SlideShare a Scribd company logo
M I C R O W A V E S V S H U M A N S
W E ’ R E D O N E
A U T O M A T I N G ,
R I G H T ?
• Config management
• Infrastructure as code
• CI/CD for infrastructure
• Automated IaaS Provisioning
4 A R E A S T O I M P R O V E
• One-Off tasks
• Disposable Infrastructure
• Networking
• Security Monitoring
“Lord Packet Cuddles” or “sg-116b7e3e4169”
V P N ≠ S E C U R E
S E C U R I T Y
M O N I T O R I N G
• SSH success/failures
• Failed login attempts
• Password resets
• SSH egress
• Dependent services
C O R R E L A T I O N
• IaaS change log
• Version control updates
• Continuous Deployment log
• What happened?
T H A N K S !
@ D L A P I D U Z

More Related Content

What's hot

Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape Presentation
Doug McTighe
 
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс....NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
NETFest
 
Fintech week london 2014
Fintech week london 2014Fintech week london 2014
Fintech week london 2014
Mauro Rappa
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeez
NetBeez, Inc.
 
Internet Protocol version6
Internet Protocol version6Internet Protocol version6
Internet Protocol version6bhavin008
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
Kyle Wilhoit
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Rivetz
 
Decentralising data distribution
Decentralising data distributionDecentralising data distribution
Decentralising data distribution
dennis_martensson
 
NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016
NetBeez, Inc.
 
Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2
IxiaRomania
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecurityTzoori Tamam
 
Achieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX ControllerAchieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX Controller
NGINX, Inc.
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
Shain Singh
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
Mona Arkhipova
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
Mona Arkhipova
 
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEAAchieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
NGINX, Inc.
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Rivetz
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentation
Muhammad Saif Ul Islam
 
Icinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
Icinga Camp Kuala Lumpur 2015 Opening By Eric LippmannIcinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
Icinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
Icinga
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
Mofizur Rahman
 

What's hot (20)

Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape Presentation
 
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс....NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
.NET Fest 2018. Андрей Тарарака. Как порулить грузовиком в Австралии, находяс...
 
Fintech week london 2014
Fintech week london 2014Fintech week london 2014
Fintech week london 2014
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeez
 
Internet Protocol version6
Internet Protocol version6Internet Protocol version6
Internet Protocol version6
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted Computing
 
Decentralising data distribution
Decentralising data distributionDecentralising data distribution
Decentralising data distribution
 
NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016
 
Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric Security
 
Achieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX ControllerAchieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX Controller
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
 
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEAAchieve Full API Lifecycle Management Using NGINX Controller – EMEA
Achieve Full API Lifecycle Management Using NGINX Controller – EMEA
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted Computing
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentation
 
Icinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
Icinga Camp Kuala Lumpur 2015 Opening By Eric LippmannIcinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
Icinga Camp Kuala Lumpur 2015 Opening By Eric Lippmann
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Microwaves vs Humans: How to secure your cloud

  • 1. M I C R O W A V E S V S H U M A N S
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. W E ’ R E D O N E A U T O M A T I N G , R I G H T ? • Config management • Infrastructure as code • CI/CD for infrastructure • Automated IaaS Provisioning
  • 7. 4 A R E A S T O I M P R O V E • One-Off tasks • Disposable Infrastructure • Networking • Security Monitoring
  • 8.
  • 9.
  • 10.
  • 11. “Lord Packet Cuddles” or “sg-116b7e3e4169”
  • 12.
  • 13. V P N ≠ S E C U R E
  • 14.
  • 15.
  • 16. S E C U R I T Y M O N I T O R I N G • SSH success/failures • Failed login attempts • Password resets • SSH egress • Dependent services
  • 17.
  • 18. C O R R E L A T I O N • IaaS change log • Version control updates • Continuous Deployment log • What happened?
  • 19.
  • 20. T H A N K S ! @ D L A P I D U Z

Editor's Notes

  1. Microwaves are great, right? Can make coffee, defrost a chicken, pretty ok stuff But according to a WH official they can turn into cameras and spy on us You may laugh at it but it is kind of how we feel for everything in the cloud https://flic.kr/p/2rTc1
  2. Whenever there is a new research paper out with edge security implications we all start to freak out And we get calls about how does this impact us. Are all our credit cards going to get stolen because of the SHA1 collisions paper publication? The answer is probably no…
  3. One approach is to say FAKE NEWS! Security research is fake news Lets all set the password to “password1” and forget about it all Whats the worst thing that could happen.
  4. I don’t think anyone here would say “lets totally ignore security” But I’d bet that most of you know more than one thing that could be improved What I want to say here today is that we should stop worrying about the fringe cases and look for lower hanging fruits that you might not even know are there. - The main problem in reality is not microwaves spying on us but humans making poor choices. And because we are now in a DevOps world where developers have a lot more power on our production systems we need to watch out for those things. My main argument is that we should stop letting people do “insecure” things and build automated processes that secure our systems
  5. • When we talk about security we don’t talk in absolutes though. A system will not suddenly become more secure because there are less humans touching it • We talk in terms of posture, in the face of an attacker, how likely are we to resist an attack. • Having “mycat” as password doesn’t mean that I am going to get hacked but it makes it a whole lot easier than using a 4k key https://unsplash.com/search/security?photo=fPxOowbR6ls
  6. But we have configuration management, we even have tests for our configuration management, that is all we need, right?? There are many ways to do config management and automation, Have you thought how security impacts all that automation? And there are a lot of things that we can improve as a community
  7. • 4 main sections of things we can improve ◦ One off tasks ◦ Disposability ◦ Networking ◦ Monitoring
  8. One-off tasks • Configure keys, Install an SSH key, setup TLS certificates, create your scaffolding infrastructure • All one-off, right? Nope. The fact that you don’t do it often it doesn’t mean that you shouldn’t automate it
  9. • If you automate the one-off tasks they become regular tasks Repetition makes mastery • Your security posture becomes very different once your keys are rotated daily instead of yearly. If a key is compromised it will be a problem for a day at most and if you know about it you can just run the task to rotate everything
  10. “But if you have your key compromised even for a minute an attacker can add a backdoor on your system!” You say… • Right, the next thing is that we need to treat infrastructure as disposable and have automated systems to replace it •  I love the idea of Docker of having uptime for servers as a countdown instead of a measure of pride What does it mean to have disposable infrastructure? https://upload.wikimedia.org/wikipedia/commons/3/3f/Trash_Recycling_with_Disposal_Containers.jpg
  11. It doesn’t mean being able to set the services on fire or trashing your laptop. It means being able to rebuild your servers, containers, networks without caring about the individual components. It means having automated processes so anyone can click a button and recreate everything. It means having HA so your system can handle components being down. If you have to give your subnets a name then we are in trouble. (BTW I just named my favorite security group Lord Packet Cuddles) https://flic.kr/p/cQbkVS
  12. Now that we have automated processes to do one-off tasks and have disposable infrastructure with scripts to generate it we should talk about one of the lowest hanging fruits after that. That is networking. When we set networks up we tend to be somewhat lazy. “This is a private subnet”, “This is a public subnet”. Everything on each subnet can talk to each other! If I am on the VPN I can talk to everything
  13. Please stop trusting networks! For real, we have to stop. VPN, select IPs, CIDR blocks can be use as a layer but you should still limit access. Your thermostat probably doesn’t need access to your servers For each group of VMs you want to segregate create a different subnet. Use bastion hosts to access them if necessary. You can create VMs with multiple network interfaces.
  14. We should leverage all the automation to create stricter rules. Instead of trusting full subnets, you can trust security groups. And create as many security groups as you need, stop opening SSH for all the boxes! The further segmentation you have the less likely user derived (aka human) screwups are going happen.
  15. After all this automation we have improved quite a bit our security posture Everything is fantastic, I have the super duper system that no one can penetrate. Welllll…. Are we sure that we haven’t been owned? How can we tell? We need monitoring! Duh I have monitoring I monitoring all the CPUs, all the memories, all the four golden signals!
  16. J’acuse! It is great that you availability monitoring but you also need security monitoring. Are you monitoring failed login attempts? SSH success/failures? One of my favorite security metrics is SSH egresses, are people trying to create tunnels into your network? https://www.nasa.gov/images/content/64944main_ffs_gallery_mcc_hires2.jpg
  17. Remember to apply all the same rules for your security monitoring and solutions too. Security tools are often a point of entry for attackers.
  18. This are all just ideas on how we can all improve our security. This is not about complex or advanced stuff The cloud.gov built almost all this stuff in a shoestring budget using public cloud. The APIs and the tools are out there and its a matter of just using them. I am likely going to use one of your systems and you are probably going to use one of mine. We can all benefit from better automation in infrastructure and security. Once you set all of this up you are going to love it. Manual password/key/infrastructure rotation sucks https://flic.kr/p/bD6jZH
  19. Thank you so much, I’d love to chat more about new approaches to prevent human mishaps and improve automation. Stay paranoid my friends