Automating security policies From deployment to auditing with - - PowerPoint PPT Presentation

automating security policies
SMART_READER_LITE
LIVE PREVIEW

Automating security policies From deployment to auditing with - - PowerPoint PPT Presentation

Automating security policies From deployment to auditing with Rudder Jonathan CLARKE jcl@normation.com Normation CC-BY-SA normation.com Who am I ? Jonathan Clarke Job: Co-founder and CTO at Normation Line of work:


slide-1
SLIDE 1

Normation – CC-BY-SA normation.com

Automating security policies

From deployment to auditing with Rudder

Jonathan CLARKE – jcl@normation.com

slide-2
SLIDE 2

Normation – CC-BY-SA normation.com

2

Who am I ?

  • Jonathan Clarke
  • Job: Co-founder and “CTO” at Normation
  • Line of work:

Initially system administration, infrastructure management...

Now automating all that! (+ paperwork...)

  • Free software:

Co-creator of Rudder

Developer in several LDAP projects: LSC, LTB, OpenLDAP …

Contributor to CFEngine

Contact info Email: jcl@normation.com Twitter: @jooooooon42 (that's 7 'o's!)

slide-3
SLIDE 3

Normation – CC-BY-SA normation.com

3

Context

IT infrastructure

slide-4
SLIDE 4

Normation – CC-BY-SA normation.com

4

Context

IT infrastructure

Automation

slide-5
SLIDE 5

Normation – CC-BY-SA normation.com

5

Context

IT infrastructure

Automation

Motivations:

Build new hosts quickly Scale out quickly Rebuild hosts quickly Avoid human error

slide-6
SLIDE 6

Normation – CC-BY-SA normation.com

6

Context

IT infrastructure

Automation

Tools:

slide-7
SLIDE 7

Normation – CC-BY-SA normation.com

7

What about compliance?

IT infrastructure

Compliance?

slide-8
SLIDE 8

Normation – CC-BY-SA normation.com

8

What about compliance?

IT infrastructure

Compliance?

Motivations:

Get a complete

  • verview

Prove compliance Get an

  • bjective
  • verview

Know about config drift

slide-9
SLIDE 9

Normation – CC-BY-SA normation.com

9

What about compliance?

IT infrastructure

Compliance to what?

slide-10
SLIDE 10

Normation – CC-BY-SA normation.com

10

What about compliance?

IT infrastructure

Compliance to what?

Industry regulations Best practices Corporate regulations Laws

Rules come from everywhere:

slide-11
SLIDE 11

Normation – CC-BY-SA normation.com

11

What about compliance?

IT infrastructure

Compliance to what?

Password policy Tripwire (disk contents) Enforce some parameters in a service MOTD “warning”

Practical examples

slide-12
SLIDE 12

Normation – CC-BY-SA normation.com

12

How is this different from “just” automation?

Automation vs Compliance

How different is this technically?

slide-13
SLIDE 13

Normation – CC-BY-SA normation.com

13

How is this different from “just” automation?

Frequency The more often you check, the more reliable your compliance reporting is.

How can you reach this goal?

Lightweight, efficient agent

Run “slow” checks in the background (file copying

  • ver network...)

Focus on the security checks Reporting can be done later

slide-14
SLIDE 14

Normation – CC-BY-SA normation.com

14

How is this different from “just” automation?

All or nothing Compliance matters on each and every system. Not “most”. All of them.

How can you reach this goal?

Support all the {old,weird,buggy, new,”different”} {OS,software, versions} Make sure you know what systems exist: rely on an inventory DB Two systems may be alike on paper, they very rarely are in reality.

slide-15
SLIDE 15

Normation – CC-BY-SA normation.com

15

How is this different from “just” automation?

You cannot get it wrong. You cannot get it wrong. You cannot get it wrong. If you care about compliance, “prod” is usually pretty real.

How can you reach this goal?

Fake ID + Prebook flight to Cayman islands?

slide-16
SLIDE 16

Normation – CC-BY-SA normation.com

16

How is this different from “just” automation?

You cannot get it wrong. You cannot get it wrong. You cannot get it wrong. If you care about compliance, “prod” is usually pretty real.

How can you reach this goal?

Don't touch stuff you don't need to. Be specific. (One line in a file?) Start with no changes. Just check. Dry-run? Cover full cycles (days, weeks, months...) Classic quality control (reviews...)

slide-17
SLIDE 17

Normation – CC-BY-SA normation.com

17

The result

100%

slide-18
SLIDE 18

Normation – CC-BY-SA normation.com

18

So, what have we actually done?

Applied these principles in

slide-19
SLIDE 19

Normation – CC-BY-SA normation.com

19

Rudder's goal is to provide a plug-and-play solution, that is extendable to automate IT infrastructure, however complex (or not).

Key values Plug and play Open source Simple Smart

Combine proven tools

and

best practices

to

extend their adoption Works out-of-the-box

thanks to

smart default settings Extendable via modules for flexibility and integration

Introducing Rudder

slide-20
SLIDE 20

Normation – CC-BY-SA normation.com

20

Introducing Rudder

Specifically designed for automation & compliance Pre-packaged for all supported OSes Open Source Simplified user experience via a Web UI Graphical reporting Based on CFEngine 3

http://www.rudder-project.org/ Vagrant config to test:

https://github.com/normation/rudder-vagrant/

slide-21
SLIDE 21

Normation – CC-BY-SA normation.com

21

Key points for security compliance

Continuous checking

Every 5 minutes

Multi-platform

Linux, Unix, Windows, Android...

Separate configuration from implementation Reporting Done after the checks, separate process

High freqency, trust in compliance reporting Reuse implementations, less bugs, shared code... Clear separation of roles Cover as many systems as possible Avoid bottleneck Different report types

slide-22
SLIDE 22

Normation – CC-BY-SA normation.com

22

Rudder - workflow

Management

Define security policy Changes (fixes, upgrades...)

c c Community Expert Sysadmins

Configure parameters

Configuration agent

Initial application Continuous verification REPORTING Technical abstraction (method vs parameters)

slide-23
SLIDE 23

Normation – CC-BY-SA normation.com

23

Final thoughts

It works but the tools can be improved:

  • detect changes (inotify?) - even 1 minute not always enough
  • dry-run iterations automatically?

Next steps?

  • Authorizations: who can change which parameters?

(law vs regulations vs policy...)

  • Correlate with monitoring data: determine root causes, cross

effects... Summary:

  • Security compliance is a very demanding type of automation
  • Possible today with open source tools
  • Main issue is about how you use them!
slide-24
SLIDE 24

Normation – CC-BY-SA normation.com

Questions?

Follow us on Twitter: @RudderProject

Jonathan CLARKE – jcl@normation.com