Erik Costlow
Why is Erik talking
Java 8. From frequent exploits to a two-year shut-out of 0-days.
Managed Java root certificate program, breaking 7-year deadlock.
Contrast Security. Continuous self-defending software. Works inside of
applications and has actual context.
Turbonomic. Product management, IT performance assurance & cloud
migration. Crossed $100M revenue.
Developer course author. Graph analysis with Java, Hands-on
Cryptography, Basic Data analysis, etc. Packt Publishing.
Agenda
1. Cloud migration strategies
2. How applications are at risk
3. How to defend applications
I expect that WHY people go to the cloud is clear.
We will jump straight to doing it securely.
AWS Cloud Migration Whitepaper
https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf
The 2015 layout is cleaner than the 2018 version.
The layout in words:
The 6 Rs of Migration
1. Re-Host
2. Re-Platform
3. Re-factor / Re-architect
4. Re-Purchase
5. Retire
6. Retain
Bringing security along
1. Explode (no perimeter)
2. Offload (virtualize)
3. Reload (with things that work)
Arrrrrrrr, there be
six Rs in a cloud
migration.
https://www.lightreading.com/security/security-
strategies/new-security-mantra-explode-offload-
reload/d/d-id/736076
Lift & Shift
https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf
Move the application:
• Elastic Beanstalk
• Elastic Container
• Fargate
• EC2 instance
Move the infrastructure:
• Lightsail
• Elastic Container
• Fargate
Refactor for cloud or Rearchitect
https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf
Rewrite on cloud APIs
Leverage provider services
Etc.
A couple difficulties on both
• Which cloud provider?
• PCF, AWS, Azure?
• Cost difference can be significant.
• Lift and Shift: what does it talk to? Must migrate dependencies.
• Refactoring binds architecture to services, therefore provider.
• Crazy long bills
• Security still needs to be built in.
https://www.cnbc.com/2019/01/08/california-bill-would-
curb-use-of-paper-receipts-push-digital-option.html
Does cloud provide security?
• No.
• If the application is vulnerable, it is just vulnerable in the cloud.
Does cloud provide security?
• No.
• If the application was vulnerable, it is just vulnerable in the cloud.
What will still harm a cloud app?
How do people find my app to attack?
https://www.infoq.com/news/2019/02/eu-bug-bounty-tomcat-kafka
Similar to bug bounties, attackers learn to find
specific flaws.
They then hunt for these flaws.
Over time, they change what they look for.
Over time, apps rarely update defenses.
Where should I logically defend both on-prem and in cloud?
“Perimeter” disappears.
Cloud uses the same runtimes:
Java is Java
Node is Node
Python is Python
All code and dependencies need to run.
Therefore he logical place to apply security is the runtime.
Focus on what’s NOT changing
Here's Bezos:
I very frequently get the question: "What's going to change in the
next 10 years?" And that is a very interesting question; it's a very
common one. I almost never get the question: "What's not
going to change in the next 10 years?" And I submit to you that
that second question is actually the more important of the two --
because you can build a business strategy around the things that
are stable in time. ...
https://www.inc.com/jeff-haden/20-years-ago-jeff-bezos-said-this-1-thing-
separates-people-who-achieve-lasting-success-from-those-who-dont.html
Secure applications, top to bottom
Cloud-Native
Platform and Infrastructure
Security
Cloud-Native
Continuous Application
Security
How can I effectively secure myself anywhere?
On-premise
Runtime Application
Security Protection
Etc.
Who else suggests this embedded security model?
David Zendzian, Pivotal’s Information Security and
Compliance CTO (and also Jeff Williams, Contrast CTO)
What does the non-embedded model look like?
Pivotal’s Cloud Native Security Vision
Repair
Repair vulnerable
software as soon as
updates are available.
Continuous ComplianceRepave
Apps inherit controls
from the platform,
simplifying audits.
Automating compliance.
Repave servers and
applications from a
known good state. Do this
often.
Rotate user credentials
frequently, so they are
only useful for short
periods of time.
Rotate
Reduce Your MTTR | Resist Advanced Persistent Threats | Reduce the Threat of Leaked Credentials
Source: “Cloud Native Security Understanding the Why and How” by Pivotal & Contrast Security
Pivotal’s Cloud Native Security Vision
Repair
Repair vulnerable
software as soon as
updates are available.
Continuous ComplianceRepave
Apps inherit controls
from the platform,
simplifying audits.
Automating compliance.
Repave servers and
applications from a
known good state. Do this
often.
Rotate user credentials
frequently, so they are
only useful for short
periods of time.
Rotate
Reduce Your MTTR | Resist Advanced Persistent Threats | Reduce the Threat of Leaked Credentials
Source: “Cloud Native Security Understanding the Why and How” by Pivotal & Contrast Security
What does “continuous” look like?
The DevOps circle of test
Embedded security with everything
Tools you can use for free: which, where, and why
• SAP’s “vulnerability assessment tool,” during CI
• Dependabot, during CI
• Contrast Community Edition, during Test and Ops
SAP Vulnerability Assessment Tool
• For Java and Python apps.
• Detects dependencies with known
CVEs.
• Guards against deploying these CVEs.
• Scan during CI, before deployment.
https://github.com/SAP/vulnerability-assessment-tool
Dependabot
• For a number of build systems.
• Detects dependencies with known CVEs
and automatically updates them.
• Guards against deploying these CVEs.
• Simplifies updates through automation.
• Runs periodically, creating pull requests
that feed CI.
https://dependabot.com/
Contrast Community Edition
• For Java applications (more coming).
• Finds, reports, and defends
vulnerabilities in custom code.
• Does not require known CVE or list.
• Runs continuously alongside code.
• Everyone becomes a security tester.
• Application becomes self-defending.
https://www.contrastsecurity.com/contrast-community-edition
End Goal: Continuous Automated Security
Development CI/CD/QA Operations
IAST/RASP IAST/RASP IAST/RASP
Questions?
1. Cloud migration strategies
2. How applications are at risk
3. How to defend applications
Erik Costlow | @costlow | Contrast Security

Securing a Cloud Migration

  • 2.
  • 3.
    Why is Eriktalking Java 8. From frequent exploits to a two-year shut-out of 0-days. Managed Java root certificate program, breaking 7-year deadlock. Contrast Security. Continuous self-defending software. Works inside of applications and has actual context. Turbonomic. Product management, IT performance assurance & cloud migration. Crossed $100M revenue. Developer course author. Graph analysis with Java, Hands-on Cryptography, Basic Data analysis, etc. Packt Publishing.
  • 4.
    Agenda 1. Cloud migrationstrategies 2. How applications are at risk 3. How to defend applications I expect that WHY people go to the cloud is clear. We will jump straight to doing it securely.
  • 5.
    AWS Cloud MigrationWhitepaper https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf The 2015 layout is cleaner than the 2018 version.
  • 6.
    The layout inwords: The 6 Rs of Migration 1. Re-Host 2. Re-Platform 3. Re-factor / Re-architect 4. Re-Purchase 5. Retire 6. Retain Bringing security along 1. Explode (no perimeter) 2. Offload (virtualize) 3. Reload (with things that work) Arrrrrrrr, there be six Rs in a cloud migration. https://www.lightreading.com/security/security- strategies/new-security-mantra-explode-offload- reload/d/d-id/736076
  • 7.
    Lift & Shift https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf Movethe application: • Elastic Beanstalk • Elastic Container • Fargate • EC2 instance Move the infrastructure: • Lightsail • Elastic Container • Fargate
  • 8.
    Refactor for cloudor Rearchitect https://d0.awsstatic.com/whitepapers/the-path-to-the-cloud-dec2015.pdf Rewrite on cloud APIs Leverage provider services Etc.
  • 9.
    A couple difficultieson both • Which cloud provider? • PCF, AWS, Azure? • Cost difference can be significant. • Lift and Shift: what does it talk to? Must migrate dependencies. • Refactoring binds architecture to services, therefore provider. • Crazy long bills • Security still needs to be built in. https://www.cnbc.com/2019/01/08/california-bill-would- curb-use-of-paper-receipts-push-digital-option.html
  • 10.
    Does cloud providesecurity? • No. • If the application is vulnerable, it is just vulnerable in the cloud.
  • 11.
    Does cloud providesecurity? • No. • If the application was vulnerable, it is just vulnerable in the cloud.
  • 12.
    What will stillharm a cloud app?
  • 13.
    How do peoplefind my app to attack? https://www.infoq.com/news/2019/02/eu-bug-bounty-tomcat-kafka Similar to bug bounties, attackers learn to find specific flaws. They then hunt for these flaws. Over time, they change what they look for. Over time, apps rarely update defenses.
  • 14.
    Where should Ilogically defend both on-prem and in cloud? “Perimeter” disappears. Cloud uses the same runtimes: Java is Java Node is Node Python is Python All code and dependencies need to run. Therefore he logical place to apply security is the runtime.
  • 15.
    Focus on what’sNOT changing Here's Bezos: I very frequently get the question: "What's going to change in the next 10 years?" And that is a very interesting question; it's a very common one. I almost never get the question: "What's not going to change in the next 10 years?" And I submit to you that that second question is actually the more important of the two -- because you can build a business strategy around the things that are stable in time. ... https://www.inc.com/jeff-haden/20-years-ago-jeff-bezos-said-this-1-thing- separates-people-who-achieve-lasting-success-from-those-who-dont.html
  • 16.
    Secure applications, topto bottom Cloud-Native Platform and Infrastructure Security Cloud-Native Continuous Application Security
  • 17.
    How can Ieffectively secure myself anywhere? On-premise Runtime Application Security Protection Etc.
  • 18.
    Who else suggeststhis embedded security model? David Zendzian, Pivotal’s Information Security and Compliance CTO (and also Jeff Williams, Contrast CTO)
  • 19.
    What does thenon-embedded model look like?
  • 20.
    Pivotal’s Cloud NativeSecurity Vision Repair Repair vulnerable software as soon as updates are available. Continuous ComplianceRepave Apps inherit controls from the platform, simplifying audits. Automating compliance. Repave servers and applications from a known good state. Do this often. Rotate user credentials frequently, so they are only useful for short periods of time. Rotate Reduce Your MTTR | Resist Advanced Persistent Threats | Reduce the Threat of Leaked Credentials Source: “Cloud Native Security Understanding the Why and How” by Pivotal & Contrast Security
  • 21.
    Pivotal’s Cloud NativeSecurity Vision Repair Repair vulnerable software as soon as updates are available. Continuous ComplianceRepave Apps inherit controls from the platform, simplifying audits. Automating compliance. Repave servers and applications from a known good state. Do this often. Rotate user credentials frequently, so they are only useful for short periods of time. Rotate Reduce Your MTTR | Resist Advanced Persistent Threats | Reduce the Threat of Leaked Credentials Source: “Cloud Native Security Understanding the Why and How” by Pivotal & Contrast Security
  • 22.
  • 23.
  • 24.
  • 25.
    Tools you canuse for free: which, where, and why • SAP’s “vulnerability assessment tool,” during CI • Dependabot, during CI • Contrast Community Edition, during Test and Ops
  • 26.
    SAP Vulnerability AssessmentTool • For Java and Python apps. • Detects dependencies with known CVEs. • Guards against deploying these CVEs. • Scan during CI, before deployment. https://github.com/SAP/vulnerability-assessment-tool
  • 27.
    Dependabot • For anumber of build systems. • Detects dependencies with known CVEs and automatically updates them. • Guards against deploying these CVEs. • Simplifies updates through automation. • Runs periodically, creating pull requests that feed CI. https://dependabot.com/
  • 28.
    Contrast Community Edition •For Java applications (more coming). • Finds, reports, and defends vulnerabilities in custom code. • Does not require known CVE or list. • Runs continuously alongside code. • Everyone becomes a security tester. • Application becomes self-defending. https://www.contrastsecurity.com/contrast-community-edition
  • 29.
    End Goal: ContinuousAutomated Security Development CI/CD/QA Operations IAST/RASP IAST/RASP IAST/RASP
  • 30.
    Questions? 1. Cloud migrationstrategies 2. How applications are at risk 3. How to defend applications Erik Costlow | @costlow | Contrast Security