does devsecops really exist?

34
Does Dev’Sec’Ops Really Exist Alex Manly

Upload: continohq

Post on 09-Jan-2017

54 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Does DevSecOps really exist?

DoesDev’Sec’Ops ReallyExistAlexManly

Page 2: Does DevSecOps really exist?

WhoamI?

AlexManlyPrincipalDevOpsConsultantContino (UK)@[email protected]

Page 3: Does DevSecOps really exist?

ComplianceReport- Verizon

Outof10000companiesthatweresurveyed1in5werenon-complianttoregulation

Challenge– abilitykeepupwithamovingtarget.Requirementschangebyanaverageof18%overayear.

Non-compliantbreachedcompanies:45%- patchmanagementanddevelopmentsecurity72%- logmanagementandmonitoring73%- firewallconfiguration

Challenge- abilitytocontinuouslymonitortheirenvironmentsforchanges

Page 4: Does DevSecOps really exist?

© 2014 451 Research, LLC. www.451research.com

Cloud Computing Pain Points

Q. What are your top cloud computing-related pain points? Select up to three. n=163. Source: Cloud Computing – Wave 7 |

2% 2% 2% 2% 2%

2.5% 2.5%

3.1% 3% 3%

4% 4% 4%

4% 5% 5%

7% 7% 7%

7.4% 8%

9% 10%

11% 11%

12% 17%

31%

Business Continuity/Disaster RecoveryInteroperability

Lack of Provider CompetencePerception and Internal Resistance

StorageData Movement

GovernanceCapacity Planning/Management

Legacy ApplicationsTechnology Immaturity

ComplexityLimited Transparency and Management

Service-level ManagementLack of Standards

NetworkService Reliability/Availability

Contractual/Legal IssuesOrganizational Challenges

Vendor/Provider IssuesLack of Internal Process

ManagementInternal Resources/Expertise

Migration/IntegrationCompliance

Security of Data, Control of Data Locality, SovereigntyHuman Change Management

Pricing/Budget/CostSecurity

Other Pain Points Mentioned Automated Provisioning

Automation Billing/Chargeback/Show-back

Ease of Transfer Between Private and Public Cloud

Integration of Private and Public Cloud Lack of Control

Lack of Flexibility Licensing

Orchestration Performance

Platform/Provider Selection Support

Time to Deployment

Q. What are your top cloud computing-related pain points?Source: Cloud Computing –. www.451research.com

CloudPainPoints

Page 5: Does DevSecOps really exist?

SharedSecurityModel

Page 6: Does DevSecOps really exist?

ComplianceDrag

Emergingtechnologieschangingallthetime

Lackofresources

Accesstodataandsystems

Scaleoftheproblem

Movingtarget– Regulationfrequentlychanges

Reactiveratherthanproactive

Dragonvelocity

Page 7: Does DevSecOps really exist?

“Theproblemforthesecuritypersonwhoisusedtoturningaroundsecurityreviewsinamonthortwoweeksisthey'rejustbeingshovedoutofthegame.There'snowaywithhowInfosec iscurrentlyconfiguredthattheycankeepupwiththat.So,Infosecgetsallthecomplaintsaboutbeingmarginalizedandgettinginthewayofdoingwhatneedsgettingdone.”

GeneKim,formerCTOofTripwireAuthorof“ThePhoenixProject:ANovelAbout IT,DevOps”&“HelpingYourBusinessWin”

InfoSecEndsUpBeingMarginalised

Page 8: Does DevSecOps really exist?

If you think compliance is expensive,

try non-complianceFormer US Deputy Attorney General, Paul McNulty

Page 9: Does DevSecOps really exist?

HighVelocityIT

Page 10: Does DevSecOps really exist?

InfrastructureonDemand

Page 11: Does DevSecOps really exist?

DevOps

DevOps isaprimarymovementinthegrowingtrendto industrialize

ITservicedevelopmentandproduction.

IDCexpectsDevOps strategieswillincreasinglydominateenterpriseand

serviceproviderstrategies.

By2016,DevOpswillbeemployedby25%ofGlobal2000organizations.

DevOps technologieswillachieverevenueof$4Bby2018.

Page 12: Does DevSecOps really exist?

ConfigurationManagement

AutomateatScale

DesiredStateConfiguration

InfrastructureasCode

Efficient&Repeatable

CattlenotPets

Page 13: Does DevSecOps really exist?

AutomationandConvergentInfrastructure

MarkBurgess,creatorofCFEngineAuthorof“InSearchofCertainty”

“Asystem’sdesiredconfigurationstatecanbesaidtobedefinedbyfixedpoints.Mostconfigurationmanagementsystems(e.g.:CFEngine,Chef,Puppet,PowerShellDCS)arebasedonthisidea:theyprovidemeanstodeclarewhatmusthappeninsteadofrequiringimperativeworkflowsthatprescribewhatwedo.”

Page 14: Does DevSecOps really exist?

DrivingTowardsImmutableInfrastructures

“ThisiswhatIcalldisposablecomputing.Throwawayabrokenprocessratherthantrytofixit.Machinescanbemade

expendableaslongasthetotalsoftwareisdesignedforit.Notmuchofitistoday,butwe’regettingthere.Natureshowsthat

thisisagoodwayofscalingservices.”

MarkBurgess,creatorofCFEngineAuthorof“InSearchofCertainty”

Page 15: Does DevSecOps really exist?

•Programmaticallyprovisionandconfigurecomponents

•Treatitlikeanyothercodebase

•Reconstructbusinessfromcoderepository,databackup,andcomputeresources

InfrastructureasCode

Page 16: Does DevSecOps really exist?

Security&ComplianceImplications

Page 17: Does DevSecOps really exist?

Automateallthethings…

Page 18: Does DevSecOps really exist?

Architecture

Conways Law– It’stheLaw

MonolithsSOAMicroservices

Designfor

Deployability

Testability

Operationability

Changability– Evolveyourarchitecture

Cloud

Page 19: Does DevSecOps really exist?

• SecurityasCode- SoftwaredefinedSecurity

• Embedsecuritytestsintothepipeline

• Testsecurityearly

Dev’Sec’Ops

Page 20: Does DevSecOps really exist?

ShiftSecurityLeft

Page 21: Does DevSecOps really exist?

ContinuousSecurity

SecurityPosture

End-to-endVisibility

ContinuousDetection/Prevention

AutomatedConfigurationandScaling

Remediation&Fast

Resolution

DisasterRecoveryandBusinessContinuity

Audit&Compliance

Page 22: Does DevSecOps really exist?

Buildsecurebaseimages thatarerepresentativeofyourinfrastructuresystembase

Designfilesystemlayouttoseparatecodefromdata,and

lockdowntominimumrequiredpermissions.Shouldexpandto

networkaswell

LeverageSANSChecklistandCISBenchmarkresourcesforsystemlevelsecuritybestpracticesandguidance

Leverageconfigurationmanagementtoolsto

standardizedall softwareversionsandconfigurations

DesignSecureImmutableInfrastructure

PreventAttackswithImmutable

Page 23: Does DevSecOps really exist?

ManageVulnerabilitieswithBaseImages

Manage Vulnerabilities• Conduct normal vulnerability scanning• Identify Vulnerabilities that exist in Base Images

versus Application specific packages• Remediate at appropriate level as part of Continuous

Delivery process• Start with Hardened “secure by default” base

Results• Less work, done more reliably• Patching fits naturally into Phoenix Upgrades• Continuous Delivery allow frequent scanning in test

environments to have real value• Fixes potential vulnerabilities systematically

Page 24: Does DevSecOps really exist?

Embrace Phoenix Upgrades• Stand up new instances, don’t upgrade• Route traffic between old and new instances• Rich service metrics and automate rollback• Advanced routing can enable selective rollout

Results• Creates evergreen systems, avoiding configuration drift and technical debt

• Enforces refresh of all system components as complete artifact, tested as a holistic system

• Greatly reduces security risks when combine with immutable instances and configuration management

AdoptPhoenixUpgradeStrategy

Page 25: Does DevSecOps really exist?

Thisexamplewillidentifyanycodethattriestomountdiskvolumes.Ifcodeisidentified,itwillbeauditedandthenworkflowcancontroltheactionofthisdeviationtostandards.

Example- StaticCodeAnalysis

Page 26: Does DevSecOps really exist?

Example– PCICompliance

PCI2.3 - Encryptallnon-consoleadministrativeaccesssuchasbrowser/Web-basedmanagementtools.

rules ’PCI 2.3 – Confirm telnet port not available'rule on run_controlwhen

name = 'should be listening'resource_type = 'port'resource_name = '23'status != 'success'

thenaudit:error("PCI 2.3 - Encrypt all non-console

administrative access such as browser/Web-based management tools.")

notify("[email protected]", "A machine is listening for connections on port 23/telnet!")

endend

RuleControlcontrols 'port compliance' do

control port(23) doit "has nothing listening"expect(port(23)).to_not

be_listeningend

endend

Page 27: Does DevSecOps really exist?

Example– SOXCompliance

SOXSection302.4.B– Establishverifiablecontrolstotrackdataaccess.

rules 'force key based auth'rule on run_controlwhen

name = 'is disabled'resource_type = 'File'resource_name = '/etc/ssh/sshd_config'status = 'failed'

thenaudit:error("SOX Section 302.4.B – Establish

verifiable controls to track data access.")notify(‘[email protected]’, "A

machine has password login enabled!")end

end

RuleControlcontrols 'password authentication' do

control file('/etc/ssh/sshd_config') doit "is disabled”

expect(file('/etc/ssh/sshd_config')).to_notmatch(/^\s*PasswordAuthentication\s+yes/i)

endend

end

Page 28: Does DevSecOps really exist?

WeCanHelp

Page 29: Does DevSecOps really exist?

Wehelpourclientsadoptamoderncomposable stackoftechnologies

Microservices

ConfigurationManagement&InfrastructureAutomation

ContainerTechnology

CloudInfrastructureWeareDocker PremierPartners

Page 30: Does DevSecOps really exist?

Contino helpstotransformthesoftwaredevelopmentfactoryOrganisations havetomodernise theirwaysofworking, theirinfrastructureandtheirapplicationsdeliverypipelines topreventindustrydisruption andmovetoafasterandleanerITmodel.

OLDWORLDARCHITECTURE:Complexinterconnectedlegacysystems

DELIVERYMODEL:Big,risky,infrequent,heavyweightsoftwarereleases

ORGANISATIONALSTRUCTURE:Siloed organisationalstructures

INFRASTRUCTURE:TraditionalphysicalorvirtualisedinfrastructureprovisionedbyIToperations

PRIORITIES:Efficient,predictable,risk-averseITengine

NEWWORLD:ARCHITECTURE:Looselycoupledmicroservicearchitectures

DELIVERYMODEL:Continualstreamofchangethroughcontinuous delivery

ORGANISATIONAL STRUCTURE:Crossfunctionalempoweredteams

INFRASTRUCTURE:Cloudbasedinfrastructureprovisionedbydevelopmentteams

PRIORITIES:Fast,agileandinnovativeITengine

Page 31: Does DevSecOps really exist?

OneOfUK’sTop3LargestRetailBanksAdoptingDockerContainerTechnologyRationalising developmenttoolchainIntroducingMoreAutomationIntoDeliveryPipelineAdvisingOnStrategyForGlobalTransformation

OneOfUK’sTop3LargestRetailersImplementingPublicCloud

ConfigurationManagingOnDemandEnvironments

InfrastructureAsCodeDefinition

Upskilling&TrainingGlobalEngineeringWorkforce

OneOfUK’sTop3LargestTelecomsProvidersIntegratingCloudBrokerAcrossPrivateandPublicCloud

ConfigurationManagingOnDemandEnvironments

ImprovingContinuous DeliveryPipelineandImprovingRigour OfSoftwareDevelopmentLifecycle

Organisations acrossindustriesneedtotransformtheirsoftwaredeliveryengines. Weareworkingwithmanyofthelargestenterprisebrandsacrossverticals.

Contino helptotransformthesoftwaredevelopmentfactory

Page 32: Does DevSecOps really exist?

Howwedrivetransformationandculturalchange

Culturalchangeemergesfrommanysmallsteps.Wehelp todeliveronkeywaysofworkingandtechnologymodernisation initiatives.....

Whilstalsohelping tocreateathrivingandmorevibranttechnology cultureaskeydeliverable.

Process

KeyITProcesses

KPIs

Agile&Lean

People

Organisational Design

Skills

Incentives

Technology

Infrastructure

Architecture

ApplicationDelivery

Page 33: Does DevSecOps really exist?

Whoweworkwith

Page 34: Does DevSecOps really exist?

Thanks!

www.contino.io

[email protected]