Enterprise Cloud Security via DevSecOps



Similar documents
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Servers. Servers. NAT Public Subnet: /20. Internet Gateway. VPC Gateway VPC: /16

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Virtualization and Cloud: Orchestration, Automation, and Security Gaps

RED HAT CLOUDFORMS ENTERPRISE- GRADE MANAGEMENT FOR AMAZON WEB SERVICES

LONDON. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

Securing SharePoint 101. Rob Rachwald Imperva

McAfee Public Cloud Server Security Suite

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

AppStack Technology Overview Model-Driven Application Management for the Cloud

Introduction to AWS in Higher Ed

DevOps on AWS: Best Practices for Enterprise IT Teams

Ansible in Depth WHITEPAPER. ansible.com

Copyright 11/1/2010 BMC Software, Inc 1

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

privileged identities management best practices

Elastic Detector on Amazon Web Services (AWS) User Guide v5

Leveraging SANS and NIST to Evaluate New Security Tools

Intrusion Detection in the Cloud

AIST Data Symposium. Ed Lenta. Managing Director, ANZ Amazon Web Services

Microsoft Windows Server Failover Clustering (WSFC) and SQL Server AlwaysOn Availability Groups on the AWS Cloud: Quick Start Reference Deployment

CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

How To Use The Cloud For Dev Ops

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Deploy Remote Desktop Gateway on the AWS Cloud

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

QlikView, Creating Business Discovery Application using HDP V1.0 March 13, 2014

Vulnerability Management

AWS Directory Service. Simple AD Administration Guide Version 1.0

Advanced Configuration Steps

Configuring user provisioning for Amazon Web Services (Amazon Specific)

IT Operations Management: A Service Delivery Primer

How to Grow and Transform your Security Program into the Cloud

Cloud Computing with Amazon Web Services and the DevOps Methodology.

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Tableau Online Security in the Cloud

AWS Security & Compliance

AWS CodePipeline. User Guide API Version

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

Paxata Security Overview

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

UTILIZING CLOUDCHECKR FOR SECURITY

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Using Amazon EMR and Hunk to explore, analyze and visualize machine data

Using Red Hat Systems Management Tools in a Hybrid Cloud

Cloud models and compliance requirements which is right for you?

Hands-On Microsoft Windows Server 2008

Best Practices for Building a Security Operations Center

Sugar Professional. Approvals Competitor tracking Territory management Third-party sales methodologies

Creating a DUO MFA Service in AWS

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

A Sumo Logic White Paper. Harnessing Continuous Intelligence to Enable the Modern DevOps Team

How To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks)

Strengthen security with intelligent identity and access management

IaaS Configuration for Cloud Platforms

Sugar Professional. Approvals Competitor tracking Territory management Third-party sales methodologies

SERVER CLOUD DISASTER RECOVERY. User Manual

RSA Security Anatomy of an Attack Lessons learned

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Cloud & DevOps Program Vision and Strategy. Jason Snyder, Steve Martino, and Erica Bradshaw

Cloud Essentials for Architects using OpenStack

PCI Requirements Coverage Summary Table

1-800-Flowers.com: Configuration Management, Security & Cloud Operations with Puppet Enterprise

TRIPWIRE NERC SOLUTION SUITE

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

CPSC 491. Today: Source code control. Source Code (Version) Control. Exercise: g., no git, subversion, cvs, etc.)

Jenkins World Tour 2015 Santa Clara, CA, September 2-3

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

Continuous Delivery on AWS. Version 1.0 DO NOT DISTRIBUTE

ITIL Asset and Configuration. Management in the Cloud

Copyright 2013 Splunk Inc. Introducing Splunk 6

Editions Comparison Chart

Aleksandar Nenov. Devops Talk Belgrade 2015

Trust but Verify: Best Practices for Monitoring Privileged Users

Getting Started with DevOps Automation

Using Foundstone CookieDigger to Analyze Web Session Management

Introduction to DevOps on AWS

DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

The AppSec How-To: Achieving Security in DevOps

Virtualization and IaaS management

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

White Paper. Managing Risk to Sensitive Data with SecureSphere

Alfresco Enterprise on AWS: Reference Architecture

Amazon Web Services Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand

Transcription:

SESSION ID: ASD-T08 Enterprise Cloud via DevSecOps Shannon Leitz Sr Mgr, Cloud & DevSecOps Leader Intuit Information @devsecops Scott C Kennedy Scientist Intuit Information @scknogas

Agenda Who we are Applying DevSecOps for 3+ years to support Enterprise Cloud migrations 20+ yrs experience with Virtualization, Software Defined Environments and Cloud What we ll cover Information about the DevSecOps model and the experiments that helped us discover it A path for developing your own Enterprise Cloud program using DevSecOps practices Why it s important Cloud and DevOps adoption require a different approach to Enterprise Nearly 70% of All Workloads occur in Cloud Data Centers within 2015* Public Cloud growth is 50% higher than Private Cloud* * Cisco Global Cloud Index 2

The Challenge Securing Enterprise Workloads in the Cloud Pain Trial & Error Blood, sweat & tears Ouch, my head hurts! Bang Head Here It would have been great to hear this talk a couple years ago.

The Team Intuit Cloud Leading Cloud at Intuit DevSecOps Lean Start Principles Decision Support Assisting 3000+ Developers AWS Professional Services Integrated solutions Delivery assistance Partner coaching Sample code & accelerators Access across AWS teams

The Timeline as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Start Here? Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Drivers for DevSecOps Embedding into DevOps Teams was a disaster There aren t enough Professionals to embed into DevOps Teams Compliance checklists didn t take us very far before we stopped scaling because of manual work We learned we couldn t keep up with automated deployments without our own automation Standard Operations did not work and continuous change became overwhelming And we needed far more data than we expected to help the business make decisions

The Art of DevSecOps DevSecOps Engineering Operations Compliance Operations Science Experiment, Automate, Test Hunt, Detect, Contain Respond, Manage, Train Learn, Measure, Forecast

Step Zero: Establishing Principles 1. Customer focused mindset 2. Scale, scale, scale 3. Objective criteria 4. Proactive hunting 5. Continuous detection & response

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

as Word Doc Double-click installer Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Click "Next" Configuration Procedures V 3.6.0.1.1, January 2011 Page 3 of 267 Frozen in Time

as Code is Easy with AWS AWS provides a programmable infrastructure Benefits Easily automated Repeatable Auditable Easy to iterate Forms of Code Access Policy documents CloudFormation templates Ruby scripts Custom APIs

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Experiment with Centralized & Transparent Governance Manage hundreds of AWS accounts Push baseline IAM Roles and IAM Groups Push associated trust policies and access policies Design to support an authoritative code source Include git support Add behavior modifications Discover only (--dry-run) Detect drift and show differences (--diff) Replace with approved baseline (no --dry-run) Tune verbosity (--debug)

Centralized Governance BU Accounts (Trusting) IAM IAM IAM IAM IAM IAM SecRole SecRole SecRole SecRole SecRole SecRole Central Account (Trusted) IAM Admin How did we decide which roles would be deployed? Human IAM Admin Incident Response Read Only Services IAM Grantor Instance Roles required to support security services Read Only

Baseline IAM Role Catalog Short Description Role Name Access Policies Trust Policy

Centralized Governance Workflow Baseline IAM Catalog 1 2 5 Develop Review Test Approve Commit Source Code Repository Pull Ruby 3 Push 4 STS Creds SecRole IAM Role Trusting BU Accounts AKID/SAK Admin

Acting on Drift Detection Account Grade: C Heal Account?

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Sec Ops Reloaded for the Cloud applying these principles Dynamic Attack Trees created and maintained by SecOps Data collection is tied to Threat Modeling Rules & Alerting support Hunting Inline Forensics I MY

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Threat Analytics Platform Data Sources

Threat Analytics Platform - Trends

Threat Analytics Platform Shared Rules

Threat Analytics Platform - Visualization

Threat Analytics Platform - Alerts

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Compliance Operations for Actionable Inline Feedback experimenting with these principles Dynamic automated evaluations Compliance alerts are provided in real-time Self-Service Education Education on-demand

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

DevSecOps Toolkit Cross-Account Roles IAM IAM IAM IAM IAM IAM SecRole SecRole SecRole SecRole SecRole SecRole BU Accounts (Trusting) Central Account (Trusted) IAM Admin How did we decide which roles would be deployed? Human IAM Admin Incident Response Read Only Services IAM Grantor Instance Roles required to support security services Read Only

DevSecOps Toolkit MFA via Google Authenticator Human Admins are dangerous and require AWS integrated MFA with Google Authenticator to protect your account. Important for AWS to a validate human being vs. using external MFA to support authentication that could be hijacked. MFA placed on the Assumed Role which is trusted by the child account role.

DevSecOps Toolkit Help & Interactive Mode lioness-9:toolkit shannon$ bundle exec bin/tk help config Usage: tk config Options: -i, [--interactive], [--no-interactive] # interactive mode for q&a to set up config -p, [--profile-name=profile_name] # profile name in.aws config file -r, [--master-region=master_region] # region for master account # Default: us-west-2 -a, [--master-account=master_account] # 12 digit AWS account number without dashes -n, [--master-role-name=master_role_name] # name of master role to assume cross-account roles # Default: master-auditor -t, [--target-account-list=target_account_list] # location for csv file containing accounts list to audit # Default: config/accounts.csv -d, [--output-dir=output_dir] # directory for storing results # Default: home -f, [--output-type=output_type] # supports csv # Default: csv Description: Using the devsecops toolkit requires a master configuration file to establish the credentials, role, MFA, etc. used to support cross-account usage. This command provides you with an interactive and advanced interface for creating a configuration file to support your usage. The configuration file can be found in your home directory under.tk/config and you can also hand edit this file using yaml.

DevSecOps Toolkit Output to CSV

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

The Principles of Science Death to F.U.D. (No proof, no problem) Rely on data Prove your assumptions Model the solutions Provide tools to support decisions

Goals of Science Empower teams to make sane security decisions Prevent security breaches by guiding process Uncover new threats and vulnerabilities through data analysis Seek out new life and new civilizations, to boldly go where no Team has gone before

Examples of Science 90 day password length vs. $10k attacker offline cracker speed MD-5 = 19 characters SHA-512 = 11 characters BCRYPT = 8 characters With RHEL6 and goal of CVSS < 4, how often to restack? Amazon RHEL 6 Server = 5.3 days Our base AMI = 10.5 days 37

as Code? Operations? Compliance Operations? Science? DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

profiling drift on accounts, services and instances AWS accounts threat intel EC2 CloudTrail S3 Glacier ingestion security tools & data security science insights

egress monitoring + threat intel to detect Suspicious Exfiltration EC2 Subnet ingestion VPC Account

as Code? Operations? Compliance Operations? Science? AWSome! DevOps + DevOps + DevSecOps Automate Policy Governance Detection via Operations Compliance via DevSecOps toolkit Science via Profiling

Apply What You Have Learned Today Next week you should: Join the DevSecOps Community via the LinkedIn Group and Twitter Determine which coding language makes sense for your team Start with assessing your org's cloud adoption strategy, security requirements and work backwards In the first three months following this presentation you should: Develop a whitelisting roadmap Identify policies that need to be converted to code Start with Access as a foundation and develop standard naming conventions Within six months you should: Have a platform that supports basic decisions Have a wealth of data to gain insights Begin to provide real-time insights for teams to remediate their issues based on scores/grades 42