SlideShare a Scribd company logo
1 of 37
Download to read offline
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
How to be your Security
Team’s Best Friend
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Talk Agenda
1. Introduction
2. CIS Critical Security Controls
3. More Security Thoughts
Standard Disclaimer: The opinions expressed in this talk are my own and do
not represent the views of my employer.
Non-Standard Disclaimer: I hope you like cat photos.
2
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
About Me
PAST
CURRENT
CONTACT
3
● UNIX SysAdmin/Operations background
● Transitioned to Security Incident Response/Security Research
● Senior Security Engineer at
● Mentor for SANS’ Women’s CyberTalent Immersion Academy
● Twitter: @unixgeekem
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
4
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
The CIS Critical Security Controls
● Industry consensus guidelines
● 3 types: Basic, Foundational, and Organizational1
5
1. #TeamOxfordComma
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
6
Not
Rocket
Science
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
7
Hardware Inventory
#1:
Hardware /
Asset
Inventory
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 1: Inventory and Control of Hardware Assets
Questions you need to answer about your hardware:
● Network Access Control - how do you know what’s on your network?
● Automation - how do you keep your assets in a known state?
● Asset Management - how do you keep track of assets?
○ No, saying “a spreadsheet” or “a database” doesn’t count
8
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Shadow IT
9
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
10
Software Inventory #2:
Software
Inventory
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 2: Inventory and Control of Software Assets
Questions you need to answer about your software:
● What software is on your systems?
● Who installed the software?
● What does the software do?
11
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Track Expiration Dates Too
● Software Licenses
● Domains
● SSL Certificates
Don’t be this site
12
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Vulnerability Management
13
#3:
Continuous
Vulnerability
Management
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 3: Continuous Vulnerability Management: Scanning
● Logos create buzz!
● Scan early, scan often
● Scan from inside and outside your perimeter
14
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
15
A digression: Threat + Vulnerability = Risk
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 3: Continuous Vulnerability Management: Patching
● Understand your risks, and remediate the serious vulnerabilities.
○ Highest risk first is the best practice
● Use your automation to ensure updates are applied everywhere.
○ Though maybe you test first before you upgrade Python/Ruby in
your Production environment...
16
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
17
#4:
Control
Admin
Privileges
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 4: Controlled Use of Admin Privileges
● Separate out admin accounts from user accounts if you can.
● Use groups or roles.
● Consider functional names for your groups.
○ “sec-logging-read-only” is more informative than “logging”
18
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
19
#5:
Secure
Default
Configs
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 5: Secure Configuration for Hardware and Software on Mobile
Devices, Laptops, Workstations, and Servers
● Base your secure configs on a security standard.
● Use Automation/Configuration Management tools to enforce security.
○ Make sure changes are known and tracked (Change Management)
● Regularly evaluate the security of your Gold Images.
● Start with user directives, then automate them as your company
evolves.
20
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
21
#6:
Log All
the
Things,
and
Review
the Logs
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
● Log all the things.
○ Systems, security devices, applications, access points
● Outbound traffic is always interesting.
● Collect all your logs somewhere and review them.
○ Side rant: SIEM, the buzzword
22
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Plus 14 More
● Email and Web Browser Protections
● Malware Defenses
● Limitation and Control of Network Ports,
Protocols, and Services
● Data Recovery Capabilities
● Secure Configuration for Network Devices,
such as Firewalls, Routers, and Switches
● Boundary Defense
● Data Protection
23
● Controlled Access Based on the Need to
Know
● Wireless Access Control
● Account Monitoring and Control
● Implement a Security Awareness and
Training Program
● Application Software Security
● Incident Response and Management
● Penetration Tests and Red Team Exercises
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Data Protection: it’s been in the news a
lot lately
24
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Think before you check into GitHub
So many interesting things can be found in publicly-available GitHub repositories:
● Hardcoded passwords
● AWS Keys
● SSH Keys
● PGP Private Keys
● Internal hostnames
25
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Think AFTER you check into GitHub
So you’ve checked in some sensitive information?
● If you commit over it, it’s still in your commit
history.
● Remove that commit.
● Rotate those credentials.
● Use TruffleHog to search for any remaining
sensitive data in your old commits.
26
P.S. May 25th is Towel Day
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Remember those S3 Buckets
● AWS now sets S3 Buckets to be private by default.
● Amazon Macie monitors S3 to find insecure buckets.
● Bucket names are important too.
○ S3 bucket names are unique, and it’s easy to enumerate the names.
Hackers may guess that important data is stored in buckets whose
names start with Prod, or with your company name.
27
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
But Wait, There’s More
28
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security Mindset
In QA, and when you’re trying to think like a user, you say “what would an ignorant user
do?” and you click on everything and put in weird inputs.
In Security, you say “what would a malicious user do?” and once again you click on
everything and put in weird inputs (these may have control characters, encrypted content,
or code in them too), and you think about what a hacker might do if she got an odd or
inconsistent result, or if she tried to change a form or an input URL. When you try to
anticipate all the ways that your software and technologies can be manipulated, that’s an
example of the security mindset.
29
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Passwords: please use them (or passphrases)
Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental.
What if there was a company that didn’t set a root password for their
databases…
What if there was a company that didn’t change default credentials to the
admin interface of their website…
What if there was a company that let everyone ssh in as root…
30
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security and Technical Debt
Like logging, security is harder to do well when you’re adding it on after the
fact.
“I’ll set up logging later” - will management let you fix that later if they don’t
agree it’s important to work on logging now?
31
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Security technical debt is not friendly credit card
debt. Security technical debt is the kind where the
debt collector mails you a piece of someone
precious to you as a reminder when a payment is
overdue. --unixorn on Hangops
32
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Some other good Security Practices
● Use secure coding principles (OWASP can help define these).
○ Remember to sanitize those inputs (aka Data Validation)
● Build security tests into your CI/CD pipeline.
● External reviewers can find things you miss.
● Diverse teammates bring different perspectives.
● Everyone clicks on things they shouldn’t. Don’t blame the people.
33
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
TL;DR - Ops probably already is your security team’s best friend.
You’re already doing most of the
things I discussed, right? If not,
please consider doing them. Your
security team will thank you.
34
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Thank you
35
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
Got Questions?
● #devopsdays on Twitter
● @unixgeekem on Twitter
● @unixgeekem on Hangops
36
Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018
References
● CIS Critical Security Controls: https://www.cisecurity.org/controls/
● NIST 800-53 Framework: https://nvd.nist.gov/800-53
● https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/
● Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA
● Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4
● truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog
● Security Training: https://www.sans.org/
● GDPR Info: http://gdprandyou.ie/
● OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project
● Cat images from pexels.com
37

More Related Content

What's hot

The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityVodqaBLR
 
AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 Aaron Rinehart
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayYusuf Hadiwinata Sutandar
 
Building a (Really) Secure Cloud Product
Building a (Really) Secure Cloud ProductBuilding a (Really) Secure Cloud Product
Building a (Really) Secure Cloud ProductGuy K. Kloss
 
OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringAaron Rinehart
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8sDevOps Indonesia
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)Dinis Cruz
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringAaron Rinehart
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringAaron Rinehart
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...Jakub "Kuba" Sendor
 
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)Dinis Cruz
 
PyConPL 2017 - with python: security
PyConPL 2017 - with python: securityPyConPL 2017 - with python: security
PyConPL 2017 - with python: securityPiotr Dyba
 
QAing the security way!
QAing the security way!QAing the security way!
QAing the security way!Amit Gundiyal
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
 
AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorjtmelton
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering Aaron Rinehart
 

What's hot (20)

The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
 
AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source Way
 
Building a (Really) Secure Cloud Product
Building a (Really) Secure Cloud ProductBuilding a (Really) Secure Cloud Product
Building a (Really) Secure Cloud Product
 
OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos Engineering
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos Engineering
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...
 
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
PyConPL 2017 - with python: security
PyConPL 2017 - with python: securityPyConPL 2017 - with python: security
PyConPL 2017 - with python: security
 
QAing the security way!
QAing the security way!QAing the security way!
QAing the security way!
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensor
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 

Similar to How to be your Security Team's Best Friend

Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecurityTara Arnold
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecurityMediacurrent
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybSeniorStoryteller
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdfKunjJoshi14
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
 
Security and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsSecurity and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsEmilyGladstoneCole
 
Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dwolla
 
Break up the Monolith: Testing Microservices
Break up the Monolith: Testing MicroservicesBreak up the Monolith: Testing Microservices
Break up the Monolith: Testing MicroservicesMarcus Merrell
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)abend_cve_9999_0001
 
HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software jamieayre
 
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerDEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerJorge Orchilles
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationIves Laaf
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldNCCOMMS
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 MatrixJorge Orchilles
 

Similar to How to be your Security Team's Best Friend (20)

Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Security and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsSecurity and DevOps are Really Best Friends
Security and DevOps are Really Best Friends
 
Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!
 
Break up the Monolith: Testing Microservices
Break up the Monolith: Testing MicroservicesBreak up the Monolith: Testing Microservices
Break up the Monolith: Testing Microservices
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Is my app secure?
Is my app secure?Is my app secure?
Is my app secure?
 
Is My App Secure ?
 Is My App Secure ? Is My App Secure ?
Is My App Secure ?
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software
 
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLockerDEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

How to be your Security Team's Best Friend

  • 1. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 How to be your Security Team’s Best Friend
  • 2. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Talk Agenda 1. Introduction 2. CIS Critical Security Controls 3. More Security Thoughts Standard Disclaimer: The opinions expressed in this talk are my own and do not represent the views of my employer. Non-Standard Disclaimer: I hope you like cat photos. 2
  • 3. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 About Me PAST CURRENT CONTACT 3 ● UNIX SysAdmin/Operations background ● Transitioned to Security Incident Response/Security Research ● Senior Security Engineer at ● Mentor for SANS’ Women’s CyberTalent Immersion Academy ● Twitter: @unixgeekem
  • 4. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 4
  • 5. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 The CIS Critical Security Controls ● Industry consensus guidelines ● 3 types: Basic, Foundational, and Organizational1 5 1. #TeamOxfordComma
  • 6. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 6 Not Rocket Science
  • 7. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 7 Hardware Inventory #1: Hardware / Asset Inventory
  • 8. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 1: Inventory and Control of Hardware Assets Questions you need to answer about your hardware: ● Network Access Control - how do you know what’s on your network? ● Automation - how do you keep your assets in a known state? ● Asset Management - how do you keep track of assets? ○ No, saying “a spreadsheet” or “a database” doesn’t count 8
  • 9. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Shadow IT 9
  • 10. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 10 Software Inventory #2: Software Inventory
  • 11. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 2: Inventory and Control of Software Assets Questions you need to answer about your software: ● What software is on your systems? ● Who installed the software? ● What does the software do? 11
  • 12. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Track Expiration Dates Too ● Software Licenses ● Domains ● SSL Certificates Don’t be this site 12
  • 13. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Vulnerability Management 13 #3: Continuous Vulnerability Management
  • 14. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 3: Continuous Vulnerability Management: Scanning ● Logos create buzz! ● Scan early, scan often ● Scan from inside and outside your perimeter 14
  • 15. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 15 A digression: Threat + Vulnerability = Risk
  • 16. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 3: Continuous Vulnerability Management: Patching ● Understand your risks, and remediate the serious vulnerabilities. ○ Highest risk first is the best practice ● Use your automation to ensure updates are applied everywhere. ○ Though maybe you test first before you upgrade Python/Ruby in your Production environment... 16
  • 17. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 17 #4: Control Admin Privileges
  • 18. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 4: Controlled Use of Admin Privileges ● Separate out admin accounts from user accounts if you can. ● Use groups or roles. ● Consider functional names for your groups. ○ “sec-logging-read-only” is more informative than “logging” 18
  • 19. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 19 #5: Secure Default Configs
  • 20. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers ● Base your secure configs on a security standard. ● Use Automation/Configuration Management tools to enforce security. ○ Make sure changes are known and tracked (Change Management) ● Regularly evaluate the security of your Gold Images. ● Start with user directives, then automate them as your company evolves. 20
  • 21. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 21 #6: Log All the Things, and Review the Logs
  • 22. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs ● Log all the things. ○ Systems, security devices, applications, access points ● Outbound traffic is always interesting. ● Collect all your logs somewhere and review them. ○ Side rant: SIEM, the buzzword 22
  • 23. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Plus 14 More ● Email and Web Browser Protections ● Malware Defenses ● Limitation and Control of Network Ports, Protocols, and Services ● Data Recovery Capabilities ● Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches ● Boundary Defense ● Data Protection 23 ● Controlled Access Based on the Need to Know ● Wireless Access Control ● Account Monitoring and Control ● Implement a Security Awareness and Training Program ● Application Software Security ● Incident Response and Management ● Penetration Tests and Red Team Exercises
  • 24. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Data Protection: it’s been in the news a lot lately 24
  • 25. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Think before you check into GitHub So many interesting things can be found in publicly-available GitHub repositories: ● Hardcoded passwords ● AWS Keys ● SSH Keys ● PGP Private Keys ● Internal hostnames 25
  • 26. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Think AFTER you check into GitHub So you’ve checked in some sensitive information? ● If you commit over it, it’s still in your commit history. ● Remove that commit. ● Rotate those credentials. ● Use TruffleHog to search for any remaining sensitive data in your old commits. 26 P.S. May 25th is Towel Day
  • 27. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Remember those S3 Buckets ● AWS now sets S3 Buckets to be private by default. ● Amazon Macie monitors S3 to find insecure buckets. ● Bucket names are important too. ○ S3 bucket names are unique, and it’s easy to enumerate the names. Hackers may guess that important data is stored in buckets whose names start with Prod, or with your company name. 27
  • 28. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 But Wait, There’s More 28
  • 29. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security Mindset In QA, and when you’re trying to think like a user, you say “what would an ignorant user do?” and you click on everything and put in weird inputs. In Security, you say “what would a malicious user do?” and once again you click on everything and put in weird inputs (these may have control characters, encrypted content, or code in them too), and you think about what a hacker might do if she got an odd or inconsistent result, or if she tried to change a form or an input URL. When you try to anticipate all the ways that your software and technologies can be manipulated, that’s an example of the security mindset. 29
  • 30. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Passwords: please use them (or passphrases) Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental. What if there was a company that didn’t set a root password for their databases… What if there was a company that didn’t change default credentials to the admin interface of their website… What if there was a company that let everyone ssh in as root… 30
  • 31. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security and Technical Debt Like logging, security is harder to do well when you’re adding it on after the fact. “I’ll set up logging later” - will management let you fix that later if they don’t agree it’s important to work on logging now? 31
  • 32. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Security technical debt is not friendly credit card debt. Security technical debt is the kind where the debt collector mails you a piece of someone precious to you as a reminder when a payment is overdue. --unixorn on Hangops 32
  • 33. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Some other good Security Practices ● Use secure coding principles (OWASP can help define these). ○ Remember to sanitize those inputs (aka Data Validation) ● Build security tests into your CI/CD pipeline. ● External reviewers can find things you miss. ● Diverse teammates bring different perspectives. ● Everyone clicks on things they shouldn’t. Don’t blame the people. 33
  • 34. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 TL;DR - Ops probably already is your security team’s best friend. You’re already doing most of the things I discussed, right? If not, please consider doing them. Your security team will thank you. 34
  • 35. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Thank you 35
  • 36. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 Got Questions? ● #devopsdays on Twitter ● @unixgeekem on Twitter ● @unixgeekem on Hangops 36
  • 37. Emily Gladstone Cole @unixgeekem DevOpsDaysSV 2018 References ● CIS Critical Security Controls: https://www.cisecurity.org/controls/ ● NIST 800-53 Framework: https://nvd.nist.gov/800-53 ● https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/ ● Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA ● Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4 ● truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog ● Security Training: https://www.sans.org/ ● GDPR Info: http://gdprandyou.ie/ ● OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project ● Cat images from pexels.com 37