32
Taking a DevOps Approach to Security Alert Logic & Chef discuss overcoming security challenges in DevOps Yvo Van Doorn Manager, Solutions Architects Chef Software Justin Criswell Cloud Solutions Architect Alert Logic

Overcoming Security Challenges in DevOps

Embed Size (px)

Citation preview

Page 1: Overcoming Security Challenges in DevOps

Taking a DevOps Approach to SecurityAlert Logic & Chef discuss overcoming security challenges in DevOps

Yvo Van Doorn

Manager, Solutions Architects

Chef Software

Justin Criswell

Cloud Solutions Architect

Alert Logic

Page 2: Overcoming Security Challenges in DevOps

Speaker Introduction

• Yvo Van Doorn• Manager, Solutions Architects• Chef Software, Inc.• @yvov• www.linkedin.com/in/yvovandoorn

• Justin Criswell• Cloud Solutions Architect• Alert Logic, Inc.• @JustinCriswell5• www.linkedin.com/in/justincriswell

Page 3: Overcoming Security Challenges in DevOps

Session Overview

More organizations are embracing DevOps to realize compelling business benefits such as faster yet safer feature release cadence, increased

application stability, and rapid response to shifting market conditions.  However, security and compliance monitoring tools have not kept up and

often represent the single largest remaining hurdle to Continuous Delivery. 

Topics covered in this session:•How DevOps Improves your Security Posture•Overcoming Challenges in DevOps Environments

Page 4: Overcoming Security Challenges in DevOps

DevOps Improves Security Posture

Page 5: Overcoming Security Challenges in DevOps

Mark Burgess, Father of Configuration ManagementAuthor of “In Search of Certainty”

Configuration Management

“We suffer sometimes from the hubris of believing that control is a matter of applying sufficient force, or a sufficiently detailed set of instructions.”

Page 6: Overcoming Security Challenges in DevOps

Automation and Convergent Infrastructure

“A system's desired configuration state can be said to be defined by fixed points. Most configuration management systems (e.g.: CFEngine, Chef, Puppet, PowerShell DSC) are based on this idea: they provide means to declare what must happen instead of requiring imperative workflows that prescribe what to do.”

Mark Burgess, Father of Configuration ManagementAuthor of “In Search of Certainty”

Page 7: Overcoming Security Challenges in DevOps

The Birth of DevOps

Page 8: Overcoming Security Challenges in DevOps

Driving toward Immutable Infrastructure

"This is what I call disposable computing. Throw away a broken process rather than trying to fix it. Machines can be made expendable as long as the total software is designed for it. Not much of it is today, but we´re getting there. Nature shows that this is a good way of scaling services."

Mark Burgess, Father of Configuration ManagementAuthor of “In Search of Certainty”

Page 9: Overcoming Security Challenges in DevOps

Infrastructure as Code

• Converge on a regular interval• Configuration Management is idempotent• All persistent changes must be in source control• Manual intervention discouraged• Out-of-band changes will be lost

Page 10: Overcoming Security Challenges in DevOps

Security & Compliance Implications

Page 11: Overcoming Security Challenges in DevOps

Continuous Delivery Patterns

Page 12: Overcoming Security Challenges in DevOps

Test Driven InfrastructureCosts Of Finding

Bugs in ProductionSecurity Issues

Page 13: Overcoming Security Challenges in DevOps

Continuous Security

Auditing & Compliance

End-to-EndVisibility

Disaster Recovery &

Business Continuity

Remediation & Fast

Resolution

Continuous Detection/Protection

Automated Configuration

& Scaling

Security Posture

Page 14: Overcoming Security Challenges in DevOps

v

Page 15: Overcoming Security Challenges in DevOps

OVERCOMING SECURITY CHALLENGES

Page 16: Overcoming Security Challenges in DevOps

Overcoming Security Challenges

• Challenges for Security Technology & Practice Today- AWS Shared Responsibility Model- Challenges remain for Customers

• Leveraging DevOps for Security- Best-Practices for blending DevOps with Security

• Toward Software-Defined Security- Embracing new reality of AWS Cloud Infrastructure

Page 17: Overcoming Security Challenges in DevOps

AWS Shared Responsibility Model

CustomerResponsibili

ty

FoundationServices

Hosts

• Logical network segmentation• Perimeter security services• External DDoS, spoofing, and scanning

prevented

• Hardened hypervisor• System image library• Root access for customer

• Access management• Patch management• Configuration hardening• Security monitoring• Log analysis

Apps

• Secure coding and best practices

• Software and virtual patching• Configuration management

• Access management• Application level attack

monitoring

• Network threat detection

• Security monitoringNetworks

CloudService Provider

Responsibility

Compute Storage

DB Network

Page 18: Overcoming Security Challenges in DevOps

2014: Security Top Cloud Pain PointSecurity

Pricing/Budget/Cost

Human Change Management

Security of Data, Control of Data Locality, Sovereignty

Compliance

Migration/Integration

Internal Resources/Expertise

Management

Lack of Internal Process

Vendor/Provider Issues

Organizational Challenges

Contractual/Legal Issues

Service Reliability/Availability

Network

Lack of Standards 4%

31%

17%

12%

11%

11%10%

9%

8%7.4%

7%

7%

7%

5%

5%

Page 19: Overcoming Security Challenges in DevOps

Application Security Technology Challenges

Network Changes

Host Identity Auto-Scaling

Application Security Technology Challenges

Page 20: Overcoming Security Challenges in DevOps

Traditional Security/Compliance is Slow

Mature DevOps Velocity is Fast

Security Practice does not Keep Up

Security at Odds with DevOps Velocity

Page 21: Overcoming Security Challenges in DevOps

InfoSec Ends Up Being Marginalized

“The problem for the security person who is used to turning around security reviews in a month or two weeks is they're just being shoved out of the game. There's no way with how Infosec is currently configured that they can keep up with that. So, Infosec gets all the complaints about being marginalized and getting in the way of doing what needs getting done.”

Gene Kim, former CTO of TripwireAuthor of “The Phoenix Project: A Novel About IT, DevOps”& “Helping Your Business Win”

Page 22: Overcoming Security Challenges in DevOps

Integrating Security with DevOps

• Leveraging DevOps practice for better Security- Prevent attack vectors with Immutable Systems

-Manage vulnerabilities with Base Images and Configuration Management

- Robust Auditing and Centralized Log Collection- Adopt strategy of Phoenix Upgrades- Embrace end-to-end Continuous Deployment

Page 23: Overcoming Security Challenges in DevOps

Manage Vulnerabilities with Base Images

Manage Vulnerabilities• Conduct normal vulnerability scanning• Identify Vulnerabilities that exist in Base

Images versus Application specific packages• Remediate at appropriate level as part of

Continuous Delivery process• Start with Hardened “secure by default” base

Results• Less work, done more reliably• Patching fits naturally into Phoenix Upgrades• Continuous Delivery allow frequent scanning

in test environments to have real value• Fixes potential vulnerabilities systematically

Page 24: Overcoming Security Challenges in DevOps

Prevent Attacks with Immutable Systems

Build secure base images that are representative of your infrastructure system base

Design file system layout to separate code from data, and

lock down to minimum required permissions. Should

expand to network as well

Leverage SANS Checklist and CIS Benchmark resources for

system level security best practices and guidance

Leverage configuration management tools to

standardized all software versions and configurations

Design SecureImmutable

Infrastructure

Page 25: Overcoming Security Challenges in DevOps

Centralize Robust Auditing & Logging

# This file contains the auditctl rules that are loaded# whenever the audit daemon is started via the initscripts.# The rules are simply the parameters that would be passed# to auditctl.

# First rule - delete all-D

# Increase the buffers to survive stress events.# Make this bigger for busy systems-b 1024

-a exit,always -S unlink -S rmdir-a exit,always -S stime.*……

Implement Local Auditing

#Sample syslog-ng configuration#Lots of configuration required

........

# Send *ALL* System Logs to Log Appliancedestination df_log_appliance_forward { tcp("my-log-appliance" port(514));};

log { source(s_all); destination(df_log_appliance_forward);};

Collect Important Logs

Centralize Log Collection for Search and Filtering

Page 26: Overcoming Security Challenges in DevOps

Adopt Strategy of Phoenix Upgrades

Embrace Phoenix Upgrades• Stand up new instances, don’t upgrade• Route traffic between old and new instances• Rich service metrics and automate rollback• Advanced routing can enable selective rollout

Results• Creates evergreen systems, avoiding

configuration drift and technical debt• Enforces refresh of all system components as

complete artifact, tested as a holistic system • Greatly reduces security risks when combine

with immutable instances and configuration management

Page 27: Overcoming Security Challenges in DevOps

Embrace Complete Continuous Deployment

End-to-End Continuous Deployment• Configuration Management (Chef), • Standardized Environment Images (Packer)• Environment/Subsystem Orchestration Layer • Production-like environments in Dev & Test

must include all components

Results• Hardened base images become part of the

standard development process• Continuous validation of secure configuration• Holistic system validation & testing

#Sample Alert Logic Chef NodeDef{ "name": "cloud-api-node", "versions": { "1.6.0": { "vm_type": "squeeze64", ], "install_phase": { "run_list": [ "[email protected]", ] },….

Leverage Configuration Management

Leverage Standardized Environment Images

Build an Orchestration Layer

#Sample Packer Configuration{"builders": [{ "type": "amazon-ebs", "access_key": "{{user `aws_access`}}", "secret_key": "{{user `aws_secret`}}", "region": "us-east-1", "source_ami": "ami-de0d9eb7", "instance_type": "t1.micro", "ssh_username": "ubuntu", "ami_name": "packer-ex {{timestamp}}" }]

Page 28: Overcoming Security Challenges in DevOps

Moving to Software Defined Security

• Significant Opportunity remains in front of us• Security remains a lot of work• Does not fit naturally into DevOps Roles

• AWS ready to Accelerate Security Technology- Leverage end-to-end visibility available- Protect automatically with real-time configuration- Transform periodic assessment into real-time automated responses

Page 29: Overcoming Security Challenges in DevOps

Leverage End-to-End Visibility

Leverage Detailed Visibility of AWS• AWS describe endpoints reveals environment• Cloud Trail shows incremental changes• Long-term AWS Config unifies this Information

Results• Enables visualization of entire environment• Can reason directly about exploitability• View of environment always up-to-date• No need to coordinate application changes

with security infrastructure

Page 30: Overcoming Security Challenges in DevOps

Protect with Automatic Configuration

Automated Protection• Add security infrastructure on-demand to

cover changes to environment• Autoscale that infrastructure based on traffic

seen in that environment environment

Results• Focus on application deployments and not

configuration of security infrastructure• Implements least-privilege configurations• Seamless experience that “just works” with

Security fitting naturally into DevOps practice

Page 31: Overcoming Security Challenges in DevOps

Transform Assessment to be Real-Time

Real-Time Protection• Assessment activities should become

continuous• Continuous Assessment “just happens” as

deployments occur• Zero-day coverage delivered automatically

Results• No more periodic assessment cycle• Security posture of environment available

immediately and automatically after deployments

• Security matches DevOps Velocity!

Page 32: Overcoming Security Challenges in DevOps

Contact Us

Justin CriswellCloud Solutions ArchitectAlert [email protected] @JustinCriswell5

Yvo Van DoornManager, Solutions ArchitectsChef Software, [email protected]@yvov

Thank you!