Michael Brunton-Spall Bruntonspall Ltd
The evolving practice of security Michael Brunton-Spall - - PowerPoint PPT Presentation
The evolving practice of security Michael Brunton-Spall - - PowerPoint PPT Presentation
The evolving practice of security Michael Brunton-Spall Bruntonspall Ltd Michael Brunton-Spall He/His/Him michael@bruntonspall.com https://tinyletter.com/cyberweekly Michael Brunton-Spall Bruntonspall Ltd Why is security evolving Where
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall He/His/Him michael@bruntonspall.com
https://tinyletter.com/cyberweekly
Michael Brunton-Spall Bruntonspall Ltd
Why is security evolving Where we’ve come from Where we are going
Michael Brunton-Spall Bruntonspall Ltd
How to rethink security practices in organisations
Michael Brunton-Spall Bruntonspall Ltd
Some Context
08/03/2019 6
Michael Brunton-Spall Bruntonspall Ltd
2005
08/03/2019 7
Michael Brunton-Spall Bruntonspall Ltd
2010
08/03/2019 8
Michael Brunton-Spall Bruntonspall Ltd
2013
08/03/2019 9
Michael Brunton-Spall Bruntonspall Ltd
2018 2018
Michael Brunton-Spall Bruntonspall Ltd
Maginot Line
Michael Brunton-Spall Bruntonspall Ltd
1930 France “We’d really like the Germans not to invade”
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
In WW1, they came slowly
- verland and built trenches
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The Germans had invented Blitzkrieg “Lightning Strike” which simply went around
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The French were fighting a war from 1920 against an adversary using 1939 techniques
Michael Brunton-Spall Bruntonspall Ltd
The evolution of compute
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From on premise to cloud
Michael Brunton-Spall Bruntonspall Ltd
Physical machine
Michael Brunton-Spall Bruntonspall Ltd
Remote hosted machine
Michael Brunton-Spall Bruntonspall Ltd
Virtual machines in a data center
Michael Brunton-Spall Bruntonspall Ltd
Virtual machines at scale
Michael Brunton-Spall Bruntonspall Ltd
Side note: Wardley Mapping
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Why Wardley Maps?
Michael Brunton-Spall Bruntonspall Ltd
We can see changing landscapes
Michael Brunton-Spall Bruntonspall Ltd
We can discuss strategies
Michael Brunton-Spall Bruntonspall Ltd
A map isn’t reality, it’s just an abstraction
Michael Brunton-Spall Bruntonspall Ltd
Things evolve
Michael Brunton-Spall Bruntonspall Ltd
As servers move from physical to virtual, single to multiple, practice evolves
Michael Brunton-Spall Bruntonspall Ltd
Coevolution of product and practice
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From pets to cattle
Michael Brunton-Spall Bruntonspall Ltd
How do we administer servers?
Michael Brunton-Spall Bruntonspall Ltd
Worries about hard drives, CPU’s, power etc
Michael Brunton-Spall Bruntonspall Ltd
Cloud providers give us abstractions
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
We stop worrying about whether a hard drive fails in a server
Michael Brunton-Spall Bruntonspall Ltd
This results in changing
- perations practice
Michael Brunton-Spall Bruntonspall Ltd
DevOps, SRE
Michael Brunton-Spall Bruntonspall Ltd
This results in different developer consumption of
- perations
Michael Brunton-Spall Bruntonspall Ltd
Kubernetes, Serverless
Michael Brunton-Spall Bruntonspall Ltd
What does this mean for security?
Michael Brunton-Spall Bruntonspall Ltd
How we think about security has to change
Michael Brunton-Spall Bruntonspall Ltd
Security practices are evolving
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Traditional security is about assurance
Michael Brunton-Spall Bruntonspall Ltd
Where will my data sit
Michael Brunton-Spall Bruntonspall Ltd
Where does the data go
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
This works when you have individual servers
Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work with modern cloud
Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work th
the e same same
with modern cloud
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
“Skate to where the puck is going, not where it has been” Wayne Gretsky
Michael Brunton-Spall Bruntonspall Ltd
Where the puck was yesterday
Michael Brunton-Spall Bruntonspall Ltd
What are solved problems?
Michael Brunton-Spall Bruntonspall Ltd
Commonly solved the same way
Michael Brunton-Spall Bruntonspall Ltd
Productionised processes
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
SDLC, Assurance of suppliers, network assurance, hardware assurance
Michael Brunton-Spall Bruntonspall Ltd
All cloud customers have similar concerns in this area
Michael Brunton-Spall Bruntonspall Ltd
Buy don’t Build
Michael Brunton-Spall Bruntonspall Ltd
Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA …
Michael Brunton-Spall Bruntonspall Ltd
Where the puck is today
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Continuous Integration, Continuous Deployment, DevOps
Michael Brunton-Spall Bruntonspall Ltd
Patching
Michael Brunton-Spall Bruntonspall Ltd
How quickly can you patch?
Michael Brunton-Spall Bruntonspall Ltd
DevOps
Michael Brunton-Spall Bruntonspall Ltd
How secure is your code?
Michael Brunton-Spall Bruntonspall Ltd
Code review and Pull requests
Michael Brunton-Spall Bruntonspall Ltd
Staff identity and single sign
- n
Michael Brunton-Spall Bruntonspall Ltd
Zero Trust Networking
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
But where is the puck going?
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Adversary thinking
Michael Brunton-Spall Bruntonspall Ltd
ATT&CK Framework
Michael Brunton-Spall Bruntonspall Ltd
Goals, Restrictions
Michael Brunton-Spall Bruntonspall Ltd
No adversary has unlimited funds, time and energy
Michael Brunton-Spall Bruntonspall Ltd
Anti Personas
Michael Brunton-Spall Bruntonspall Ltd
Han Solo
Motivation
Han Solo is motivated primarily by money, but also works with the rebel alliance. Han is capable of using common tools as well as modifying existing tools on the fly Han doesn’t want to be caught and so takes an effort to avoid head on confrontations
Capabilities
Resources: 2/5 Capability: 4/5 Bravery: 2/5 Criminal connections: 3/5
Connections
Rebel Alliance, Hutts
Michael Brunton-Spall Bruntonspall Ltd
Red Teams
Michael Brunton-Spall Bruntonspall Ltd
Internal pentesting
Michael Brunton-Spall Bruntonspall Ltd
Threat Hunting
Michael Brunton-Spall Bruntonspall Ltd
DevSecOps
Michael Brunton-Spall Bruntonspall Ltd
Security as code
Michael Brunton-Spall Bruntonspall Ltd
Compliance as Code
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Cloud configuration as code
Michael Brunton-Spall Bruntonspall Ltd
Pull requests = audit trail
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
AWS System Manager
Michael Brunton-Spall Bruntonspall Ltd
Azure Policy
Michael Brunton-Spall Bruntonspall Ltd
Final thoughts?
Michael Brunton-Spall Bruntonspall Ltd
How to get value from your existing security teams?
Michael Brunton-Spall Bruntonspall Ltd
Empathy first
Michael Brunton-Spall Bruntonspall Ltd
“Re
Regardless of what we discover, we unde understand and t and and truly be uly belie lieve t tha hat ev everyone did the best job they ey could, giv given w en wha hat t the hey kne y knew a at t the t he time, ime, t their heir sk skills s and abiliti ties, s, th the resou sources s av available, and the situation at hand.”
Michael Brunton-Spall Bruntonspall Ltd