auditing/security with puppet - puppetconf 2014

41
2014 presented by Security/Auditing with Puppet Robert Maury Technical Solutions Engineer|Puppet Labs @RobertMaury

Upload: puppet-labs

Post on 29-Nov-2014

299 views

Category:

Technology


0 download

DESCRIPTION

Auditing/Security with Puppet - Robert Maury, Puppet Labs

TRANSCRIPT

Page 1: Auditing/Security with Puppet - PuppetConf 2014

2014

presented by

Security/Auditing with Puppet Robert Maury Technical Solutions Engineer|Puppet Labs @RobertMaury

Page 2: Auditing/Security with Puppet - PuppetConf 2014
Page 3: Auditing/Security with Puppet - PuppetConf 2014
Page 4: Auditing/Security with Puppet - PuppetConf 2014
Page 5: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design

Page 6: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design• State Based Configuration

Page 7: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design• State Based Configuration

• Robust Reporting

Page 8: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

Page 9: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

• Strict Master/Agent Relationship

Page 10: Auditing/Security with Puppet - PuppetConf 2014

9 | CONFIDENTIAL & PROPRIETARY

1. Facts The node sends data about its state to the puppet master server. 2.#Catalog#Puppet&uses&the&facts&to&compile&a&catalog&that&specifies&how&the&node&should&be&configured.& 3.#&Report#Configura9on&changes&are&reported&back&to&the&puppet&master. 4.#&Report#Puppet's&open&API&can&also&send&data&to&3rd&party&tools.&

1 Facts 2 Catalog#

Node#

3 Report#

4 Report#Report#Collector#

Puppet Master!

Puppet Enterprise: How Puppet Works Puppet Data Flow for Individual Nodes

Page 11: Auditing/Security with Puppet - PuppetConf 2014

I’m an FTP server!

Page 12: Auditing/Security with Puppet - PuppetConf 2014

Nah. You should bean application server

Page 13: Auditing/Security with Puppet - PuppetConf 2014

OK!Whoo hoo!!

Page 14: Auditing/Security with Puppet - PuppetConf 2014

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

• Strict Master/Agent Relationship

• www.puppetlabs.com/security

Page 15: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows

Page 16: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows • Pull Requests!

Page 17: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

Page 18: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

Page 19: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

• Rspec Puppet

Page 20: Auditing/Security with Puppet - PuppetConf 2014

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

• Rspec Puppet

• Beaker

Page 21: Auditing/Security with Puppet - PuppetConf 2014

Can you write Unit and Integration tests so that, if a module passes them, it guarantees compliance with X security standard?

Page 22: Auditing/Security with Puppet - PuppetConf 2014

Simulation Mode?

Page 23: Auditing/Security with Puppet - PuppetConf 2014

Simulation Mode?• Some organizations use it for change management

Page 24: Auditing/Security with Puppet - PuppetConf 2014

Simulation Mode?• Some organizations use it for change management

• I don’t like it

Page 25: Auditing/Security with Puppet - PuppetConf 2014

Simulation Mode?• Some organizations use it for change management

• I don’t like it

• Promote changes from version control during you change window

Page 26: Auditing/Security with Puppet - PuppetConf 2014

Modeling Application Level Security

Page 27: Auditing/Security with Puppet - PuppetConf 2014

Boundary Network

Page 28: Auditing/Security with Puppet - PuppetConf 2014

Boundary Network

Application Network

Page 29: Auditing/Security with Puppet - PuppetConf 2014

Boundary Network

Application Network

Application Tier

Page 30: Auditing/Security with Puppet - PuppetConf 2014

Boundary Network

Application Network

Application Tier

Node

Page 31: Auditing/Security with Puppet - PuppetConf 2014

Security Community & Puppet

Page 32: Auditing/Security with Puppet - PuppetConf 2014

Security Community & Puppet• Forge.mil

Page 33: Auditing/Security with Puppet - PuppetConf 2014

Security Community & Puppet• Forge.mil

• NIST (http://usgcb.nist.gov/usgcb/rhel/download_rhel5.html)

Page 34: Auditing/Security with Puppet - PuppetConf 2014

Security Community & Puppet• Forge.mil

• NIST (http://usgcb.nist.gov/usgcb/rhel/download_rhel5.html)

• Fedora Aqueduct (https://fedorahosted.org/aqueduct/)

Page 35: Auditing/Security with Puppet - PuppetConf 2014

Security Technical Implementation Guides

Page 36: Auditing/Security with Puppet - PuppetConf 2014

Security Technical Implementation Guides• http://iase.disa.mil/stigs/Pages/index.aspx

Page 37: Auditing/Security with Puppet - PuppetConf 2014

Security Technical Implementation Guides• http://iase.disa.mil/stigs/Pages/index.aspx

• https://github.com/robertmaury/stig

Page 38: Auditing/Security with Puppet - PuppetConf 2014

Best Practices

Page 39: Auditing/Security with Puppet - PuppetConf 2014

Best Practices• Comment resources with the rule you’re addressing

Page 40: Auditing/Security with Puppet - PuppetConf 2014

Best Practices• Comment resources with the rule you’re addressing

• Err on the side of simplicity so the modules can be read by non-technical staff

Page 41: Auditing/Security with Puppet - PuppetConf 2014

Questions?