The evolving practice of security Michael Brunton-Spall - - PowerPoint PPT Presentation

the evolving practice of security
SMART_READER_LITE
LIVE PREVIEW

The evolving practice of security Michael Brunton-Spall - - PowerPoint PPT Presentation

The evolving practice of security Michael Brunton-Spall Bruntonspall Ltd Michael Brunton-Spall He/His/Him michael@bruntonspall.com https://tinyletter.com/cyberweekly Michael Brunton-Spall Bruntonspall Ltd Why is security evolving Where


slide-1
SLIDE 1

Michael Brunton-Spall Bruntonspall Ltd

The evolving practice of security

slide-2
SLIDE 2

Michael Brunton-Spall Bruntonspall Ltd

Michael Brunton-Spall He/His/Him michael@bruntonspall.com

https://tinyletter.com/cyberweekly

slide-3
SLIDE 3

Michael Brunton-Spall Bruntonspall Ltd

Why is security evolving Where we’ve come from Where we are going

slide-4
SLIDE 4

Michael Brunton-Spall Bruntonspall Ltd

How to rethink security practices in organisations

slide-5
SLIDE 5

Michael Brunton-Spall Bruntonspall Ltd

Some Context

slide-6
SLIDE 6

08/03/2019 6

Michael Brunton-Spall Bruntonspall Ltd

2005

slide-7
SLIDE 7

08/03/2019 7

Michael Brunton-Spall Bruntonspall Ltd

2010

slide-8
SLIDE 8

08/03/2019 8

Michael Brunton-Spall Bruntonspall Ltd

2013

slide-9
SLIDE 9

08/03/2019 9

Michael Brunton-Spall Bruntonspall Ltd

2018 2018

slide-10
SLIDE 10

Michael Brunton-Spall Bruntonspall Ltd

Maginot Line

slide-11
SLIDE 11

Michael Brunton-Spall Bruntonspall Ltd

1930 France “We’d really like the Germans not to invade”

slide-12
SLIDE 12

Michael Brunton-Spall Bruntonspall Ltd

slide-13
SLIDE 13

Michael Brunton-Spall Bruntonspall Ltd

slide-14
SLIDE 14

Michael Brunton-Spall Bruntonspall Ltd

In WW1, they came slowly

  • verland and built trenches
slide-15
SLIDE 15

Michael Brunton-Spall Bruntonspall Ltd

slide-16
SLIDE 16

Michael Brunton-Spall Bruntonspall Ltd

The Germans had invented Blitzkrieg “Lightning Strike” which simply went around

slide-17
SLIDE 17

Michael Brunton-Spall Bruntonspall Ltd

slide-18
SLIDE 18

Michael Brunton-Spall Bruntonspall Ltd

The French were fighting a war from 1920 against an adversary using 1939 techniques

slide-19
SLIDE 19

Michael Brunton-Spall Bruntonspall Ltd

The evolution of compute

slide-20
SLIDE 20

Michael Brunton-Spall Bruntonspall Ltd

slide-21
SLIDE 21

Michael Brunton-Spall Bruntonspall Ltd

From on premise to cloud

slide-22
SLIDE 22

Michael Brunton-Spall Bruntonspall Ltd

Physical machine

slide-23
SLIDE 23

Michael Brunton-Spall Bruntonspall Ltd

Remote hosted machine

slide-24
SLIDE 24

Michael Brunton-Spall Bruntonspall Ltd

Virtual machines in a data center

slide-25
SLIDE 25

Michael Brunton-Spall Bruntonspall Ltd

Virtual machines at scale

slide-26
SLIDE 26

Michael Brunton-Spall Bruntonspall Ltd

Side note: Wardley Mapping

slide-27
SLIDE 27

Michael Brunton-Spall Bruntonspall Ltd

slide-28
SLIDE 28

Michael Brunton-Spall Bruntonspall Ltd

slide-29
SLIDE 29

Michael Brunton-Spall Bruntonspall Ltd

slide-30
SLIDE 30

Michael Brunton-Spall Bruntonspall Ltd

Why Wardley Maps?

slide-31
SLIDE 31

Michael Brunton-Spall Bruntonspall Ltd

We can see changing landscapes

slide-32
SLIDE 32

Michael Brunton-Spall Bruntonspall Ltd

We can discuss strategies

slide-33
SLIDE 33

Michael Brunton-Spall Bruntonspall Ltd

A map isn’t reality, it’s just an abstraction

slide-34
SLIDE 34

Michael Brunton-Spall Bruntonspall Ltd

Things evolve

slide-35
SLIDE 35

Michael Brunton-Spall Bruntonspall Ltd

As servers move from physical to virtual, single to multiple, practice evolves

slide-36
SLIDE 36

Michael Brunton-Spall Bruntonspall Ltd

Coevolution of product and practice

slide-37
SLIDE 37

Michael Brunton-Spall Bruntonspall Ltd

slide-38
SLIDE 38

Michael Brunton-Spall Bruntonspall Ltd

slide-39
SLIDE 39

Michael Brunton-Spall Bruntonspall Ltd

slide-40
SLIDE 40

Michael Brunton-Spall Bruntonspall Ltd

From pets to cattle

slide-41
SLIDE 41

Michael Brunton-Spall Bruntonspall Ltd

How do we administer servers?

slide-42
SLIDE 42

Michael Brunton-Spall Bruntonspall Ltd

Worries about hard drives, CPU’s, power etc

slide-43
SLIDE 43

Michael Brunton-Spall Bruntonspall Ltd

Cloud providers give us abstractions

slide-44
SLIDE 44

Michael Brunton-Spall Bruntonspall Ltd

slide-45
SLIDE 45

Michael Brunton-Spall Bruntonspall Ltd

We stop worrying about whether a hard drive fails in a server

slide-46
SLIDE 46

Michael Brunton-Spall Bruntonspall Ltd

This results in changing

  • perations practice
slide-47
SLIDE 47

Michael Brunton-Spall Bruntonspall Ltd

DevOps, SRE

slide-48
SLIDE 48

Michael Brunton-Spall Bruntonspall Ltd

This results in different developer consumption of

  • perations
slide-49
SLIDE 49

Michael Brunton-Spall Bruntonspall Ltd

Kubernetes, Serverless

slide-50
SLIDE 50

Michael Brunton-Spall Bruntonspall Ltd

What does this mean for security?

slide-51
SLIDE 51

Michael Brunton-Spall Bruntonspall Ltd

How we think about security has to change

slide-52
SLIDE 52

Michael Brunton-Spall Bruntonspall Ltd

Security practices are evolving

slide-53
SLIDE 53

Michael Brunton-Spall Bruntonspall Ltd

slide-54
SLIDE 54

Michael Brunton-Spall Bruntonspall Ltd

Traditional security is about assurance

slide-55
SLIDE 55

Michael Brunton-Spall Bruntonspall Ltd

Where will my data sit

slide-56
SLIDE 56

Michael Brunton-Spall Bruntonspall Ltd

Where does the data go

slide-57
SLIDE 57

Michael Brunton-Spall Bruntonspall Ltd

slide-58
SLIDE 58

Michael Brunton-Spall Bruntonspall Ltd

This works when you have individual servers

slide-59
SLIDE 59

Michael Brunton-Spall Bruntonspall Ltd

This doesn’t work with modern cloud

slide-60
SLIDE 60

Michael Brunton-Spall Bruntonspall Ltd

This doesn’t work th

the e same same

with modern cloud

slide-61
SLIDE 61

Michael Brunton-Spall Bruntonspall Ltd

slide-62
SLIDE 62

Michael Brunton-Spall Bruntonspall Ltd

“Skate to where the puck is going, not where it has been” Wayne Gretsky

slide-63
SLIDE 63

Michael Brunton-Spall Bruntonspall Ltd

Where the puck was yesterday

slide-64
SLIDE 64

Michael Brunton-Spall Bruntonspall Ltd

What are solved problems?

slide-65
SLIDE 65

Michael Brunton-Spall Bruntonspall Ltd

Commonly solved the same way

slide-66
SLIDE 66

Michael Brunton-Spall Bruntonspall Ltd

Productionised processes

slide-67
SLIDE 67

Michael Brunton-Spall Bruntonspall Ltd

slide-68
SLIDE 68

Michael Brunton-Spall Bruntonspall Ltd

SDLC, Assurance of suppliers, network assurance, hardware assurance

slide-69
SLIDE 69

Michael Brunton-Spall Bruntonspall Ltd

All cloud customers have similar concerns in this area

slide-70
SLIDE 70

Michael Brunton-Spall Bruntonspall Ltd

Buy don’t Build

slide-71
SLIDE 71

Michael Brunton-Spall Bruntonspall Ltd

Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA …

slide-72
SLIDE 72

Michael Brunton-Spall Bruntonspall Ltd

Where the puck is today

slide-73
SLIDE 73

Michael Brunton-Spall Bruntonspall Ltd

slide-74
SLIDE 74

Michael Brunton-Spall Bruntonspall Ltd

Continuous Integration, Continuous Deployment, DevOps

slide-75
SLIDE 75

Michael Brunton-Spall Bruntonspall Ltd

Patching

slide-76
SLIDE 76

Michael Brunton-Spall Bruntonspall Ltd

How quickly can you patch?

slide-77
SLIDE 77

Michael Brunton-Spall Bruntonspall Ltd

DevOps

slide-78
SLIDE 78

Michael Brunton-Spall Bruntonspall Ltd

How secure is your code?

slide-79
SLIDE 79

Michael Brunton-Spall Bruntonspall Ltd

Code review and Pull requests

slide-80
SLIDE 80

Michael Brunton-Spall Bruntonspall Ltd

Staff identity and single sign

  • n
slide-81
SLIDE 81

Michael Brunton-Spall Bruntonspall Ltd

Zero Trust Networking

slide-82
SLIDE 82

Michael Brunton-Spall Bruntonspall Ltd

slide-83
SLIDE 83

Michael Brunton-Spall Bruntonspall Ltd

But where is the puck going?

slide-84
SLIDE 84

Michael Brunton-Spall Bruntonspall Ltd

slide-85
SLIDE 85

Michael Brunton-Spall Bruntonspall Ltd

Adversary thinking

slide-86
SLIDE 86

Michael Brunton-Spall Bruntonspall Ltd

ATT&CK Framework

slide-87
SLIDE 87

Michael Brunton-Spall Bruntonspall Ltd

Goals, Restrictions

slide-88
SLIDE 88

Michael Brunton-Spall Bruntonspall Ltd

No adversary has unlimited funds, time and energy

slide-89
SLIDE 89

Michael Brunton-Spall Bruntonspall Ltd

Anti Personas

slide-90
SLIDE 90

Michael Brunton-Spall Bruntonspall Ltd

Han Solo

Motivation

Han Solo is motivated primarily by money, but also works with the rebel alliance. Han is capable of using common tools as well as modifying existing tools on the fly Han doesn’t want to be caught and so takes an effort to avoid head on confrontations

Capabilities

Resources: 2/5 Capability: 4/5 Bravery: 2/5 Criminal connections: 3/5

Connections

Rebel Alliance, Hutts

slide-91
SLIDE 91

Michael Brunton-Spall Bruntonspall Ltd

Red Teams

slide-92
SLIDE 92

Michael Brunton-Spall Bruntonspall Ltd

Internal pentesting

slide-93
SLIDE 93

Michael Brunton-Spall Bruntonspall Ltd

Threat Hunting

slide-94
SLIDE 94

Michael Brunton-Spall Bruntonspall Ltd

DevSecOps

slide-95
SLIDE 95

Michael Brunton-Spall Bruntonspall Ltd

Security as code

slide-96
SLIDE 96

Michael Brunton-Spall Bruntonspall Ltd

Compliance as Code

slide-97
SLIDE 97

Michael Brunton-Spall Bruntonspall Ltd

slide-98
SLIDE 98

Michael Brunton-Spall Bruntonspall Ltd

Cloud configuration as code

slide-99
SLIDE 99

Michael Brunton-Spall Bruntonspall Ltd

Pull requests = audit trail

slide-100
SLIDE 100

Michael Brunton-Spall Bruntonspall Ltd

slide-101
SLIDE 101

Michael Brunton-Spall Bruntonspall Ltd

slide-102
SLIDE 102

Michael Brunton-Spall Bruntonspall Ltd

AWS System Manager

slide-103
SLIDE 103

Michael Brunton-Spall Bruntonspall Ltd

Azure Policy

slide-104
SLIDE 104

Michael Brunton-Spall Bruntonspall Ltd

Final thoughts?

slide-105
SLIDE 105

Michael Brunton-Spall Bruntonspall Ltd

How to get value from your existing security teams?

slide-106
SLIDE 106

Michael Brunton-Spall Bruntonspall Ltd

Empathy first

slide-107
SLIDE 107

Michael Brunton-Spall Bruntonspall Ltd

“Re

Regardless of what we discover, we unde understand and t and and truly be uly belie lieve t tha hat ev everyone did the best job they ey could, giv given w en wha hat t the hey kne y knew a at t the t he time, ime, t their heir sk skills s and abiliti ties, s, th the resou sources s av available, and the situation at hand.”

slide-108
SLIDE 108

Michael Brunton-Spall Bruntonspall Ltd

Michael Brunton-Spall michael@bruntonspall.com

https://tinyletter.com/cyberweekly