998 • Discovered Puppet – 2006 • Discovered Devops – 2010 • First Devopsdays – TODAY!
  • 3. Trust us, we’re Engineers! • Did you delete those users accounts? • Do those automated backups work? • Do you know what code was released to Prod? • Who authorized those changes? • Who reviewed them? • Are people ssh-ing into Prod? Did they make any changes? • How many people have access to customer data?
  • 4. Trust, Actually • Trust is a core element of Devops • We want to trust and empower our people, that’s why we hired them • Yet, we need some controls in place…
  • 5. This Talk... • I’m going to briefly describe what a SOC2 is and how it works • I’m going to tell how to rub some Devops on one
  • 6. SOC(2) it to me A Report on the Controls at a Service Organization Relevant to: – Security – Availability – Confidentiality – Processing Integrity – Privacy These are called ‘Trust Services Principles’. Defined here: http://en.wikipedia.org/wiki/Service_Organization_Controls American Institute of CPAs (AICPA)
  • 7. Why would you want one? • To assert that your company meets all the criteria of the Trust Services Principles • You want an external auditor to make a statement that you’ve done this
  • 8. Who has SOC2 reports? • SaaS’s • Datacenters • AWS (http://blogs.aws.amazon.com/security/blog/tag/SOC+2)
  • 9. How does a SOC2 work? You/Your Org • Write System Description • Write Controls • Write Policies based on Controls • Write Assertion about your System Auditor • Helps you prepare the above • Performs audit for 3-12 months • Produces Auditor’s report
  • 10. What does the have to do with Devops? 1. Accountants are more familiar with traditional IT practices – Devops practices require different controls 2. A SOC2 is driven by mitigating risk. – So is DevOPs
  • 11. What about ITIL? • ITIL is the baby that got thrown out with the bathwater. • This is just my experience.
  • 12. Over-optimized for speed • There’s a ton more emphasis on speed of feature delivery than creating operable systems • You can not wish the operational pain away • So let’s put some controls in place at the start
  • 13. Getting started with Controls TSP Criteria Risk Example Control Your Control Evidence
  • 14. What is a Control? • Your organization’s practice for mitigating specific risks • Tip: You’re better off with multiple controls to address each Risk
  • 15. What kind of Controls are there? • AICPA introduced the ‘common criteria’ which cover: – Organization and management – Communications – Risk management and design and implementation of controls – Monitoring of controls – Logical and physical access of controls – System Operations – Change Management
  • 16. Example Control • Risk: “Breaches and incidents recur because preventive measures are not implemented after a previous event. “ • Control: “At least monthly, the Technology Management Team meet to review the Operations Review Register and discuss plan for resolution of issues, or recap of resolved issues.”
  • 17. Evidence of Control Performing Well • “Monthly meeting minutes OR checklist of categories of issues/projects discussed at meetings, attendees, date, and indication if any projects/issues need to be communicated to other employees.” • Tip: this is what you want automated or baked into your processes as much as possible. No one likes busy work
  • 18. Is a Control a Policy? No. • Controls are used only by the auditor • Policies and Procedures are written for employees with clear instructions on how to perform their jobs.
  • 19. How do I write a control? Auditor interviews me Auditor writes Review together
  • 20. How many controls will I need? • Around 200 – Maybe 20% of these are duplicates. The means the same control addresses multiple risks. • I spent 50-60 hours with the auditor writing controls over 2-3 months
  • 21. These are your Controls! • Start off by writing what your company actually does • The most valuable part of writing these controls is discovering areas to improve
  • 22. What do Accountants like? • Clarity • Hierarchy-based Approval • Consistency • Ownership • Accountability
  • 23. How is Devops different? • More collaboration • More autonomy • Less segregation of responsibilities • Broader range of impact – Systems, code, security, networks, databases • More bottom-up leadership
  • 24. Devops Criteria for writing Controls • Lightweight • Minimal impact to workflow • No bureaucracy • No busy work • Automate/bake-in all the evidence • Team members empowered to do their jobs
  • 25. Up-front versus Back-end Controls • Up-front control is more powerful, but more stifling – People cheat the system in favor of ‘getting things done’ • Devops controls are on the back-end: The team is trusted to make changes. We’ll review what changed after the fact. – Need multiple controls to increase the effectiveness
  • 26. Don’t fear the policy • Okay, maybe fear it a bit.
  • 27. Leverage your ticketing system • Already has history • Already can create reports • Easy to add approval to it • Can automate ticket creation for weekly/monthly/quarterly tasks • Easy to add screenshots or attachments as evidence
  • 28. Leverage your version control • Name your branches/commits based on Ticket- ID • Can review list of commits after deployment to make sure changes were approved/intended
  • 29. Leverage your tools + logging • Have your tools create log events – Who’s using the tool – Datestamp – What change was made – i.e. Chef-handler for logstash • https://github.com/lusis/logstash_handler
  • 30. Side benefit of doing this • The more you think about your organization, you’ll probably find things you should really be doing but aren’t. • You’ll also find you aren’t consistent in your behavior, which is why you need layers of Control.
  • 31. Example: Alert fatigue • You probably already have a policy on responding to alerts • If you’re not following this process, perhaps it’s because you have too many alerts, or they’re un-actionable • If it’s hard to follow your process, it’s because you have debt in your system which should be paid down
  • 32. Detailed example of a Control Common Criteria 5.6 “Logical access security measures have been implemented to protect against security, availability, or confidentiality threats from sources outside the boundaries of the system.”
  • 33. CC5.6 continued Risk “Threats to the system are obtained through external points of connectivity”
  • 34. CC5.6 Control examples 1 “For VOC system infrastructure components, logical access is controlled through each component's native security using group/role based permissions when possible. The Windows network is further protected by a 3rd party multi- factor authentication system.” Evidence: Network diagram that includes VOC infrastructure components
  • 35. CC5.6 Control example 2 “For VOC custom developed applications, logical access is controlled through role-based security with configurations stored in the applications' underlying database. For the 3rd party reporting tool that is integrated with the VOC custom developed applications, logical access is controlled through that tool's native security.” Evidence: Diagram or documentation that identifies the software/applications that comprise the VOC system
  • 36. CC5.6 Control example 3 “Firewalls are initially setup as deny all and then configured to allow access for approved services. At least quarterly, the configuration of each firewall is reviewed by the Technology Operations Team and updated as deemed necessary according to industry best practices.” Evidence: Quarterly review of firewall configuration indicating who reviewed, date reviewed, and steps taken (e.g. firewall rules updated to…).
  • 37. CC5.7 Control example 4 “Remote access to VOCF systems and infrastructure components requires single factor VPN authentication followed by a second factor authentication at the server or network level. Certain VOCF system component require two factor authentication.” Evidence: VPN configuration screen prints
  • 38. Thanks!! Questions? Special thanks to Mike Becker Partner-in-charge, Risks and Controls @ FGMK
  • 39. Judge a man by his questions rather than his answers -Voltaire