20
Join the conversation #devseccon Extending and securing Chat-Ops Arun N

Securing ChatOps - DevSecCon Asia 2017 arun n

Embed Size (px)

Citation preview

Page 1: Securing ChatOps - DevSecCon Asia 2017 arun n

Join the conversation #devseccon

Extending and securing Chat-Ops

Arun N

Page 2: Securing ChatOps - DevSecCon Asia 2017 arun n

Introduction

• Arun Narayanaswamy• 14 years in Dev & Ops• Worked at large enterprises including Fortune 1• Entrepreneur, Student, Photographer and Traveler…

• Disclaimer:• “The opinions expressed, software references and any content in this

presentation are solely mine and they do not represent my employer.”

Page 3: Securing ChatOps - DevSecCon Asia 2017 arun n

How many of you use Chat @ Work?

techcrunch.com

Page 4: Securing ChatOps - DevSecCon Asia 2017 arun n

ChatOps Architecture – How does it work?

© http://nordicapis.com

Page 5: Securing ChatOps - DevSecCon Asia 2017 arun n

Chat Apps – Big Players!

• Instant messaging on steroids• Your ‘whatsapp’ for business!• Collaboration

• Integrated workspace - Text, audio, video• All alerting and messaging in one place• Share, Search & Integrate

• Chat-ops!• Fun

Page 6: Securing ChatOps - DevSecCon Asia 2017 arun n

Bots– Big Players!

• Hubot

errbot.io

lita.io

operable.io

Page 7: Securing ChatOps - DevSecCon Asia 2017 arun n

Hubot – Why?

• CoffeeScript on Node.js based• Active development - Github• Easy integration with third part api’s• Deployable on Heroku, AWS• Works with Slack and HipChat (and more)

• What’s chat without Hubot?

Page 8: Securing ChatOps - DevSecCon Asia 2017 arun n

Typical CD Workflow

• Revolves around the orchestrator • Data need to be consolidated into Splunk/ELK/Jenkins etc.• Now better with• Containers• New-gen monitoring

Page 9: Securing ChatOps - DevSecCon Asia 2017 arun n

CI-CD – Data Flow Bot InteractionsChat Notifications

HipChat / Hubot - Workflow

Page 10: Securing ChatOps - DevSecCon Asia 2017 arun n

Risk

Potential Loopholes (With and without ChatOps)

Page 11: Securing ChatOps - DevSecCon Asia 2017 arun n

Potential Loopholes : Focus today!

Page 12: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 13: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes : Hardware keys

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 15: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes : Soft keys

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 16: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes : Roles

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 17: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes : Rooms

2FA

Multiple Rooms

AWS IAM Policies

• Restricted Channels• Private Channels• Different Instance of Chat

System• 2FA on Chat system itself

Page 18: Securing ChatOps - DevSecCon Asia 2017 arun n

Plugging in the loopholes : IAM (AWS)

2FA

Multiple Rooms

AWS IAM Policies

• Policies on what each system can run• Better control on AWS/Heroku where the bots run

Page 19: Securing ChatOps - DevSecCon Asia 2017 arun n

Summary

© http://nordicapis.com

Page 20: Securing ChatOps - DevSecCon Asia 2017 arun n

Join the conversation #devseccon

Thank you!

linkedin.com/in/arun-n