Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec

458 views

Published on

Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec

Security as we have known it has completely changed. Through challenges from the outside and from within there is a wholesale conversion happening across the industry where DevOps and Security are joining forces. This talk is a hybrid of inspiration and pragmatism for dealing with the new landscape.

Published in: Software
  • Be the first to comment

Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec

  1. 1. @WICKETT The Path of DevOps Enlightenment for InfoSec INNOTECH AUSTIN 2017 JAMES WICKETT
  2. 2. @WICKETT Want the slides and referenced links? james@signalsciences.com
  3. 3. @WICKETT ‣ HEAD OF RESEARCH AT SIGNAL SCIENCES ‣ ORGANIZER OF DEVOPS DAYS AUSTIN ‣ LYNDA.COM AUTHOR ON DEVOPS ‣ BLOG AT THEAGILEADMIN.COM @WICKETT
  4. 4. @WICKETT ‣ DEVOPS IS CHANGING AND THERE IS A BIG RISK TO LOSE OUR WAY. ‣ SECURITY IS IN CRISIS ‣ SECURITY AT FORWARD-LEANING SHOPS HAVE FOUND THE NEW WAY. ‣ LET’S JUXTAPOSE THE OLD WAY AND THE NEW WAY OF SECURITY IN DEVOPS. SUMMARY
  5. 5. @WICKETT ‣ WHY DO WE HAVE DEVOPS? ‣ DID WE BUILD DEVOPS PROPERLY? ‣ IS THE DEVOPS CULTURE LOST? ‣ CAN WE GET IT BACK? ‣ CAN WE PROTECT DEVOPS FROM FURTHER DISTORTION? QUESTIONS ON MY MIND
  6. 6. @WICKETT My Journey
  7. 7. @WICKETT ‣ WEB AND ECOMM FOR $1B COMPANY ‣ BRUTAL ONCALL ROTATIONS ‣ +24HR DEPLOYMENTS ‣ WATERFALL, WATERFALL, WATERFALL ‣ FRIENDS ARE BORN FROM ADVERSITY FIRST BIGCO JOB
  8. 8. @WICKETT ‣ IN 2007 WENT STARTUP AND AWS CLOUD ‣ LEARNED A BIT ABOUT FAILURE AND HAPPINESS ‣ REJOINED OLD TEAM IN 2010 FOR NEW CLOUD VENTURE BACK IN BIGCO CLOUDING FOR PROFIT
  9. 9. @WICKETT ‣ DEVOPS AND INFRA AS CODE ‣ NOT CD, BUT DEPLOYS DAILY ‣ AT BIGCO DELIVERED 4 SAAS PRODUCTS IN 2 YEARS WITH DEVOPS AND CLOUD ENTER DEVOPS
  10. 10. @WICKETT ‣ FOUND RUGGED SOFTWARE ‣ MET GENE KIM IN 2012 IN A BAR IN AUSTIN ‣ CREATED GAUNTLT ‣ LATER, JOINED SIGNAL SCIENCES DEVOPS AND SECURITY
  11. 11. @WICKETT DevOps is Friendship
  12. 12. @WICKETT Compassion for Ops
  13. 13. @WICKETT 10:1 Dev:Ops
  14. 14. @WICKETT Labor Inequity Permeates IT Ranks
  15. 15. @WICKETT 100:10:1 Dev:Ops:Sec
  16. 16. @WICKETT Yet, I remained optimistic for DevOps+Security
  17. 17. @WICKETT ENTER DOUBTS
  18. 18. @WICKETT ‣ DEVOPS ON A BUS AT RSA ‣ EXPO FLOOR AT DOCKER CON AND THE DEVOPS TOOLCHAIN TWO EVENTS
  19. 19. @WICKETT HAD WE ALLOWED DEVOPS TO BE A NEW GIMMICK OR SLOGAN ?
  20. 20. @WICKETT WHAT HAD DEVOPS BECOME?
  21. 21. @WICKETT ‣ WHY DO WE HAVE DEVOPS? ‣ DID WE BUILD DEVOPS PROPERLY? ‣ IS THE DEVOPS CULTURE LOST? ‣ CAN WE GET IT BACK? ‣ CAN WE PROTECT DEVOPS FROM FURTHER DISTORTION? QUESTIONING DEVOPS
  22. 22. @WICKETT OUR ROOTS: FRIENDSHIP
  23. 23. @WICKETT There is irony in my story…
  24. 24. @WICKETT ‣ TEACH THREE DEVOPS CLASSES IN THE DEVOPS FOUNDATIONS SERIES AT LYNDA / LINKEDIN LEARNING ‣ WORK AT A POPULAR VENDOR OF DEVSECOPS SOLUTIONS ‣ WRITE DEVOPS AND SECURITY ARTICLES AS PART OF MY ROLE AT SIGNAL SCIENCES
  25. 25. @WICKETT Back to Our Roots
  26. 26. @WICKETT CULTURE IS THE MOST IMPORTANT ASPECT TO DEVOPS SUCCEEDING IN THE ENTERPRISE - PATRICK DEBOIS
  27. 27. @WICKETT
  28. 28. @WICKETT ‣ MUTUAL UNDERSTANDING ‣ SHARED LANGUAGE ‣ SHARED VIEWS ‣ COLLABORATIVE TOOLING 4 KEYS TO CULTURE
  29. 29. @WICKETT FRIENDSHIP
  30. 30. @WICKETT Make a connection and friend through our journey today at All Day DevOps
  31. 31. @WICKETT Security is in Crisis
  32. 32. @WICKETT Companies are spending a great deal on security, but we read of massive computer- related attacks. Clearly something is wrong. The root of the problem is twofold: we’re protecting the wrong things, and we’re hurting productivity in the process. THINKING SECURITY, STEVEN M. BELLOVIN 2015
  33. 33. @WICKETT
  34. 34. @WICKETT [Security by risk assessment] introduces a dangerous fallacy: that structured inadequacy is almost as good as adequacy and that underfunded security efforts plus risk management are about as good as properly funded security work
  35. 35. @WICKETT Security is often the cultural outlier in an organization
  36. 36. @WICKETT many security teams work with a worldview where their goal is to inhibit change as much as possible
  37. 37. @WICKETT “SECURITY PREFERS A SYSTEM POWERED OFF AND UNPLUGGED” - DEVELOPER
  38. 38. @WICKETT “…THOSE STUPID DEVELOPERS” - SECURITY PERSON
  39. 39. @WICKETT It is 30 times cheaper to fix security defects in dev vs. Prod NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing
  40. 40. @WICKETT It is 30 times cheaper to fix security defects in dev vs. Prod NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing
  41. 41. @WICKETT Security must Change or Die
  42. 42. @WICKETT “every aspect of managing WAFs is an ongoing process. This is the antithesis of set it and forget it technology. That is the real point of this research. To maximize value from your WAF you need to go in with everyone’s eyes open to the effort required to get and keep the WAF running productively.” - WHITEPAPER FROM AN UNDISCLOSED WAF VENDOR
  43. 43. @WICKETT
  44. 44. @WICKETT Bottleneck Approach
  45. 45. @WICKETT THE AVERAGE TIME TO DELIVER CORPORATE IT PROJECTS HAS INCREASED FROM ~8.5 MONTHS TO OVER 10 MONTHS IN THE LAST 5 YEARS Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016 THE GROWTH OF [SECURITY] FUNCTIONS WHICH IS TOO OFTEN POORLY COORDINATED… [RESULTING IN] A PROLIFERATION OF NEW TASKS IN THE AREAS OF COMPLIANCE, PRIVACY AND DATA PROTECTION.
  46. 46. @WICKETT Many security professionals have a hard time adapting their existing practices to a world where requirements can change every few weeks, or where they are never written down at all.
  47. 47. @WICKETT
  48. 48. @WICKETT
  49. 49. @WICKETT Security didn’t get an invite to the DevOps party! - John Willis (@botchagalupe) “You Build It, You Secure It” DOES 2017
  50. 50. @WICKETT Read-only containers and serverless shift the security story to almost 100% application security
  51. 51. @WICKETT DevOps A New Traveling Companion for Security (…and probably the only way to survive)
  52. 52. @WICKETT High performers spend 50 percent less time remediating security issues than low performers. By better integrating information security objectives into daily work, teams achieve higher levels of IT performance and build more secure systems. 2016 State of DevOps Report
  53. 53. @WICKETT High performing orgs achieve quality by incorporating security (and security teams) into the delivery process 2016 State of DevOps Report
  54. 54. @WICKETT http://www.youtube.com/watch?v=jQblKuMuS0Y
  55. 55. @WICKETT The New Path
  56. 56. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  57. 57. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  58. 58. @WICKETT A security team who embraces openness about what it does and why, spreads understanding. - Rich Smith
  59. 59. @WICKETT Runtime is arguably the most important place to create feedback loops
  60. 60. @WICKETT ‣ ACCOUNT TAKEOVER ATTEMPTS ‣ AREAS OF THE SITE UNDER ATTACK ‣ MOST LIKELY VECTORS OF ATTACK ‣ BUSINESS LOGIC FLOWS DETECT WHAT MATTERS
  61. 61. @WICKETT
  62. 62. @WICKETT Are you under attack?
  63. 63. @WICKETT Where?
  64. 64. @WICKETT Which is a better feedback loop? Source: Zane Lackey, Signal Sciences
  65. 65. @WICKETT Options: RASP, NGWAF or Web Protection Platform
  66. 66. @WICKETT ‣ SURFACE LEVEL ‣ WHAT WENT WRONG? HOW DID IT BREAK? HOW DO WE FIX IT? ‣ DEEPER LEVEL ‣ WHAT ARE THINGS THAT WENT INTO MAKING IT NOT AS BAD AS IT COULD HAVE BEEN? ALL INCIDENTS CAN BE WORSE Source: John Allspaw, DOES 2017
  67. 67. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  68. 68. @WICKETT ‣ POLICIES AND PROCEDURES IN PLACE ‣ EFFECTIVE EXECUTION OF THOSE POLICIES TO ALLOW YOU TO KEEP FUNCTIONING ‣ MOST OF PCI AND OTHER FRAMEWORKS PROVIDE REASONABLY GOOD PRACTICES *IF* YOU REMOVE ALL THE WATERFALL BITS UNDERSTAND AUDITORS
  69. 69. @WICKETT [Deploys] can be treated as standard or routine changes that have been pre-approved by management, and that don’t require a heavyweight change review meeting.
  70. 70. Separation of Duties Considered Harmful
  71. 71. PCI 6.4.2
  72. 72. @WICKETT In environments where one individual performs multiple roles (for example, administration and security operations), duties may be assigned such that no single individual has end-to-end control of a process without an independent checkpoint. (aka Auditable Delivery Pipeline)
  73. 73. @WICKETT Developers with Access to Production, Oh My!!! https://www.schellmanco.com/blog/2012/12/auditing-devops- developers-with-access-to-production/
  74. 74. @WICKETT Check out DevOps Audit Defense Toolkit https://cdn2.hubspot.net/hubfs/228391/Corporate/ DevOps_Audit_Defense_Toolkit_v1.0.pdf
  75. 75. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  76. 76. @WICKETT ‣ ADD IN CHAOS TO YOUR SYSTEM AND APPLICATION ‣ CHAOS MONKEY ‣ ANTI-FRAGILE ‣ RELEASE IT! BOOK CHAOS ENGINEERING
  77. 77. @WICKETT
  78. 78. @WICKETT ‣ ADDS MISCONFIG TO THE STACK AND CHECKS TO SEE IF IT GETS DETECTED ‣ NEW OPEN SOURCE TOOL! ‣ RUNS AS A LAMBDA CHAOS SLINGR
  79. 79. @WICKETT ‣ I AM BEING PEN TESTED ANYWAY, WHY NOT FIND OUT WHAT THEY ARE FINDING? ‣ 24/7 PEN TESTING ‣ BUILDS DEVELOPER CONFIDENCE ‣ FINDS MIX OF LOW HANGING FRUIT AND SOMETIMES MUCH MORE! BUG BOUNTIES
  80. 80. @WICKETT ‣ HACKERONE ‣ BUGCROWD BUG BOUNTY OPTIONS
  81. 81. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  82. 82. @WICKETT
  83. 83. @WICKETT ‣ NO PERIMETER SECURITY ‣ ASSUME COMPROMISE ‣ INSTRUMENT ALL LAYERS ‣ EXTENDS FROM LAPTOPS TO WEB APPS TO CUSTOMER ACCOUNTS ZERO TRUST NETWORKS
  84. 84. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  85. 85. @WICKETT ‣ DON’T SLOW DELIVERY ‣ CONTINUOUS TESTING AND VALIDATION ‣ TESTING ON THE SIDE OF THE PIPELINE ‣ PENETRATION TESTING OUTSIDE OF DELIVERY FAST AND NON-BLOCKING
  86. 86. @WICKETT Currently, at Signal Sciences we do about 15 deploys per day
  87. 87. @WICKETT Roughly 10,000 deploys in the last 2.5 yrs
  88. 88. @WICKETT
  89. 89. @WICKETT CD is how little you can deploy at a time
  90. 90. @WICKETT We optimized for cycle time—the time from code commit to production
  91. 91. Gave power to the team to deploy
  92. 92. @WICKETT Signal Sciences is a software as a service company and a security company
  93. 93. @WICKETT Security is part of CI/CD and the overall delivery pipeline
  94. 94. @WICKETT ‣DESIGN ‣INHERIT ‣BUILD ‣DEPLOY ‣OPERATE PIPELINE PHASES
  95. 95. @WICKETT ‣INHERIT ‣BUILD ‣OPERATE SECURITY CONSIDERATIONS What have I bundled into my app that leaves me vulnerable? Do my build acceptance tests and integration tests catch security issues before release? Am I being attacked right now? Is it working?
  96. 96. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  97. 97. @WICKETT Be Mean to Your Code
  98. 98. @WICKETT The goal should be to come up with a set of automated tests that probe and check security configurations and runtime system behavior for security features that will execute every time the system is built and every time it is deployed.
  99. 99. @WICKETT Security tools are intractably noisy and difficult to use
  100. 100. @WICKETT A method of collaboration was needed for devs, ops and security eng.
  101. 101. @WICKETT There needed to be a new language to span the parties
  102. 102. @WICKETT Started Gauntlt 4 years ago
  103. 103. @WICKETT
  104. 104. @WICKETT Open source, MIT License Gauntlt comes with pre-canned steps that hook security testing tools Gauntlt does not install tools Gauntlt wants to be part of the CI/CD pipeline Be a good citizen of exit status and stdout/ stderr
  105. 105. @WICKETT gauntlt.org
  106. 106. @WICKETT
  107. 107. @WICKETT
  108. 108. @WICKETT
  109. 109. @WICKETT $ gem install gauntlt # download example attacks from github # customize the example attacks # now you can run gauntlt $ gauntlt
  110. 110. @WICKETT @slow @final Feature: Look for cross site scripting (xss) using arachni against a URL Scenario: Using arachni, look for cross site scripting and verify no issues are found Given "arachni" is installed And the following profile: | name | value | | url | http://localhost:8008 | When I launch an "arachni" attack with: """ arachni —check=xss* <url> """ Then the output should contain "0 issues were detected." Given When Then What?
  111. 111. @WICKETT “We have saved millions of dollars using Gauntlt for the largest healthcare industry project.” - Aaron Rinehart, UnitedHealthCare
  112. 112. @WICKETT http://bit.ly/2s8P1Ll
  113. 113. @WICKETT ‣ 8 LABS FOR GAUNTLT ‣ HOW TO USE GAUNTLT FOR NETWORK CHECKS ‣ GAUNTLT FOR XSS, SQLI, OTHER APSES ‣ HANDLING REPORTING ‣ USING ENV VARS ‣ CI SYSTEM SETUP WORKSHOP INCLUDES:
  114. 114. @WICKETT github.com/gauntlt/gauntlt-demo
  115. 115. @WICKETT github.com/gauntlt/gauntlt-starter-kit
  116. 116. @WICKETT SOURCE: THE THREE WAYS OF DEVOPS, GENE KIM
  117. 117. @WICKETT
  118. 118. @WICKETT
  119. 119. @WICKETT Most teams use Gauntlt in Docker containers
  120. 120. @WICKETT https://github.com/ gauntlt/gauntlt-docker
  121. 121. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  122. 122. @WICKETT
  123. 123. @WICKETT Red Team Mondays at Intuit
  124. 124. @WICKETT But, but, containers!
  125. 125. @WICKETT
  126. 126. @WICKETT OVER 30% OF OFFICIAL IMAGES IN DOCKER HUB CONTAIN HIGH PRIORITY SECURITY VULNERABILITIES https://banyanops.com/blog/analyzing-docker-hub/
  127. 127. @WICKETT OLD PATH VS. NEW PATH Embrace Secrecy Create Feedback Loops Just Pass Audit! Compliance adds Value Enforce Stability Create Chaos Build a Wall Zero Trust Networks Slow Validation Fast and Non-blocking Certainty Testing Adversity Testing Test when Done Shift Left Process Driven The Paved Road
  128. 128. @WICKETT ‣ MAKE IT EASY FOR PEOPLE TO DO THE RIGHT THING ‣ JASON CHAN, NETFLIX ‣ GOLD IMAGES ‣ BLESSED BUILDS AND DEPENDENCIES THE PAVED ROAD
  129. 129. @WICKETT Don’t be a blocker, be an enabler of the business
  130. 130. @WICKETT Want the slides and referenced links? james@signalsciences.com

×