splitting the check on compliance and security

40
Splitting the Check on Compliance and Security Jason Chan Engineering Director – Cloud Security @chanjbs

Upload: jason-chan

Post on 10-Jan-2017

10.783 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Splitting the Check on Compliance and Security

Splitting the Check on Compliance and SecurityJason Chan Engineering Director – Cloud Security@chanjbs

Page 2: Splitting the Check on Compliance and Security

2015 for Developers

Page 3: Splitting the Check on Compliance and Security

2015 for Auditors and Security Teams

Page 4: Splitting the Check on Compliance and Security

The Problem

Page 5: Splitting the Check on Compliance and Security

Developers:Incentives• Speed• FeaturesWant• Freedom to innovate• New technology

Incentives and Perspectives

Auditors:Incentives• Compliance with regulatory

obligations• Verifiable processesWant• Well-known technology• Predictability and stability

Page 6: Splitting the Check on Compliance and Security

The Resolution

Page 7: Splitting the Check on Compliance and Security

“You build it, you run it.”-Werner Vogels, Amazon CTO

(June 2006)

Page 8: Splitting the Check on Compliance and Security

Who Cares About These Answers?

• When did that code change? • Who made the change?• Who logged in to that host?• What did they do? • Who pushed that code? • When was this dependency

introduced?• Was that build tested before

deployment? • What were the test results?

?

Page 9: Splitting the Check on Compliance and Security

Before

Developers and Auditors

After

AuditorDev

AuditorDev

Page 10: Splitting the Check on Compliance and Security

How Do We Get There?

Page 11: Splitting the Check on Compliance and Security

Two Approaches to Compliance

Page 12: Splitting the Check on Compliance and Security

Pillars for Effective, Efficient, and Flexible Compliance

Page 13: Splitting the Check on Compliance and Security

The Pillars

1. Traceability in development2. Continuous security visibility3. Compartmentalization

Page 14: Splitting the Check on Compliance and Security

Discussion Format

Page 15: Splitting the Check on Compliance and Security

Traceability in Development

Page 16: Splitting the Check on Compliance and Security

Common Audit Requirements for Software Development

• Review changes.• Track changes.• Test changes.• Deploy only approved code.• For all actions:

• Who did it?• When?

Page 17: Splitting the Check on Compliance and Security

Spinnaker for Continuous Deployment

• Customizable development pipelines (workflows)

• Based on team requirements

• Single interface to entire deployment process

• Answers who, what, when, and why

• For developers and auditors

AuditorDev

Page 18: Splitting the Check on Compliance and Security

Spinnaker: Compliance-Relevant Features

• Integrated access to development artifacts• Pull requests, test results, build artifacts, etc.

• Push authorization• Restricted deployment windows (time, region)• Deployment notifications

Page 19: Splitting the Check on Compliance and Security

Spinnaker: App-Centric View & Multistage Pipeline

Multiple deployment stagesAutomated

Manual

Failed test, do not proceed

Application-specific components

Link to build (Jenkins CI), code changes (Stash)

Page 20: Splitting the Check on Compliance and Security

Automated Canary Analysis

Canary test score

Link to details

Result

Page 21: Splitting the Check on Compliance and Security

Manual Approval (Optional)

Page 22: Splitting the Check on Compliance and Security

Restricted Deployment Window (Optional)

Page 23: Splitting the Check on Compliance and Security

Restricted Deployment Window (Optional)

Page 24: Splitting the Check on Compliance and Security

Deployment Notification (Optional)

Page 25: Splitting the Check on Compliance and Security

Spinnaker vs. Manual Deployments

• Deployment is independent of languages and other underlying technology.

• Java, Python, Linux, Windows… • Multiple stages of automated testing.

• Integration, security, functional, production canary.• Fully traceable pipeline.

• Changes and change drivers are fully visible.• All artifacts and test results available.

Page 26: Splitting the Check on Compliance and Security

Control Mapping

Control DescriptionPCI 6.3.2 Perform code reviews prior to release.

PCI 6.4.5 Test changes to verify no adverse security impact.

COBIT BAI03.08 Execute solution testing.

Page 27: Splitting the Check on Compliance and Security

Continuous Security Visibility

Page 28: Splitting the Check on Compliance and Security

Issues with Application Security Risk Management

• Spreadsheets and surveys!• Human driven.• Presuppose managed

intake.• One-time vs. continuous.

Page 29: Splitting the Check on Compliance and Security
Page 30: Splitting the Check on Compliance and Security

Penguin Shortbread – Automated Risk Analysis for Microservice Architectures

• Analyze microservice connectivity.

• Passively monitor app and cloud configuration.

• Develop risk scoring based on observations.

Page 31: Splitting the Check on Compliance and Security

Application Risk Metric

Metric summary

Metric algorithm

Scoring

Page 32: Splitting the Check on Compliance and Security

Application Risk Rollup

MetricsRisk metrics by region/environment

Page 33: Splitting the Check on Compliance and Security

Control Mapping

Control DescriptionPCI 1.2.1 Restrict traffic to that which is necessary.

PCI 12.2 Implement a risk-assessment process.

APO 12.03 Maintain a risk profile.

Page 34: Splitting the Check on Compliance and Security

Compartmentalization

Page 35: Splitting the Check on Compliance and Security

Compartmentalization

Resilience: Limit blast radius Confidentiality: Need to know

Page 36: Splitting the Check on Compliance and Security

User Payments application

Payment processor

s and partners

Encrypted credit card database

Name Encrypted CCJohn Doe XXXXXXXXXX

HSM

Monolithic Card Processing in the Data Center

Encrypt/

decryp

t

CC

Sign up/change CC

Store/retrieve CC

Real-time/batch auth

Tax, analytics, fraud, etc.

Web server

Page 37: Splitting the Check on Compliance and Security

Microservices and Tokenization in AWS

CloudHSM

Payment applicatio

n

Token service

Token db

Token Encrypted CCabc123 XXXXXXXXXXCrypto

proxy

Name TokenJohn Doe abc123

Payments db

Token vault

User

Sign up/change CC

Web server

Tokenize/

detokenize

Page 38: Splitting the Check on Compliance and Security

Control Mapping

Control DescriptionPCI 2.2 Implement one primary function per server.

DSS05.02 Manage network and connectivity security.

DSS05.03 Manage endpoint security.

Page 39: Splitting the Check on Compliance and Security

Wrapping Up!

• Limit investments in approaches that meet narrow regulatory needs.

• Embrace core security design and operational principles.

• Focus on tools and techniques that serve multiple audiences. Auditor

Dev

Page 40: Splitting the Check on Compliance and Security

Thank you!

@chanjbs - [email protected]

Liebendorfer, Craig
I know you have a lot of slides already, but you do need a Takeaways slide. In other words, if they are sitting there excited about your session and want to apply these lessons when they are back at the office, what are the next steps they should take?