innotech austin 2017: the path of devops enlightenment for infosec

Post on 21-Jan-2018

215 Views

Category:

Software

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

@WICKETT

The Path of DevOps Enlightenment for InfoSec

INNOTECH AUSTIN 2017

JAMES WICKETT

@WICKETT

Want the slides and referenced links?

james@signalsciences.com

@WICKETT

‣ HEAD OF RESEARCH AT SIGNAL SCIENCES

‣ ORGANIZER OF DEVOPS DAYS AUSTIN

‣ LYNDA.COM AUTHOR ON DEVOPS

‣ BLOG AT THEAGILEADMIN.COM

@WICKETT

@WICKETT

‣ DEVOPS IS CHANGING AND THERE IS A BIG RISK TO LOSE OUR WAY.

‣ SECURITY IS IN CRISIS

‣ SECURITY AT FORWARD-LEANING SHOPS HAVE FOUND THE NEW WAY.

‣ LET’S JUXTAPOSE THE OLD WAY AND THE NEW WAY OF SECURITY IN DEVOPS.

SUMMARY

@WICKETT

‣ WHY DO WE HAVE DEVOPS?

‣ DID WE BUILD DEVOPS PROPERLY?

‣ IS THE DEVOPS CULTURE LOST?

‣ CAN WE GET IT BACK?

‣ CAN WE PROTECT DEVOPS FROM FURTHER DISTORTION?

QUESTIONS ON MY MIND

@WICKETT

My Journey

@WICKETT

‣ WEB AND ECOMM FOR $1B COMPANY

‣ BRUTAL ONCALL ROTATIONS

‣ +24HR DEPLOYMENTS

‣ WATERFALL, WATERFALL, WATERFALL

‣ FRIENDS ARE BORN FROM ADVERSITY

FIRST BIGCO JOB

@WICKETT

‣ IN 2007 WENT STARTUP AND AWS CLOUD

‣ LEARNED A BIT ABOUT FAILURE AND HAPPINESS

‣ REJOINED OLD TEAM IN 2010 FOR NEW CLOUD VENTURE BACK IN BIGCO

CLOUDING FOR PROFIT

@WICKETT

‣ DEVOPS AND INFRA AS CODE

‣ NOT CD, BUT DEPLOYS DAILY

‣ AT BIGCO DELIVERED 4 SAAS PRODUCTS IN 2 YEARS WITH DEVOPS AND CLOUD

ENTER DEVOPS

@WICKETT

‣ FOUND RUGGED SOFTWARE

‣ MET GENE KIM IN 2012 IN A BAR IN AUSTIN

‣ CREATED GAUNTLT

‣ LATER, JOINED SIGNAL SCIENCES

DEVOPS AND SECURITY

@WICKETT

DevOps is Friendship

@WICKETT

Compassion for Ops

@WICKETT

10:1

Dev:Ops

@WICKETT

Labor Inequity Permeates IT Ranks

@WICKETT

100:10:1

Dev:Ops:Sec

@WICKETT

Yet, I remained optimistic for DevOps+Security

@WICKETT

ENTER DOUBTS

@WICKETT

‣ DEVOPS ON A BUS AT RSA

‣ EXPO FLOOR AT DOCKER CON AND THE DEVOPS TOOLCHAIN

TWO EVENTS

@WICKETT

HAD WE ALLOWED DEVOPS TO BE A NEW GIMMICK OR SLOGAN ?

@WICKETT

WHAT HAD DEVOPS BECOME?

@WICKETT

‣ WHY DO WE HAVE DEVOPS?

‣ DID WE BUILD DEVOPS PROPERLY?

‣ IS THE DEVOPS CULTURE LOST?

‣ CAN WE GET IT BACK?

‣ CAN WE PROTECT DEVOPS FROM FURTHER DISTORTION?

QUESTIONING DEVOPS

@WICKETT

OUR ROOTS: FRIENDSHIP

@WICKETT

There is irony in my story…

@WICKETT

‣ TEACH THREE DEVOPS CLASSES IN THE DEVOPS FOUNDATIONS SERIES AT LYNDA / LINKEDIN LEARNING

‣ WORK AT A POPULAR VENDOR OF DEVSECOPS SOLUTIONS

‣ WRITE DEVOPS AND SECURITY ARTICLES AS PART OF MY ROLE AT SIGNAL SCIENCES

@WICKETT

Back to Our Roots

@WICKETT

CULTURE IS THE MOST IMPORTANT ASPECT TO DEVOPS

SUCCEEDING IN THE ENTERPRISE

- PATRICK DEBOIS

@WICKETT

@WICKETT

‣ MUTUAL UNDERSTANDING

‣ SHARED LANGUAGE

‣ SHARED VIEWS

‣ COLLABORATIVE TOOLING

4 KEYS TO CULTURE

@WICKETT

FRIENDSHIP

@WICKETT

Make a connection and friend through our

journey today at All Day DevOps

@WICKETT

Security is in Crisis

@WICKETT

Companies are spending a great deal on security, but we read of massive computer-related attacks. Clearly something is wrong.

The root of the problem is twofold: we’re protecting the wrong things,

and we’re hurting productivity in the process.

THINKING SECURITY, STEVEN M. BELLOVIN 2015

@WICKETT

@WICKETT

[Security by risk assessment] introduces a dangerous fallacy: that structured inadequacy is almost as

good as adequacy and that underfunded security efforts plus risk

management are about as good as properly funded security work

@WICKETT

Security is often the cultural outlier in an

organization

@WICKETT

many security teams work with a worldview where their goal is to inhibit change as much as possible

@WICKETT

“SECURITY PREFERS A SYSTEM POWERED OFF AND UNPLUGGED”

- DEVELOPER

@WICKETT

“…THOSE STUPID DEVELOPERS”

- SECURITY PERSON

@WICKETT

It is 30 times cheaper to fix security defects in dev

vs. Prod

NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing

@WICKETT

It is 30 times cheaper to fix security defects in dev

vs. Prod

NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing

@WICKETT

Security must Change or Die

@WICKETT

“every aspect of managing WAFs is an ongoing process. This is the antithesis of set it and forget it technology. That is the real point of this research. To maximize value from your WAF you need to go in with everyone’s eyes open to the effort required

to get and keep the WAF running productively.”

- WHITEPAPER FROM AN UNDISCLOSED WAF VENDOR

@WICKETT

@WICKETT

Bottleneck Approach

@WICKETT

THE AVERAGE TIME TO DELIVER CORPORATE IT PROJECTS HAS INCREASED FROM ~8.5 MONTHS TO OVER 10

MONTHS IN THE LAST 5 YEARS

Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016

THE GROWTH OF [SECURITY] FUNCTIONS WHICH IS TOO OFTEN POORLY COORDINATED… [RESULTING IN] A PROLIFERATION OF NEW TASKS IN THE AREAS OF COMPLIANCE, PRIVACY AND DATA PROTECTION.

@WICKETT

Many security professionals have a hard time adapting their existing practices to a world where requirements can change every few weeks, or where they are never written down at all.

@WICKETT

@WICKETT

@WICKETT

Security didn’t get an invite to the DevOps

party! - John Willis (@botchagalupe)

“You Build It, You Secure It” DOES 2017

@WICKETT

Read-only containers and serverless shift the

security story to almost 100% application security

@WICKETT

DevOps A New Traveling Companion

for Security (…and probably the only way to survive)

@WICKETT

High performers spend 50 percent less time remediating security issues than

low performers. By better integrating information security objectives into daily work, teams achieve higher levels of IT performance and build

more secure systems. 2016 State of DevOps Report

@WICKETT

High performing orgs achieve quality by incorporating

security (and security teams) into the delivery process

2016 State of DevOps Report

@WICKETT

http://www.youtube.com/watch?v=jQblKuMuS0Y

@WICKETT

The New Path

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

A security team who embraces openness about what it does and

why, spreads understanding. - Rich Smith

@WICKETT

Runtime is arguably the most important place to

create feedback loops

@WICKETT

‣ ACCOUNT TAKEOVER ATTEMPTS

‣ AREAS OF THE SITE UNDER ATTACK

‣ MOST LIKELY VECTORS OF ATTACK

‣ BUSINESS LOGIC FLOWS

DETECT WHAT MATTERS

@WICKETT

@WICKETT

Are you under attack?

@WICKETT

Where?

@WICKETT

Which is a better feedback loop?

Source: Zane Lackey, Signal Sciences

@WICKETT

Options: RASP, NGWAF or Web Protection Platform

@WICKETT

‣ SURFACE LEVEL

‣ WHAT WENT WRONG? HOW DID IT BREAK? HOW DO WE FIX IT?

‣ DEEPER LEVEL

‣ WHAT ARE THINGS THAT WENT INTO MAKING IT NOT AS BAD AS IT COULD HAVE BEEN?

ALL INCIDENTS CAN BE WORSE

Source: John Allspaw, DOES 2017

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

‣ POLICIES AND PROCEDURES IN PLACE

‣ EFFECTIVE EXECUTION OF THOSE POLICIES TO ALLOW YOU TO KEEP FUNCTIONING

‣ MOST OF PCI AND OTHER FRAMEWORKS PROVIDE REASONABLY GOOD PRACTICES *IF* YOU REMOVE ALL THE WATERFALL BITS

UNDERSTAND AUDITORS

@WICKETT

[Deploys] can be treated as standard or routine changes that have been pre-approved by management, and that don’t require a heavyweight change review meeting.

Separation of Duties Considered Harmful

PCI 6.4.2

@WICKETT

In environments where one individual performs multiple roles (for example,

administration and security operations), duties may be assigned such that no single

individual has end-to-end control of a process without an independent checkpoint.

(aka Auditable Delivery Pipeline)

@WICKETT

Developers with Access to Production, Oh My!!!

https://www.schellmanco.com/blog/2012/12/auditing-devops-developers-with-access-to-production/

@WICKETT

Check out DevOps Audit Defense Toolkit

https://cdn2.hubspot.net/hubfs/228391/Corporate/DevOps_Audit_Defense_Toolkit_v1.0.pdf

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

‣ ADD IN CHAOS TO YOUR SYSTEM AND APPLICATION

‣ CHAOS MONKEY

‣ ANTI-FRAGILE

‣ RELEASE IT! BOOK

CHAOS ENGINEERING

@WICKETT

@WICKETT

‣ ADDS MISCONFIG TO THE STACK AND CHECKS TO SEE IF IT GETS DETECTED

‣ NEW OPEN SOURCE TOOL!

‣ RUNS AS A LAMBDA

CHAOS SLINGR

@WICKETT

‣ I AM BEING PEN TESTED ANYWAY, WHY NOT FIND OUT WHAT THEY ARE FINDING?

‣ 24/7 PEN TESTING

‣ BUILDS DEVELOPER CONFIDENCE

‣ FINDS MIX OF LOW HANGING FRUIT AND SOMETIMES MUCH MORE!

BUG BOUNTIES

@WICKETT

‣ HACKERONE

‣ BUGCROWD

BUG BOUNTY OPTIONS

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

@WICKETT

‣ NO PERIMETER SECURITY

‣ ASSUME COMPROMISE

‣ INSTRUMENT ALL LAYERS

‣ EXTENDS FROM LAPTOPS TO WEB APPS TO CUSTOMER ACCOUNTS

ZERO TRUST NETWORKS

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

‣ DON’T SLOW DELIVERY

‣ CONTINUOUS TESTING AND VALIDATION

‣ TESTING ON THE SIDE OF THE PIPELINE

‣ PENETRATION TESTING OUTSIDE OF DELIVERY

FAST AND NON-BLOCKING

@WICKETT

Currently, at Signal Sciences we do about 15

deploys per day

@WICKETT

Roughly 10,000 deploys in the last 2.5 yrs

@WICKETT

@WICKETT

CD is how little you can deploy at a time

@WICKETT

We optimized for cycle time—the time from code

commit to production

Gave power to the team to deploy

@WICKETT

Signal Sciences is a software as a service

company and a security company

@WICKETT

Security is part of CI/CD and the overall delivery

pipeline

@WICKETT

‣DESIGN

‣INHERIT

‣BUILD

‣DEPLOY

‣OPERATE

PIPELINE PHASES

@WICKETT

‣INHERIT

‣BUILD

‣OPERATE

SECURITY CONSIDERATIONS

What have I bundled into my app that leaves me

vulnerable?

Do my build acceptance tests and integration tests

catch security issues before release?

Am I being attacked right now? Is it working?

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

Be Mean to Your Code

@WICKETT

The goal should be to come up with a set of automated tests that probe and check security configurations and runtime system behavior for security features that will execute every time the system is built and every time it is deployed.

@WICKETT

Security tools are intractably noisy and

difficult to use

@WICKETT

A method of collaboration was needed for devs, ops

and security eng.

@WICKETT

There needed to be a new language to span the

parties

@WICKETT

Started Gauntlt 4 years ago

@WICKETT

@WICKETT

Open source, MIT License

Gauntlt comes with pre-canned steps that hook security testing tools

Gauntlt does not install tools

Gauntlt wants to be part of the CI/CD pipeline

Be a good citizen of exit status and stdout/stderr

@WICKETT

gauntlt.org

@WICKETT

@WICKETT

@WICKETT

@WICKETT

$ gem install gauntlt

# download example attacks from github # customize the example attacks # now you can run gauntlt

$ gauntlt

@WICKETT

@slow @finalFeature: Look for cross site scripting (xss) using arachni against a URL

Scenario: Using arachni, look for cross site scripting and verify no issues are found Given "arachni" is installed And the following profile: | name | value | | url | http://localhost:8008 | When I launch an "arachni" attack with: """ arachni —check=xss* <url> """ Then the output should contain "0 issues were detected."

Given

When

Then

What?

@WICKETT

“We have saved millions of dollars using Gauntlt for the largest healthcare industry

project.”

- Aaron Rinehart, UnitedHealthCare

@WICKETT

http://bit.ly/2s8P1Ll

@WICKETT

‣ 8 LABS FOR GAUNTLT

‣ HOW TO USE GAUNTLT FOR NETWORK CHECKS

‣ GAUNTLT FOR XSS, SQLI, OTHER APSES

‣ HANDLING REPORTING

‣ USING ENV VARS

‣ CI SYSTEM SETUP

WORKSHOP INCLUDES:

@WICKETT

github.com/gauntlt/gauntlt-demo

@WICKETT

github.com/gauntlt/gauntlt-starter-kit

@WICKETT

SOURCE: THE THREE WAYS OF

DEVOPS, GENE KIM

@WICKETT

@WICKETT

@WICKETT

Most teams use Gauntlt in Docker containers

@WICKETT

https://github.com/gauntlt/gauntlt-docker

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

@WICKETT

Red Team Mondays at Intuit

@WICKETT

But, but, containers!

@WICKETT

@WICKETT

OVER 30% OF OFFICIAL IMAGES IN DOCKER HUB CONTAIN HIGH PRIORITY

SECURITY VULNERABILITIES

https://banyanops.com/blog/analyzing-docker-hub/

@WICKETT

OLD PATH VS. NEW PATHEmbrace Secrecy Create Feedback LoopsJust Pass Audit! Compliance adds ValueEnforce Stability Create Chaos

Build a Wall Zero Trust NetworksSlow Validation Fast and Non-blocking

Certainty Testing Adversity TestingTest when Done Shift LeftProcess Driven The Paved Road

@WICKETT

‣ MAKE IT EASY FOR PEOPLE TO DO THE RIGHT THING

‣ JASON CHAN, NETFLIX

‣ GOLD IMAGES

‣ BLESSED BUILDS AND DEPENDENCIES

THE PAVED ROAD

@WICKETT

Don’t be a blocker, be an enabler of the business

@WICKETT

Want the slides and referenced links?

james@signalsciences.com

top related