is there room for secarch in devsecops
play

Is there room for SecArch in DevSecOps? (or can old dogs perform - PowerPoint PPT Presentation

Is there room for SecArch in DevSecOps? (or can old dogs perform new tricks?) Dimitrios Petropoulos 26 April 2018 $ cut -f5 -d: /etc/passwd | grep -i petropoulos Dimitrios Petropoulos Cryptographer by education (nobodys perfect)


  1. Is there room for SecArch in DevSecOps? 
 (or can old dogs perform new tricks?) Dimitrios Petropoulos 26 April 2018

  2. $ cut -f5 -d: /etc/passwd | grep -i petropoulos • Dimitrios Petropoulos • Cryptographer by education (nobody’s perfect) • Security Architect (& past security developer) by trade • Have been breaking & mending things for over a third of a century

  3. this.Presentation • …contains questions – not answers… • Majority of points in this presentation are • Personal conclusions after having worked with numerous organisations and tried to extract common patterns of behaviour and trends • conjectures (in the mathematical sense of the word, i.e. unproven propositions which appear correct) • Based on relatively recent mindset • Might be controversial… • Don’t expect you to agree with me <Rant>

  4. Constant change & unity of opposites “Τα πάντα ρεί” * (everything flows) “Πόλεμος πατήρ πάντων” (war/struggle is the father of all) Heraclitus (c.535 – c.475 BC) * - and Francesco Gabbani in Occidentali’s Karma

  5. The brave new world The opportunity: The requirements (& benefits): • Cloud • Agility (↑) • *aaS • Speed (↑) • Automation • Scalability (↑) • AI • Cost (↓) • Big Data • …

  6. The challenge is: ‘ security’ Source: https://www.sumologic.com

  7. The birth of DevSecOps • In times where speed and agility are the name of the game, security: • cannot slow down business… • …but cannot be overlooked • The answer (allegedly) comes from automation

  8. It all started here… What does this ‘Sec’ mean?

  9. The ‘Sec’ in ‘DevSecOps’ • Application Security Testing • SAST • DAST • IAST • Infrastructure/Platform Vulnerability Scanning Automated & • Platform configuration & compliance programmatically • Deployment of controls provisioned • Firewalling, micro-segmentation • WAFs, DBSGs, etc. • RASP • Identity & Access Management • …

  10. Where does ‘SecArch’ fit in all this?

  11. Is SecArch superfluous? • We didn’t get software ‘right’ in the era of rigider (stricter?) SDLC paradigms – do we stand a better chance in these agile times? • Can DevOps make a difference? • Can DevSecOps make a difference? • They are a step in the right direction • Facilitating (i.e. automating) unwanted (i.e. security) tasks can only help • But they cannot replace SecArch

  12. WebApp SecArch (example)

  13. InfraSecArch evolution (example) [1] Internet VM VM VM VM VM VM vSwitch vSwitch Hypervisor Hypervisor Trust Zone A - Virtualised Server Trust Zone B - Virtualised Server Internet F/W VM VM VM VM VM VM vSwitch vSwitch Hypervisor Hypervisor Trust Zone C - Virtualised Server Trust Zone D - Virtualised Server Internal F/W

  14. InfraSecArch evolution (example) [2]

  15. ‘* as Code’ • Infrastructure as Code • Security as Code • … • Can we determine (let alone achieve) the objectives without sound SecArch? • Manifestos alone (rugged as they may be) are not enough… • God help us… • SecDevOps’ reach is not broad or deep enough… • It’s not early enough in the lifecycle…

  16. Architecture comes first… Architecture Strategy & Governance Compliance & Cyber Defence Metrics Ops Sec Operations Verification Policy & Standards Dev Construction

  17. Don’t say I didn’t warn you… • XY + XZ = X(Y + Z) Sec(Dev + Ops) • SecDev + SecOps = Now that σ(Dev, Sec, Ops) has freed us from the chains of the mundane , can we focus and spend more time on something that really matters ?

  18. </Rant> Thank you for your attention! Time for questions… https://www.linkedin.com/in/dpetropoulos/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend