does agile make us less secure
play

Does agile make us less secure? Security in a post devops world - PowerPoint PPT Presentation

Does agile make us less secure? Security in a post devops world YOW! Sydney 2019 Michael Brunton-Spall Bruntonspall Ltd Michael Brunton-Spall He/His/Him michael@bruntonspall.com Michael Brunton-Spall Bruntonspall Ltd The second most


  1. Does agile make us less secure? Security in a post devops world YOW! Sydney 2019 Michael Brunton-Spall Bruntonspall Ltd

  2. Michael Brunton-Spall He/His/Him michael@bruntonspall.com Michael Brunton-Spall Bruntonspall Ltd

  3. The second most scariest words in the English language Michael Brunton-Spall Bruntonspall Ltd

  4. The second most scariest words in the English language “Hi, I’m from the Government and I’m here to help” Michael Brunton-Spall Bruntonspall Ltd

  5. The scariest words in the English language? Michael Brunton-Spall Bruntonspall Ltd

  6. The scariest words in the English language? “Hi, I’m from security and I’m here to help” Michael Brunton-Spall Bruntonspall Ltd

  7. Michael Brunton-Spall Bruntonspall Ltd

  8. https://cyberweekly.net Michael Brunton-Spall Bruntonspall Ltd

  9. Why is security evolving Where we’ve come from Where we are going Michael Brunton-Spall Bruntonspall Ltd

  10. How to rethink security practices in organisations Michael Brunton-Spall Bruntonspall Ltd

  11. Some Context Michael Brunton-Spall Bruntonspall Ltd

  12. 2006 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 12

  13. 2010 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 13

  14. 2013 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 14

  15. 2015 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 15

  16. 2019 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 16

  17. Michael Brunton-Spall Bruntonspall Ltd

  18. Michael Brunton-Spall Bruntonspall Ltd

  19. Michael Brunton-Spall Bruntonspall Ltd

  20. Michael Brunton-Spall Bruntonspall Ltd

  21. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 21

  22. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 22

  23. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 23

  24. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 24

  25. Michael Brunton-Spall Bruntonspall Ltd

  26. Maginot Line

  27. 1930 France Michael Brunton-Spall Bruntonspall Ltd

  28. “We’d really like Germany not to invade us” Michael Brunton-Spall Bruntonspall Ltd

  29. In WW1, they came slowly overland and built trenches Michael Brunton-Spall Bruntonspall Ltd

  30. Michael Brunton-Spall Bruntonspall Ltd

  31. Michael Brunton-Spall Bruntonspall Ltd

  32. Michael Brunton-Spall Bruntonspall Ltd

  33. The Germans had invented Blitzkrieg “Lightning Strike” which simply went around Michael Brunton-Spall Bruntonspall Ltd

  34. Michael Brunton-Spall Bruntonspall Ltd

  35. The French were fighting a war from 1920 against an adversary using 1939 techniques Michael Brunton-Spall Bruntonspall Ltd

  36. Evolution

  37. Michael Brunton-Spall Bruntonspall Ltd

  38. Custom built minicomputer Michael Brunton-Spall Bruntonspall Ltd

  39. Servers in data center Michael Brunton-Spall Bruntonspall Ltd

  40. Colocated servers Michael Brunton-Spall Bruntonspall Ltd

  41. Virtual private servers Michael Brunton-Spall Bruntonspall Ltd

  42. Virtual machines at scale Michael Brunton-Spall Bruntonspall Ltd

  43. Michael Brunton-Spall Bruntonspall Ltd

  44. Michael Brunton-Spall Bruntonspall Ltd

  45. Why Wardley Maps? Michael Brunton-Spall Bruntonspall Ltd

  46. We can see changing landscapes Michael Brunton-Spall Bruntonspall Ltd

  47. We can discuss strategies Michael Brunton-Spall Bruntonspall Ltd

  48. A map isn’t reality, it’s just an abstraction Michael Brunton-Spall Bruntonspall Ltd

  49. Things evolve Michael Brunton-Spall Bruntonspall Ltd

  50. As servers move from physical to virtual, single to multiple, practice evolves Michael Brunton-Spall Bruntonspall Ltd

  51. Coevolution of product and practice

  52. Michael Brunton-Spall Bruntonspall Ltd

  53. Michael Brunton-Spall Bruntonspall Ltd

  54. Michael Brunton-Spall Bruntonspall Ltd

  55. How do we administer servers? Michael Brunton-Spall Bruntonspall Ltd

  56. Worries about hard drives, CPU’s, power etc Michael Brunton-Spall Bruntonspall Ltd

  57. Cloud providers give us abstractions Michael Brunton-Spall Bruntonspall Ltd

  58. Michael Brunton-Spall Bruntonspall Ltd

  59. We stop worrying about whether a hard drive fails in a server Michael Brunton-Spall Bruntonspall Ltd

  60. This results in changing operations practice Michael Brunton-Spall Bruntonspall Ltd

  61. DevOps, SRE Michael Brunton-Spall Bruntonspall Ltd

  62. This results in different developer consumption of operations Michael Brunton-Spall Bruntonspall Ltd

  63. Kubernetes, Serverless Michael Brunton-Spall Bruntonspall Ltd

  64. Michael Brunton-Spall Bruntonspall Ltd

  65. What does this mean for security? Michael Brunton-Spall Bruntonspall Ltd

  66. How we think about security has to change Michael Brunton-Spall Bruntonspall Ltd

  67. Security practices have to evolve Michael Brunton-Spall Bruntonspall Ltd

  68. Michael Brunton-Spall Bruntonspall Ltd

  69. Traditional security is about assurance Michael Brunton-Spall Bruntonspall Ltd

  70. Where will my data sit Michael Brunton-Spall Bruntonspall Ltd

  71. Where does the data go Michael Brunton-Spall Bruntonspall Ltd

  72. Michael Brunton-Spall Bruntonspall Ltd

  73. This works when you have individual servers Michael Brunton-Spall Bruntonspall Ltd

  74. This doesn’t work with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  75. This doesn’t work th the e same same with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  76. Security is currently fighting a war from a decade ago Michael Brunton-Spall Bruntonspall Ltd

  77. Mapping Security

  78. Michael Brunton-Spall Bruntonspall Ltd

  79. “Skate to where the puck is going, not where it has been” Wayne Gretsky Michael Brunton-Spall Bruntonspall Ltd

  80. Where the puck was yesterday Michael Brunton-Spall Bruntonspall Ltd

  81. What are solved problems? Michael Brunton-Spall Bruntonspall Ltd

  82. Commonly solved the same way Michael Brunton-Spall Bruntonspall Ltd

  83. Productionised processes Michael Brunton-Spall Bruntonspall Ltd

  84. Michael Brunton-Spall Bruntonspall Ltd

  85. SDLC, Assurance of suppliers, network assurance, hardware assurance Michael Brunton-Spall Bruntonspall Ltd

  86. All cloud customers have similar concerns in this area Michael Brunton-Spall Bruntonspall Ltd

  87. Buy don’t Build Michael Brunton-Spall Bruntonspall Ltd

  88. Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA … Michael Brunton-Spall Bruntonspall Ltd

  89. Where the puck is today Michael Brunton-Spall Bruntonspall Ltd

  90. Michael Brunton-Spall Bruntonspall Ltd

  91. Continuous Integration, Continuous Deployment, DevOps Michael Brunton-Spall Bruntonspall Ltd

  92. Patching Michael Brunton-Spall Bruntonspall Ltd

  93. How quickly can you patch? Michael Brunton-Spall Bruntonspall Ltd

  94. DevOps Michael Brunton-Spall Bruntonspall Ltd

  95. How secure is your code? Michael Brunton-Spall Bruntonspall Ltd

  96. Code review and Pull requests Michael Brunton-Spall Bruntonspall Ltd

  97. Staff identity and single sign on Michael Brunton-Spall Bruntonspall Ltd

  98. Zero Trust Networking Michael Brunton-Spall Bruntonspall Ltd

  99. Michael Brunton-Spall Bruntonspall Ltd

  100. But where is the puck going? Michael Brunton-Spall Bruntonspall Ltd

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend