41
2014 presented by Security/Auditing with Puppet Robert Maury Technical Solutions Engineer|Puppet Labs @RobertMaury

Security/Auditing in Puppet

Embed Size (px)

Citation preview

Page 1: Security/Auditing in Puppet

2014

presented by

Security/Auditing with Puppet Robert Maury Technical Solutions Engineer|Puppet Labs @RobertMaury

Page 2: Security/Auditing in Puppet
Page 3: Security/Auditing in Puppet
Page 4: Security/Auditing in Puppet
Page 5: Security/Auditing in Puppet

Secure by Design

Page 6: Security/Auditing in Puppet

Secure by Design• State Based Configuration

Page 7: Security/Auditing in Puppet

Secure by Design• State Based Configuration

• Robust Reporting

Page 8: Security/Auditing in Puppet

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

Page 9: Security/Auditing in Puppet

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

• Strict Master/Agent Relationship

Page 10: Security/Auditing in Puppet

9 | CONFIDENTIAL & PROPRIETARY

1. Facts The node sends data about its state to the puppet master server. 2.#Catalog#Puppet&uses&the&facts&to&compile&a&catalog&that&specifies&how&the&node&should&be&configured.& 3.#&Report#Configura9on&changes&are&reported&back&to&the&puppet&master. 4.#&Report#Puppet's&open&API&can&also&send&data&to&3rd&party&tools.&

1 Facts 2 Catalog#

Node#

3 Report#

4 Report#Report#Collector#

Puppet Master!

Puppet Enterprise: How Puppet Works Puppet Data Flow for Individual Nodes

Page 11: Security/Auditing in Puppet

I’m an FTP server!

Page 12: Security/Auditing in Puppet

Nah. You should bean application server

Page 13: Security/Auditing in Puppet

OK!Whoo hoo!!

Page 14: Security/Auditing in Puppet

Secure by Design• State Based Configuration

• Robust Reporting

• Centralized Management

• Strict Master/Agent Relationship

• www.puppetlabs.com/security

Page 15: Security/Auditing in Puppet

Secure Workflows

Page 16: Security/Auditing in Puppet

Secure Workflows • Pull Requests!

Page 17: Security/Auditing in Puppet

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

Page 18: Security/Auditing in Puppet

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

Page 19: Security/Auditing in Puppet

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

• Rspec Puppet

Page 20: Security/Auditing in Puppet

Secure Workflows • Pull Requests!

• Automated testing with Jenkins

• Puppet Lint

• Rspec Puppet

• Beaker

Page 21: Security/Auditing in Puppet

Can you write Unit and Integration tests so that, if a module passes them, it guarantees compliance with X security standard?

Page 22: Security/Auditing in Puppet

Simulation Mode?

Page 23: Security/Auditing in Puppet

Simulation Mode?• Some organizations use it for change management

Page 24: Security/Auditing in Puppet

Simulation Mode?• Some organizations use it for change management

• I don’t like it

Page 25: Security/Auditing in Puppet

Simulation Mode?• Some organizations use it for change management

• I don’t like it

• Promote changes from version control during you change window

Page 26: Security/Auditing in Puppet

Modeling Application Level Security

Page 27: Security/Auditing in Puppet

Boundary Network

Page 28: Security/Auditing in Puppet

Boundary Network

Application Network

Page 29: Security/Auditing in Puppet

Boundary Network

Application Network

Application Tier

Page 30: Security/Auditing in Puppet

Boundary Network

Application Network

Application Tier

Node

Page 31: Security/Auditing in Puppet

Security Community & Puppet

Page 32: Security/Auditing in Puppet

Security Community & Puppet• Forge.mil

Page 33: Security/Auditing in Puppet

Security Community & Puppet• Forge.mil

• NIST (http://usgcb.nist.gov/usgcb/rhel/download_rhel5.html)

Page 34: Security/Auditing in Puppet

Security Community & Puppet• Forge.mil

• NIST (http://usgcb.nist.gov/usgcb/rhel/download_rhel5.html)

• Fedora Aqueduct (https://fedorahosted.org/aqueduct/)

Page 35: Security/Auditing in Puppet

Security Technical Implementation Guides

Page 36: Security/Auditing in Puppet

Security Technical Implementation Guides• http://iase.disa.mil/stigs/Pages/index.aspx

Page 37: Security/Auditing in Puppet

Security Technical Implementation Guides• http://iase.disa.mil/stigs/Pages/index.aspx

• https://github.com/robertmaury/stig

Page 38: Security/Auditing in Puppet

Best Practices

Page 39: Security/Auditing in Puppet

Best Practices• Comment resources with the rule you’re addressing

Page 40: Security/Auditing in Puppet

Best Practices• Comment resources with the rule you’re addressing

• Err on the side of simplicity so the modules can be read by non-technical staff

Page 41: Security/Auditing in Puppet

Questions?