About Me CEO & Co-Founder at Snyk Find & Fix - - PowerPoint PPT Presentation

about me
SMART_READER_LITE
LIVE PREVIEW

About Me CEO & Co-Founder at Snyk Find & Fix - - PowerPoint PPT Presentation

The Three Faces of DevSecOps Guy Podjarny (@guypod) @guypod About Me CEO & Co-Founder at Snyk Find & Fix vulnerabilities in open source dependencies! Founder @Blaze, CTO @Akamai Security work since 1997 DevOps


slide-1
SLIDE 1

@guypod

The 


Three Faces of DevSecOps


Guy Podjarny (@guypod)

slide-2
SLIDE 2

@guypod

About Me

  • CEO & Co-Founder at Snyk
  • Find & Fix vulnerabilities in open source dependencies!
  • Founder @Blaze, CTO @Akamai
  • Security work since 1997
  • DevOps & Performance since 2010
  • Speaker, writer, communicator
slide-3
SLIDE 3

@guypod

We all love 


DevOps!



 … but why?

slide-4
SLIDE 4

@guypod

DevOps helps 
 deliver value and adapt to market needs
 faster and at scale

slide-5
SLIDE 5

@guypod

What does


“Doing DevOps” 


mean?

slide-6
SLIDE 6

@guypod

1. DevOps Technologies 2. DevOps Methodologies

  • 3. DevOps Shared Ownership
slide-7
SLIDE 7

@guypod

So… what does


DevSecOps


mean?

slide-8
SLIDE 8

@guypod

1. Securing DevOps Technologies 2. Security in DevOps Methodologies

  • 3. Include Security in DevOps Shared Ownership
slide-9
SLIDE 9

@guypod

Securing


DevOps Technologies

slide-10
SLIDE 10

@guypod

DevOps created or drove use of


New Technologies

Cloud Containers Serverless Open Source Libraries

slide-11
SLIDE 11

@guypod

Creates


Two Types of Problems 


for security

slide-12
SLIDE 12

@guypod

First, Security solutions 


Often Don’t work 


in the new surrounding

slide-13
SLIDE 13

@guypod

Web App Firewall

Traditionally an appliance

slide-14
SLIDE 14

@guypod

How do you use 


block web attacks


when the applications you protect


auto-scale?

slide-15
SLIDE 15

@guypod

WAF that Auto-Scales

slide-16
SLIDE 16

@guypod

WAF as a Service

slide-17
SLIDE 17

@guypod

The need to adapt is 


an opportunity 


for new players

slide-18
SLIDE 18

@guypod

WAF as part of a Service

slide-19
SLIDE 19

@guypod

Another trouble maker: 


Containers!

slide-20
SLIDE 20

@guypod

End Point Protection

slide-21
SLIDE 21

@guypod

How do you identify malware or viruses


within a container?

slide-22
SLIDE 22

@guypod

Endpoint Protection via 
 Container Host

slide-23
SLIDE 23

@guypod

How do you “patch your servers” 
 in an ad-hoc, disposable container?

slide-24
SLIDE 24

@guypod

Scan Docker Images for OS Vulns

slide-25
SLIDE 25

@guypod

First, Existing security solutions 


are logically valuable


but need to

Technically adapt

slide-26
SLIDE 26

@guypod

Second, new technologies introduce


New Security Risks


that require new security solutions

slide-27
SLIDE 27

@guypod

Cloud introduces the risk


Unsecured Buckets 


at an unprecedented scale

slide-28
SLIDE 28

@guypod

Attackers accessed details of 


600,000 Uber drivers


and “some personal info” of


57M Uber users

Uber hack of 2016

slide-29
SLIDE 29

@guypod

  • Dev pushed S3 tokens to private github.com repo
  • Attackers gained access to repo, stole tokens
  • Uber was not using 2FA
  • Attackers used token to steal info from S3

Uber hack details

slide-30
SLIDE 30

@guypod

  • Dev stored sensitive URL in public github.com gists
  • Attacker accessed Uber data in May, 2014
  • “Only” 50,000 drivers exposed that time

Uber hack of 2014

slide-31
SLIDE 31

@guypod

You had an 


access key?

You were lucky!

slide-32
SLIDE 32

@guypod

Cloud buckets are often
 Entirely unprotected

slide-33
SLIDE 33

@guypod

New platforms also mean new 


Insecure Configuration


risks

slide-34
SLIDE 34

@guypod

Insecure Config Breaches

slide-35
SLIDE 35

@guypod

Cloud Security Configuration
 Static & Event Scan

slide-36
SLIDE 36

@guypod

Cloud Security Configuration
 Audit Scan

slide-37
SLIDE 37

@guypod

Containers add the risk of


Sandbox Escaping 


Jumping from container to its host

slide-38
SLIDE 38

@guypod

https://snyk.io/blog/a-serious-security-flaw-in-runc-can-result-in-root-privilege-escalation-in-docker-and-kubernetes/

slide-39
SLIDE 39

@guypod

Container Sandbox Escaping protection

slide-40
SLIDE 40

@guypod

Security For DevOps Technologies: 1. Adapt existing security tools to new tech

  • 2. Address new security risks new tech introduced
slide-41
SLIDE 41

@guypod

Security in


DevOps Methodologies

slide-42
SLIDE 42

@guypod

DevOps also changes 


Methodologies

slide-43
SLIDE 43

@guypod

CI/CD

slide-44
SLIDE 44

@guypod

Typical security approach: 


Stop here for an audit

slide-45
SLIDE 45

@guypod

Typical security approach: 


Stop here for an audit

With CI/CD 


Stopping is not an option!

slide-46
SLIDE 46

@guypod

Solution: 


Automated App Sec Testing!


Static & Dynamic… kinda.

slide-47
SLIDE 47

@guypod

Static Testing (SAST) in CI/CD

  • Scan your code to find potential vulnerable code paths
  • Scans take hours (or days) to run != builds take minutes

  • Adaptation: incremental scans
  • Run long scans ~weekly
  • Run “Delta” scans in the build

  • Still a problem with false positives… different topic!
slide-48
SLIDE 48

@guypod

Dynamic Testing (DAST) in CI/CD

  • Tests a deployed instance like a hacker to find vulnerabilities
  • Scans require dedicated env… often doesn’t exist.
  • Scans take way too long to complete

  • Adaptation:
  • IAST - instrument app, run unit-tests, deduce security issues
  • Less comprehensive, but works with less overhead
  • Very imperfect… but sometimes work
slide-49
SLIDE 49

@guypod

New Alternative: 
 Invoke scan in build, test async

slide-50
SLIDE 50

@guypod

SCA in CI/CD

  • Flag use of libraries with known vulnerabilities
  • “Break build” on vulnerability or otherwise alert
  • Fast & accurate - naturally CI/CD friendly…
slide-51
SLIDE 51

@guypod

Microservices

slide-52
SLIDE 52

@guypod

  • Clear perimeter
  • Constrained flow
  • Wholesale deploys
  • Many perimeters
  • Flexible flow
  • Constant deploys
slide-53
SLIDE 53

@guypod

Security monitoring in Microservices

  • Adaptation: Track data flows across apps
slide-54
SLIDE 54

@guypod

Security monitoring in Microservices

  • Adaptation: Embed installation into deploy flow
slide-55
SLIDE 55

@guypod

Security solutions 


Adapt to new methodologies

to stay relevant

slide-56
SLIDE 56

@guypod

DevOps methodologies also offer


Opportunities


for better security

slide-57
SLIDE 57

@guypod

When a container misbehaves… 


Just kill it!


(It’ll start up again in no time)

slide-58
SLIDE 58

@guypod

Continuous Deployments mean

Fast security patch deployment!


(contain risks faster and more safely than ever)

slide-59
SLIDE 59

@guypod

CI/CD means easy

Automated security gating!


(block secrets or vulns from passing, enforce policies, etc.)

slide-60
SLIDE 60

@guypod

Powerful and pervasive use of Git allows

Securing Code via GitOps!


(test code deltas, automate code fixes, raise visibility)

slide-61
SLIDE 61

@guypod

Security For DevOps Methodologies: 1. Adapt how existing security tools are applied

  • 2. Use the new opportunities to do security better
slide-62
SLIDE 62

@guypod

We’ve seen such changes before: 


Virtualisation, Mobile…

slide-63
SLIDE 63

@guypod

The bigger DevOps change: 


People & Ownership

slide-64
SLIDE 64

@guypod

Include Security in 


DevOps Shared Ownership

slide-65
SLIDE 65

@guypod

The


Syrian Electronic Army


and the


Financial Times

slide-66
SLIDE 66

@guypod

  • 1. Phishing email to employees who


had publicly shared their email

Masked link to an 
 attacker controlled
 compromised site

slide-67
SLIDE 67

@guypod

  • 2. Link redirects to 


spoofed FT Single Sign-on
 page (for Google Apps)

Some users entered their passwords…

slide-68
SLIDE 68

@guypod

  • 3. Attackers use compromised accounts to 


Email more FT users
 this time from an FT email address

More users are compromised…

slide-69
SLIDE 69

@guypod

  • 4. IT finds out, sends warning email to all.


Attackers send identical email - with evil links

slide-70
SLIDE 70

@guypod

  • 5. Attackers gain access to several

  • fficial Twitter accounts blog

https://www.telegraph.co.uk/technology/twitter/10064184/Financial-Times-hacked-by-Syrian-Electronic-Army.html

slide-71
SLIDE 71

@guypod

“A sobering day”


by Andrew Betts, 
 a compromised FT developer

https://labs.ft.com/2013/05/a-sobering-day/

slide-72
SLIDE 72

@guypod

“Developers might well think they’d be wise to all this – and I thought I was.”

https://labs.ft.com/2013/05/a-sobering-day/

slide-73
SLIDE 73

@guypod

Developers were the 2nd most likely to click a link in a phishing email

https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/

Internal Salesforce Phishing Test


run by Masha Sedova (@modMasha)

slide-74
SLIDE 74

@guypod

Compromising a


high privileged developer 


is hitting the jackpot

slide-75
SLIDE 75

@guypod

DevOps means developers are


more powerful 


than ever

slide-76
SLIDE 76

@guypod

The pace of 


shipping code


is skyrocketing

slide-77
SLIDE 77

@guypod

Developers access 


production systems


daily

slide-78
SLIDE 78

@guypod

Developers access 


user data


daily

slide-79
SLIDE 79

@guypod

Typical team size ratios: 


1 Sec
 10 Ops 100 Dev

slide-80
SLIDE 80

@guypod

Developers cannot 


  • utsource security.

Nobody else can keep up.

slide-81
SLIDE 81

@guypod

Developers believe


dev should (co)own security

Source: State of open source security
 https://snyk.io/blog/81-believe-developers-should-own-security-but-they-arent-well-equipped/

68% of users feel 


developers should own security responsibility of container images

slide-82
SLIDE 82

@guypod

Challenge:


Security tools

are designed for 


security professionals

slide-83
SLIDE 83

@guypod

Integrating an audit tool into InteliJ Does not make it a developer tool…

slide-84
SLIDE 84

@guypod

What does make a good 


Developer Tool?

slide-85
SLIDE 85

@guypod

Great Documentation

slide-86
SLIDE 86

@guypod

Ability to try Self-Serve

slide-87
SLIDE 87

@guypod

Education for Non-Security experts

slide-88
SLIDE 88

@guypod

Make issues actionable

slide-89
SLIDE 89

@guypod

Find/build the security tools 


developers will actually use

slide-90
SLIDE 90

@guypod

Challenge: Getting Dev to embrace security And security to embrace dev

slide-91
SLIDE 91

@guypod

Some ideas from 


Security Teams that do it well 


(via The Secure Developer podcast)

slide-92
SLIDE 92

@guypod

PagerDuty Security Team

  • We have a phrase we like on our security team which

is, “we're here to make it easy to do the right thing”

  • … treating security problems as operational problems…

things like Chef, Splunk, AWS tooling… use them for security challenges as well.

https://www.heavybit.com/library/podcasts/the-secure-developer/ep-11-keeping-pagerduty-secure/

slide-93
SLIDE 93

@guypod

Optimizely Security Lead


Kyle Randolph

  • We actually give out T-shirts that say, "Security Hero" on
  • them. This is more exclusive, so it makes people want to

step it up and really go above and beyond to make a security contribution

  • We're using a lot of Spinnaker for our deploy

automation, which is not a security tool, but that's just the place that you can bundle in all the other security configuration that you want to have happen.

https://www.heavybit.com/library/podcasts/the-secure-developer/ep-1-prioritizing-secure-development/

slide-94
SLIDE 94

@guypod

New Relic CSO


Shaun Gordon

  • It's very easy to turn a developer off of a tool very quickly by

giving them unactionable information, by calling them out

  • n something that they don't understand what it is, and

more importantly, how to fix it

  • change the way we do security to fit in with the way the

developers perform their job, instead of trying to get them adapt the way they work to what we're doing.

https://www.heavybit.com/library/podcasts/the-secure-developer/ep-13-how-new-relic-does-security/

slide-95
SLIDE 95

@guypod

Slack CSO


Geoff Belknap

  • The Slack Security team was originally part of the privacy and

policy organization,.. now I report directly to Cal Henderson,

  • ur CTO… and you know a first-class citizen in engineering
  • we sent Atlassian some cake or some cookies recently… in

the past we've also sent cake or pizza when friends are having a bad day… even though we're all in this market, and we're competing against each other… we all rise and fall together, right?

https://www.heavybit.com/library/podcasts/the-secure-developer/ep-14-how-slack-stays-secure-during-hyper-growth/

slide-96
SLIDE 96

@guypod

Look for ways to 


Engage Dev in Security

slide-97
SLIDE 97

@guypod

Include Security in DevOps Shared ownership: 1. Find security tools dev will actually use 2. Look for ways to engage dev in security

slide-98
SLIDE 98

@guypod

DevOps helps 
 deliver value and adapt to market needs
 faster and at scale

slide-99
SLIDE 99

@guypod

1. Securing DevOps Technologies 2. Security in DevOps Methodologies

  • 3. Include Security in DevOps Shared Ownership
slide-100
SLIDE 100

@guypod

Security For DevOps Technologies: 1. Adapt existing security tools to new tech

  • 2. Address new security risks new tech introduced
slide-101
SLIDE 101

@guypod

Security For DevOps Methodologies: 1. Adapt how existing security tools are applied

  • 2. Use the new opportunities to do security better
slide-102
SLIDE 102

@guypod

Include Security in DevOps Shared ownership: 1. Find security tools dev will actually use 2. Look for ways to engage dev in security

slide-103
SLIDE 103

@guypod

One 


Last Point…

slide-104
SLIDE 104

@guypod

We have it 


Backwards!

slide-105
SLIDE 105

@guypod

DevOps is first and foremost


About People!

slide-106
SLIDE 106

@guypod

Embrace the DevOps 


Shared Ownership of Security 


and the rest will follow…

slide-107
SLIDE 107

@guypod

The 


Three Faces of DevSecOps


Guy Podjarny (@guypod)

Thank you!

Check out Snyk
 at the Expo Hall!