SlideShare a Scribd company logo
Emily Gladstone Cole @unixgeekem
How to be your Security
Team’s Best Friend
Emily Gladstone Cole @unixgeekem
Why listen to me talk about Ops and Security?
PAST
CURRENT
CONTACT
2
" UNIX SysAdmin/Operations background
" Transitioned to Security Incident Response/Security Research
" Senior Security Engineer at
" Mentor for SANS’ Women’s CyberTalent Immersion Academy
" Twitter: @unixgeekem
Emily Gladstone Cole @unixgeekem
Talk Agenda
1. Introduction
2. CIS Critical Security Controls
3. More Security Thoughts
Standard Disclaimer: The opinions expressed in this talk are my own and do
not represent the views of my employer.
Non-Standard Disclaimer: I hope you like cat photos.
3
Emily Gladstone Cole @unixgeekem
4
Emily Gladstone Cole @unixgeekem
5
Not
Rocket
Science
Emily Gladstone Cole @unixgeekem
The CIS Critical Security Controls
" Industry consensus guidelines
" Your security/compliance officer likes these
" 3 types: Basic, Foundational, and Organizational1
6
1. #TeamOxfordComma
Emily Gladstone Cole @unixgeekem
Emily Gladstone Cole @unixgeekem
7
Hardware Inventory
#1:
Hardware /
Asset
Inventory
Emily Gladstone Cole @unixgeekem
CSC 1: Inventory and Control of Hardware Assets
Questions you need to answer about your hardware/instances/containers:
" Network Access Control - how do you know what’s on your network?
" Automation - how do you keep your assets in a known state?
" Asset Management - how do you keep track of assets?
○ No, saying “a spreadsheet” or “a database” doesn’t count
8
Emily Gladstone Cole @unixgeekem
9
Software Inventory
#2:
Software
Inventory
Emily Gladstone Cole @unixgeekem
CSC 2: Inventory and Control of Software Assets
Questions you need to answer about your software:
" What software is running/installed in your infrastructure?
" Who installed the software?
" What does the software do?
10
Emily Gladstone Cole @unixgeekem
Track Expiration Dates Too
" Software Licenses
" Domains
" SSL Certificates
Don’t be this site
11
Emily Gladstone Cole @unixgeekem
Vulnerability Management
12
#3:
Continuous
Vulnerability
Management
Emily Gladstone Cole @unixgeekem
CSC 3: Continuous Vulnerability Management: Scanning
" Logos create buzz!
" Scan early, scan often
" Authenticated and non-authenticated
" Scan from inside and outside your perimeter2
13
2. If you have a perimeter
Emily Gladstone Cole @unixgeekem
14
A digression: Threat + Vulnerability =
Risk
Emily Gladstone Cole @unixgeekem
CSC 3: Continuous Vulnerability Management: Patching
" Understand your risks, and remediate the serious vulnerabilities.
○ Highest risk first is the best practice
● Use your automation to ensure updates are applied everywhere.
○ Though maybe you test first before you upgrade Python/Ruby in
your Production environment...
15
Emily Gladstone Cole @unixgeekem
16
#4:
Control
Admin
Privileges
Emily Gladstone Cole @unixgeekem
CSC 4: Controlled Use of Admin Privileges
" Separate out admin accounts from user accounts if you can.
" Use groups or roles.
" Consider functional names for your groups.
○ “sec-logging-read-only” is more informative than “logging”
17
Emily Gladstone Cole @unixgeekem
Least Privilege, Passwords, and Passphrases
Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental.
What if there was a company that didn’t set a root password for their
databases…
What if there was a company that didn’t change default credentials to the
admin interface of their website…
What if there was a company that let everyone ssh in as root…
18
Emily Gladstone Cole @unixgeekem
19
#5:
Secure
Default
Configs
Emily Gladstone Cole @unixgeekem
CSC 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
" Base your secure configs on a security standard.
" Don’t install software you don’t need to run your systems!
" Use Automation/Configuration Management tools to enforce security.
" Regularly evaluate the security of your Gold Images.
" Transition from policies to automation as your company grows.
20
Emily Gladstone Cole @unixgeekem
21
#6:
Log All
the
Things,
and
Review
the Logs
Emily Gladstone Cole @unixgeekem
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
" Log all the things.
○ Systems, security devices, applications, access points
" Collect all your logs somewhere and review them.
○ Review: not all done by hand!
" Outbound traffic is always interesting.
22
Emily Gladstone Cole @unixgeekem
Plus 14 More
" Email and Web Browser
Protections
" Malware Defenses
" Limitation and Control of Network
Ports, Protocols, and Services
" Data Recovery Capabilities
" Secure Configuration for Network
Devices, such as Firewalls,
Routers, and Switches
" Boundary Defense
" Data Protection
23
" Controlled Access Based on the
Need to Know
" Wireless Access Control
" Account Monitoring and Control
" Implement a Security Awareness
and Training Program
" Application Software Security
" Incident Response and
Management
" Penetration Tests and Red Team
Exercises
Emily Gladstone Cole @unixgeekem
Data
Protection:
it’s been in
the news a
lot lately
24
Emily Gladstone Cole @unixgeekem
Think before you check into GitHub
So many interesting things can be found in publicly-available GitHub repositories:
" Hardcoded passwords
" AWS Keys
" SSH Keys
" PGP Private Keys
" Internal hostnames
25
Emily Gladstone Cole @unixgeekem
Think AFTER you check into GitHub
So you’ve checked in some sensitive information?
" If you commit over it, it’s still in your commit history.
" Remove that commit.
" Rotate those credentials.
" Use TruffleHog to search for any remaining
sensitive data in your old commits.
26
Emily Gladstone Cole @unixgeekem
Remember those S3 Buckets
" AWS now sets S3 Buckets to be private by default.
" Amazon Macie monitors S3 to find insecure buckets.
" AWS Trusted Advisor will tell you about insecure buckets.
" Pro Tip: the “Authenticated Users” group means anyone who has
logged in to any AWS account, not just yours!
27
Emily Gladstone Cole @unixgeekem
But Wait,
There’s
More
28
Emily Gladstone Cole @unixgeekem
Emily Gladstone Cole @unixgeekem
Security Mindset
What would a malicious user do?
How can someone manipulate this URL?
Can someone submit a modified form?
What do my error messages tell an attacker about my infrastructure?
29
Emily Gladstone Cole @unixgeekem
Security and Technical Debt
Like logging, security is harder to do well when you’re adding it on after
the fact.
“I’ll set up security later” - will management let you fix that later if they
don’t agree it’s important to work on security now?
30
Emily Gladstone Cole @unixgeekem
31
Please address
your technical
debt.
Your security team
can help prioritize it if
you like.
Emily Gladstone Cole @unixgeekem
Security technical debt is not friendly credit card
debt. Security technical debt is the kind where the
debt collector mails you a piece of someone
precious to you as a reminder when a payment is
overdue. --unixorn on Hangops
32
Emily Gladstone Cole @unixgeekem
Some other good Security Practices
" Use secure coding principles (OWASP can help define these).
○ Remember to sanitize those inputs (aka Data Validation)
" Build security tests into your CI/CD pipeline.
" External reviewers can find things you miss.
" Diverse teammates bring different perspectives and make your
products and company stronger. Listen to them.
33
Emily Gladstone Cole @unixgeekem
Summing Up
" Keeping an inventory helps for security,
operations, and lifecycle management.
" Perfect security can be hard. The basics
aren’t.
" Don’t blame users for security issues.
Write/buy better tools for them instead.
34
Emily Gladstone Cole @unixgeekem
TL;DR - Ops probably already is your security team’s best friend.
You’re already doing most of the
things I discussed, right? If not,
please consider doing them.
Your security team will thank you.
35
Emily Gladstone Cole @unixgeekem
Thank you
36
Emily Gladstone Cole @unixgeekem
Emily Gladstone Cole @unixgeekem
References
" CIS Critical Security Controls: https://www.cisecurity.org/controls/
" NIST 800-53 Framework: https://nvd.nist.gov/800-53
" https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/
" Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA
" Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4
" truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog
" Security Training: https://www.sans.org/
" OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project
" Tech Debt from @ismonkeyuser: https://www.monkeyuser.com/2018/tech-debt/
" Cat images from pexels.com
37
Emily Gladstone Cole @unixgeekem
Got Questions?
" @unixgeekem on Twitter
" @unixgeekem on Hangops
38
Emily Gladstone Cole @unixgeekem
39
Emily Gladstone Cole @unixgeekem
40
Emily Gladstone Cole @unixgeekem
41
Emily Gladstone Cole @unixgeekem
42

More Related Content

What's hot

OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos Engineering
Aaron Rinehart
 
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment  v0.5 (Sep 2017)Scaling security in a cloud environment  v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
Dinis Cruz
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
Aaron Rinehart
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
Aaron Rinehart
 
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos EngineeringRSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
Aaron Rinehart
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Elasticsearch
 
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
Aaron Rinehart
 
dotSecurity2017
dotSecurity2017dotSecurity2017
dotSecurity2017
Zane Lackey
 
More Aim, Less Blame: How to use postmortems to turn failures into something ...
More Aim, Less Blame: How to use postmortems to turn failures into something ...More Aim, Less Blame: How to use postmortems to turn failures into something ...
More Aim, Less Blame: How to use postmortems to turn failures into something ...
Daniel Kanchev
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Clare Nelson, CISSP, CIPP-E
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Cameron Townshend
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
James Wickett
 
Building a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationBuilding a Modern Security Engineering Organization
Building a Modern Security Engineering Organization
Zane Lackey
 
Build reliable Svelte applications using Cypress
Build reliable Svelte applications using CypressBuild reliable Svelte applications using Cypress
Build reliable Svelte applications using Cypress
Maurice De Beijer [MVP]
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply Chain
Cameron Townshend
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven WierckxDevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon
 
Nick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs securityNick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs security
DevSecCon
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
SSIMeetup
 
Zero-Knowledge Proofs: Identity Proofing and Authentication
Zero-Knowledge Proofs: Identity Proofing and AuthenticationZero-Knowledge Proofs: Identity Proofing and Authentication
Zero-Knowledge Proofs: Identity Proofing and Authentication
Clare Nelson, CISSP, CIPP-E
 
Chaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in ProductionChaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in Production
Keet Sugathadasa
 

What's hot (20)

OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos Engineering
 
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment  v0.5 (Sep 2017)Scaling security in a cloud environment  v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos EngineeringRSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
 
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
Nexus User Conference DevOps "Table Stakes": The minimum required to play the...
 
dotSecurity2017
dotSecurity2017dotSecurity2017
dotSecurity2017
 
More Aim, Less Blame: How to use postmortems to turn failures into something ...
More Aim, Less Blame: How to use postmortems to turn failures into something ...More Aim, Less Blame: How to use postmortems to turn failures into something ...
More Aim, Less Blame: How to use postmortems to turn failures into something ...
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
Building a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationBuilding a Modern Security Engineering Organization
Building a Modern Security Engineering Organization
 
Build reliable Svelte applications using Cypress
Build reliable Svelte applications using CypressBuild reliable Svelte applications using Cypress
Build reliable Svelte applications using Cypress
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply Chain
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven WierckxDevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
 
Nick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs securityNick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs security
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
Zero-Knowledge Proofs: Identity Proofing and Authentication
Zero-Knowledge Proofs: Identity Proofing and AuthenticationZero-Knowledge Proofs: Identity Proofing and Authentication
Zero-Knowledge Proofs: Identity Proofing and Authentication
 
Chaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in ProductionChaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in Production
 

Similar to LISA18 - How to be your Security Team's Best Friend

How to be your Security Team's Best Friend
How to be your Security Team's Best FriendHow to be your Security Team's Best Friend
How to be your Security Team's Best Friend
EmilyGladstoneCole
 
Security and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsSecurity and DevOps are Really Best Friends
Security and DevOps are Really Best Friends
EmilyGladstoneCole
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
London School of Cyber Security
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile SecurityMichalis Kamprianis
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
My AWS Access Key Nightmares... and Solutions
My AWS Access Key Nightmares... and SolutionsMy AWS Access Key Nightmares... and Solutions
My AWS Access Key Nightmares... and Solutions
EmilyGladstoneCole
 
Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launchJoshua McKenty
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
TEST Huddle
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
Dinis Cruz
 
Technically Compliant: the best kind of compliant
Technically Compliant: the best kind of compliantTechnically Compliant: the best kind of compliant
Technically Compliant: the best kind of compliant
EmilyGladstoneCole
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
Naga Venkata Sunil Alamuri
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
Michael Gough
 
Hands-On Security - ES Guided Tour
Hands-On Security - ES Guided TourHands-On Security - ES Guided Tour
Hands-On Security - ES Guided Tour
Splunk
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
snyff
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
Claus Cramon Houmann
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
SeniorStoryteller
 
Add More Security To Your Testing and Automating - Saucecon 2021
Add More Security To Your Testing and Automating - Saucecon 2021Add More Security To Your Testing and Automating - Saucecon 2021
Add More Security To Your Testing and Automating - Saucecon 2021
Alan Richardson
 

Similar to LISA18 - How to be your Security Team's Best Friend (20)

How to be your Security Team's Best Friend
How to be your Security Team's Best FriendHow to be your Security Team's Best Friend
How to be your Security Team's Best Friend
 
Security and DevOps are Really Best Friends
Security and DevOps are Really Best FriendsSecurity and DevOps are Really Best Friends
Security and DevOps are Really Best Friends
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
 
My AWS Access Key Nightmares... and Solutions
My AWS Access Key Nightmares... and SolutionsMy AWS Access Key Nightmares... and Solutions
My AWS Access Key Nightmares... and Solutions
 
Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launch
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Technically Compliant: the best kind of compliant
Technically Compliant: the best kind of compliantTechnically Compliant: the best kind of compliant
Technically Compliant: the best kind of compliant
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Hands-On Security - ES Guided Tour
Hands-On Security - ES Guided TourHands-On Security - ES Guided Tour
Hands-On Security - ES Guided Tour
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
Add More Security To Your Testing and Automating - Saucecon 2021
Add More Security To Your Testing and Automating - Saucecon 2021Add More Security To Your Testing and Automating - Saucecon 2021
Add More Security To Your Testing and Automating - Saucecon 2021
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

LISA18 - How to be your Security Team's Best Friend

  • 1. Emily Gladstone Cole @unixgeekem How to be your Security Team’s Best Friend
  • 2. Emily Gladstone Cole @unixgeekem Why listen to me talk about Ops and Security? PAST CURRENT CONTACT 2 " UNIX SysAdmin/Operations background " Transitioned to Security Incident Response/Security Research " Senior Security Engineer at " Mentor for SANS’ Women’s CyberTalent Immersion Academy " Twitter: @unixgeekem
  • 3. Emily Gladstone Cole @unixgeekem Talk Agenda 1. Introduction 2. CIS Critical Security Controls 3. More Security Thoughts Standard Disclaimer: The opinions expressed in this talk are my own and do not represent the views of my employer. Non-Standard Disclaimer: I hope you like cat photos. 3
  • 4. Emily Gladstone Cole @unixgeekem 4
  • 5. Emily Gladstone Cole @unixgeekem 5 Not Rocket Science
  • 6. Emily Gladstone Cole @unixgeekem The CIS Critical Security Controls " Industry consensus guidelines " Your security/compliance officer likes these " 3 types: Basic, Foundational, and Organizational1 6 1. #TeamOxfordComma Emily Gladstone Cole @unixgeekem
  • 7. Emily Gladstone Cole @unixgeekem 7 Hardware Inventory #1: Hardware / Asset Inventory
  • 8. Emily Gladstone Cole @unixgeekem CSC 1: Inventory and Control of Hardware Assets Questions you need to answer about your hardware/instances/containers: " Network Access Control - how do you know what’s on your network? " Automation - how do you keep your assets in a known state? " Asset Management - how do you keep track of assets? ○ No, saying “a spreadsheet” or “a database” doesn’t count 8
  • 9. Emily Gladstone Cole @unixgeekem 9 Software Inventory #2: Software Inventory
  • 10. Emily Gladstone Cole @unixgeekem CSC 2: Inventory and Control of Software Assets Questions you need to answer about your software: " What software is running/installed in your infrastructure? " Who installed the software? " What does the software do? 10
  • 11. Emily Gladstone Cole @unixgeekem Track Expiration Dates Too " Software Licenses " Domains " SSL Certificates Don’t be this site 11
  • 12. Emily Gladstone Cole @unixgeekem Vulnerability Management 12 #3: Continuous Vulnerability Management
  • 13. Emily Gladstone Cole @unixgeekem CSC 3: Continuous Vulnerability Management: Scanning " Logos create buzz! " Scan early, scan often " Authenticated and non-authenticated " Scan from inside and outside your perimeter2 13 2. If you have a perimeter
  • 14. Emily Gladstone Cole @unixgeekem 14 A digression: Threat + Vulnerability = Risk
  • 15. Emily Gladstone Cole @unixgeekem CSC 3: Continuous Vulnerability Management: Patching " Understand your risks, and remediate the serious vulnerabilities. ○ Highest risk first is the best practice ● Use your automation to ensure updates are applied everywhere. ○ Though maybe you test first before you upgrade Python/Ruby in your Production environment... 15
  • 16. Emily Gladstone Cole @unixgeekem 16 #4: Control Admin Privileges
  • 17. Emily Gladstone Cole @unixgeekem CSC 4: Controlled Use of Admin Privileges " Separate out admin accounts from user accounts if you can. " Use groups or roles. " Consider functional names for your groups. ○ “sec-logging-read-only” is more informative than “logging” 17
  • 18. Emily Gladstone Cole @unixgeekem Least Privilege, Passwords, and Passphrases Any resemblance to actual companies, existing or defunct, or actual events, is purely coincidental. What if there was a company that didn’t set a root password for their databases… What if there was a company that didn’t change default credentials to the admin interface of their website… What if there was a company that let everyone ssh in as root… 18
  • 19. Emily Gladstone Cole @unixgeekem 19 #5: Secure Default Configs
  • 20. Emily Gladstone Cole @unixgeekem CSC 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers " Base your secure configs on a security standard. " Don’t install software you don’t need to run your systems! " Use Automation/Configuration Management tools to enforce security. " Regularly evaluate the security of your Gold Images. " Transition from policies to automation as your company grows. 20
  • 21. Emily Gladstone Cole @unixgeekem 21 #6: Log All the Things, and Review the Logs
  • 22. Emily Gladstone Cole @unixgeekem CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs " Log all the things. ○ Systems, security devices, applications, access points " Collect all your logs somewhere and review them. ○ Review: not all done by hand! " Outbound traffic is always interesting. 22
  • 23. Emily Gladstone Cole @unixgeekem Plus 14 More " Email and Web Browser Protections " Malware Defenses " Limitation and Control of Network Ports, Protocols, and Services " Data Recovery Capabilities " Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches " Boundary Defense " Data Protection 23 " Controlled Access Based on the Need to Know " Wireless Access Control " Account Monitoring and Control " Implement a Security Awareness and Training Program " Application Software Security " Incident Response and Management " Penetration Tests and Red Team Exercises
  • 24. Emily Gladstone Cole @unixgeekem Data Protection: it’s been in the news a lot lately 24
  • 25. Emily Gladstone Cole @unixgeekem Think before you check into GitHub So many interesting things can be found in publicly-available GitHub repositories: " Hardcoded passwords " AWS Keys " SSH Keys " PGP Private Keys " Internal hostnames 25
  • 26. Emily Gladstone Cole @unixgeekem Think AFTER you check into GitHub So you’ve checked in some sensitive information? " If you commit over it, it’s still in your commit history. " Remove that commit. " Rotate those credentials. " Use TruffleHog to search for any remaining sensitive data in your old commits. 26
  • 27. Emily Gladstone Cole @unixgeekem Remember those S3 Buckets " AWS now sets S3 Buckets to be private by default. " Amazon Macie monitors S3 to find insecure buckets. " AWS Trusted Advisor will tell you about insecure buckets. " Pro Tip: the “Authenticated Users” group means anyone who has logged in to any AWS account, not just yours! 27
  • 28. Emily Gladstone Cole @unixgeekem But Wait, There’s More 28 Emily Gladstone Cole @unixgeekem
  • 29. Emily Gladstone Cole @unixgeekem Security Mindset What would a malicious user do? How can someone manipulate this URL? Can someone submit a modified form? What do my error messages tell an attacker about my infrastructure? 29
  • 30. Emily Gladstone Cole @unixgeekem Security and Technical Debt Like logging, security is harder to do well when you’re adding it on after the fact. “I’ll set up security later” - will management let you fix that later if they don’t agree it’s important to work on security now? 30
  • 31. Emily Gladstone Cole @unixgeekem 31 Please address your technical debt. Your security team can help prioritize it if you like.
  • 32. Emily Gladstone Cole @unixgeekem Security technical debt is not friendly credit card debt. Security technical debt is the kind where the debt collector mails you a piece of someone precious to you as a reminder when a payment is overdue. --unixorn on Hangops 32
  • 33. Emily Gladstone Cole @unixgeekem Some other good Security Practices " Use secure coding principles (OWASP can help define these). ○ Remember to sanitize those inputs (aka Data Validation) " Build security tests into your CI/CD pipeline. " External reviewers can find things you miss. " Diverse teammates bring different perspectives and make your products and company stronger. Listen to them. 33
  • 34. Emily Gladstone Cole @unixgeekem Summing Up " Keeping an inventory helps for security, operations, and lifecycle management. " Perfect security can be hard. The basics aren’t. " Don’t blame users for security issues. Write/buy better tools for them instead. 34
  • 35. Emily Gladstone Cole @unixgeekem TL;DR - Ops probably already is your security team’s best friend. You’re already doing most of the things I discussed, right? If not, please consider doing them. Your security team will thank you. 35
  • 36. Emily Gladstone Cole @unixgeekem Thank you 36 Emily Gladstone Cole @unixgeekem
  • 37. Emily Gladstone Cole @unixgeekem References " CIS Critical Security Controls: https://www.cisecurity.org/controls/ " NIST 800-53 Framework: https://nvd.nist.gov/800-53 " https://blog.rapid7.com/2017/04/19/the-cis-critical-security-controls-series/ " Rob Joyce at Enigma 2016: https://www.youtube.com/watch?v=bDJb8WOJYdA " Dylan Ayrey at BSides SF 2018: https://www.youtube.com/watch?v=TV2hHeKj4-4 " truffleHog finds secrets in GitHub repos: https://github.com/dxa4481/truffleHog " Security Training: https://www.sans.org/ " OWASP Developer Guide: https://www.owasp.org/index.php/OWASP_Guide_Project " Tech Debt from @ismonkeyuser: https://www.monkeyuser.com/2018/tech-debt/ " Cat images from pexels.com 37
  • 38. Emily Gladstone Cole @unixgeekem Got Questions? " @unixgeekem on Twitter " @unixgeekem on Hangops 38
  • 39. Emily Gladstone Cole @unixgeekem 39
  • 40. Emily Gladstone Cole @unixgeekem 40
  • 41. Emily Gladstone Cole @unixgeekem 41
  • 42. Emily Gladstone Cole @unixgeekem 42