the evolving practice of security
play

The evolving practice of security Michael Brunton-Spall - PowerPoint PPT Presentation

The evolving practice of security Michael Brunton-Spall Bruntonspall Ltd Michael Brunton-Spall He/His/Him michael@bruntonspall.com https://tinyletter.com/cyberweekly Michael Brunton-Spall Bruntonspall Ltd Why is security evolving Where


  1. The evolving practice of security Michael Brunton-Spall Bruntonspall Ltd

  2. Michael Brunton-Spall He/His/Him michael@bruntonspall.com https://tinyletter.com/cyberweekly Michael Brunton-Spall Bruntonspall Ltd

  3. Why is security evolving Where we’ve come from Where we are going Michael Brunton-Spall Bruntonspall Ltd

  4. How to rethink security practices in organisations Michael Brunton-Spall Bruntonspall Ltd

  5. Some Context Michael Brunton-Spall Bruntonspall Ltd

  6. 2005 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 6

  7. 2010 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 7

  8. 2013 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 8

  9. 2018 2018 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 9

  10. Maginot Line Michael Brunton-Spall Bruntonspall Ltd

  11. 1930 France “We’d really like the Germans not to invade” Michael Brunton-Spall Bruntonspall Ltd

  12. Michael Brunton-Spall Bruntonspall Ltd

  13. Michael Brunton-Spall Bruntonspall Ltd

  14. In WW1, they came slowly overland and built trenches Michael Brunton-Spall Bruntonspall Ltd

  15. Michael Brunton-Spall Bruntonspall Ltd

  16. The Germans had invented Blitzkrieg “Lightning Strike” which simply went around Michael Brunton-Spall Bruntonspall Ltd

  17. Michael Brunton-Spall Bruntonspall Ltd

  18. The French were fighting a war from 1920 against an adversary using 1939 techniques Michael Brunton-Spall Bruntonspall Ltd

  19. The evolution of compute Michael Brunton-Spall Bruntonspall Ltd

  20. Michael Brunton-Spall Bruntonspall Ltd

  21. From on premise to cloud Michael Brunton-Spall Bruntonspall Ltd

  22. Physical machine Michael Brunton-Spall Bruntonspall Ltd

  23. Remote hosted machine Michael Brunton-Spall Bruntonspall Ltd

  24. Virtual machines in a data center Michael Brunton-Spall Bruntonspall Ltd

  25. Virtual machines at scale Michael Brunton-Spall Bruntonspall Ltd

  26. Side note: Wardley Mapping Michael Brunton-Spall Bruntonspall Ltd

  27. Michael Brunton-Spall Bruntonspall Ltd

  28. Michael Brunton-Spall Bruntonspall Ltd

  29. Michael Brunton-Spall Bruntonspall Ltd

  30. Why Wardley Maps? Michael Brunton-Spall Bruntonspall Ltd

  31. We can see changing landscapes Michael Brunton-Spall Bruntonspall Ltd

  32. We can discuss strategies Michael Brunton-Spall Bruntonspall Ltd

  33. A map isn’t reality, it’s just an abstraction Michael Brunton-Spall Bruntonspall Ltd

  34. Things evolve Michael Brunton-Spall Bruntonspall Ltd

  35. As servers move from physical to virtual, single to multiple, practice evolves Michael Brunton-Spall Bruntonspall Ltd

  36. Coevolution of product and practice Michael Brunton-Spall Bruntonspall Ltd

  37. Michael Brunton-Spall Bruntonspall Ltd

  38. Michael Brunton-Spall Bruntonspall Ltd

  39. Michael Brunton-Spall Bruntonspall Ltd

  40. From pets to cattle Michael Brunton-Spall Bruntonspall Ltd

  41. How do we administer servers? Michael Brunton-Spall Bruntonspall Ltd

  42. Worries about hard drives, CPU’s, power etc Michael Brunton-Spall Bruntonspall Ltd

  43. Cloud providers give us abstractions Michael Brunton-Spall Bruntonspall Ltd

  44. Michael Brunton-Spall Bruntonspall Ltd

  45. We stop worrying about whether a hard drive fails in a server Michael Brunton-Spall Bruntonspall Ltd

  46. This results in changing operations practice Michael Brunton-Spall Bruntonspall Ltd

  47. DevOps, SRE Michael Brunton-Spall Bruntonspall Ltd

  48. This results in different developer consumption of operations Michael Brunton-Spall Bruntonspall Ltd

  49. Kubernetes, Serverless Michael Brunton-Spall Bruntonspall Ltd

  50. What does this mean for security? Michael Brunton-Spall Bruntonspall Ltd

  51. How we think about security has to change Michael Brunton-Spall Bruntonspall Ltd

  52. Security practices are evolving Michael Brunton-Spall Bruntonspall Ltd

  53. Michael Brunton-Spall Bruntonspall Ltd

  54. Traditional security is about assurance Michael Brunton-Spall Bruntonspall Ltd

  55. Where will my data sit Michael Brunton-Spall Bruntonspall Ltd

  56. Where does the data go Michael Brunton-Spall Bruntonspall Ltd

  57. Michael Brunton-Spall Bruntonspall Ltd

  58. This works when you have individual servers Michael Brunton-Spall Bruntonspall Ltd

  59. This doesn’t work with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  60. This doesn’t work th the e same same with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  61. Michael Brunton-Spall Bruntonspall Ltd

  62. “Skate to where the puck is going, not where it has been” Wayne Gretsky Michael Brunton-Spall Bruntonspall Ltd

  63. Where the puck was yesterday Michael Brunton-Spall Bruntonspall Ltd

  64. What are solved problems? Michael Brunton-Spall Bruntonspall Ltd

  65. Commonly solved the same way Michael Brunton-Spall Bruntonspall Ltd

  66. Productionised processes Michael Brunton-Spall Bruntonspall Ltd

  67. Michael Brunton-Spall Bruntonspall Ltd

  68. SDLC, Assurance of suppliers, network assurance, hardware assurance Michael Brunton-Spall Bruntonspall Ltd

  69. All cloud customers have similar concerns in this area Michael Brunton-Spall Bruntonspall Ltd

  70. Buy don’t Build Michael Brunton-Spall Bruntonspall Ltd

  71. Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA … Michael Brunton-Spall Bruntonspall Ltd

  72. Where the puck is today Michael Brunton-Spall Bruntonspall Ltd

  73. Michael Brunton-Spall Bruntonspall Ltd

  74. Continuous Integration, Continuous Deployment, DevOps Michael Brunton-Spall Bruntonspall Ltd

  75. Patching Michael Brunton-Spall Bruntonspall Ltd

  76. How quickly can you patch? Michael Brunton-Spall Bruntonspall Ltd

  77. DevOps Michael Brunton-Spall Bruntonspall Ltd

  78. How secure is your code? Michael Brunton-Spall Bruntonspall Ltd

  79. Code review and Pull requests Michael Brunton-Spall Bruntonspall Ltd

  80. Staff identity and single sign on Michael Brunton-Spall Bruntonspall Ltd

  81. Zero Trust Networking Michael Brunton-Spall Bruntonspall Ltd

  82. Michael Brunton-Spall Bruntonspall Ltd

  83. But where is the puck going? Michael Brunton-Spall Bruntonspall Ltd

  84. Michael Brunton-Spall Bruntonspall Ltd

  85. Adversary thinking Michael Brunton-Spall Bruntonspall Ltd

  86. ATT&CK Framework Michael Brunton-Spall Bruntonspall Ltd

  87. Goals, Restrictions Michael Brunton-Spall Bruntonspall Ltd

  88. No adversary has unlimited funds, time and energy Michael Brunton-Spall Bruntonspall Ltd

  89. Anti Personas Michael Brunton-Spall Bruntonspall Ltd

  90. Han Solo Motivation Han Solo is motivated primarily by money, but also works with the rebel alliance. Han is capable of using common tools as well as modifying existing tools on the fly Capabilities Han doesn’t want to be caught and so takes an Resources: 2/5 effort to avoid head on confrontations Capability: 4/5 Connections Bravery: 2/5 Rebel Alliance, Hutts Criminal connections: 3/5 Michael Brunton-Spall Bruntonspall Ltd

  91. Red Teams Michael Brunton-Spall Bruntonspall Ltd

  92. Internal pentesting Michael Brunton-Spall Bruntonspall Ltd

  93. Threat Hunting Michael Brunton-Spall Bruntonspall Ltd

  94. DevSecOps Michael Brunton-Spall Bruntonspall Ltd

  95. Security as code Michael Brunton-Spall Bruntonspall Ltd

  96. Compliance as Code Michael Brunton-Spall Bruntonspall Ltd

  97. Michael Brunton-Spall Bruntonspall Ltd

  98. Cloud configuration as code Michael Brunton-Spall Bruntonspall Ltd

  99. Pull requests = audit trail Michael Brunton-Spall Bruntonspall Ltd

  100. Michael Brunton-Spall Bruntonspall Ltd

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend