You Build It, You Secure It ( Introduction to DevSecOps ) John - - PowerPoint PPT Presentation

you build it you secure it
SMART_READER_LITE
LIVE PREVIEW

You Build It, You Secure It ( Introduction to DevSecOps ) John - - PowerPoint PPT Presentation

You Build It, You Secure It ( Introduction to DevSecOps ) John Willis @botchagalupe https://github.com/botchagalupe/my-presentations Devops is about Humans Devops is a set of practices and patterns that turn human capital into high


slide-1
SLIDE 1

“You Build It, You Secure It”

( Introduction to DevSecOps )

John Willis @botchagalupe

slide-2
SLIDE 2

https://github.com/botchagalupe/my-presentations

slide-3
SLIDE 3

Devops is about Humans

3

Devops is a set of practices and patterns that turn human capital into high performance

  • rganizational capital.
slide-4
SLIDE 4
slide-5
SLIDE 5

DTO Solutions

slide-6
SLIDE 6
  • CAMS

  • Culture
  • Automation
  • Measurement
  • Sharing

Devops Taxonomies

  • The Three Ways
  • The First Way
  • The Second Way
  • The Third Way
slide-7
SLIDE 7

Devops Practices and Patterns

  • Continuous Delivery
  • Everything in version control
  • Small batch principle
  • Trunk based deployments
  • Manage flow (WIP)
  • Automate everything

  • Culture
  • Everyone is responsible
  • Done means released
  • Stop the line when it breaks
  • Remove silos

7

itrevolution.com/devops-handbook

slide-8
SLIDE 8

Ron Westrum - “A typology of organizational cultures

8

slide-9
SLIDE 9

30x 200x

more frequent deployments faster lead times

60x 168x

the change success rate faster mean time to recover (MTTR)

2x 50%

more likely to exceed profitability, market share & productivity goals higher market capitalization growth

  • ver 3 years*

High performers compared to their peers…

Data from 2014/2015 State of DevOps Report - https://puppetlabs.com/2015-devops-report

Recent IT Performance Data is Compelling

slide-10
SLIDE 10

30x 200x

more frequent deployments faster lead times

60x 168x

the change success rate faster mean time to recover (MTTR)

2x 50%

more likely to exceed profitability, market share & productivity goals higher market capitalization growth

  • ver 3 years*

High performers compared to their peers…

Data from 2014/2015 State of DevOps Report - https://puppetlabs.com/2015-devops-report

Recent IT Performance Data is Compelling

Faster Higher
 Quality More
 Effective

2555x

slide-11
SLIDE 11

Fast Cheap Good

“Pick Two!”

Conventional Wisdom

slide-12
SLIDE 12

Fast Cheap Good

“Pick Two!”

Conventional Wisdom

slide-13
SLIDE 13

Generative Behavior Resilience Speed

“Must Have All Three!”

New Triangle

slide-14
SLIDE 14

Devops Automated Deployment Pipeline

14

Source: Wikipedia - Continuous Delivery

slide-15
SLIDE 15
slide-16
SLIDE 16

16

Devops Results

Google

  • Over 15,000 engineers in over 40 offices
  • 4,000+ projects under active development
  • 5500+ code submissions per day (20+ p/m)
  • Over 75M test cases run daily
  • 50% of code changes monthly
  • Single source tree
  • Over 75M test cases run daily
slide-17
SLIDE 17

17

Devops Results

Google

  • Over 15,000 engineers in over 40 offices
  • 4,000+ projects under active development
  • 5500+ code submissions per day (20+ p/m)
  • Over 75M test cases run daily
  • 50% of code changes monthly
  • Single source tree
  • Over 75M test cases run daily

2016 150 Million automated tests run daily…

slide-18
SLIDE 18

18

Devops Results

Amazon

  • 11.6 second mean time between deploys.
  • 1079 max deploys in a single hour.
  • 10,000 mean number of hosts

simultaneously receiving a deploy.

  • 30,000 max number of hosts simultaneously

receiving a deploy

slide-19
SLIDE 19

19

Unicorns and Horses (Enterprises)

Unicorns Enterprise

Shamelessly stolen and repurposed from: Pete Cheslock

slide-20
SLIDE 20

20

Devops Results

Enterprise Organizations

  • Ticketmaster - 98% reduction in MTTR
  • Nordstrom - 20% shorter Lead Time
  • Target - Full Stack Deploy 3 months to minutes
  • USAA - Release from 28 days to 7 days
  • ING - 500 applications teams doing devops
  • CSG - From 200 incidents per release to 18
slide-21
SLIDE 21
slide-22
SLIDE 22

Dev : Ops 10 : 1

slide-23
SLIDE 23
slide-24
SLIDE 24

Dev : Ops : Sec 100 : 10 : 1

slide-25
SLIDE 25
slide-26
SLIDE 26

26

Summary

  • Agile took us from months to days to deliver software
  • Devops took from months to days to deploy software
  • Now security is the bottleneck
slide-27
SLIDE 27

27

Security Meta Points

  • It’s 30 time cheaper to fix a security defect in Dev vs. Prod
  • Average data breach incident cost 5.4 million
  • High performing organizations include security in the

software delivery process

  • 80% to 90% of every modern application consists of open

source components

slide-28
SLIDE 28

Actual Exploitation 2015 VZ DBIR

slide-29
SLIDE 29

29

slide-30
SLIDE 30
slide-31
SLIDE 31
slide-32
SLIDE 32

DevSecOps as Supply Chain?

32

Source: Wikipedia - Continuous Delivery

slide-33
SLIDE 33

DevSecOps

Requirements & Design Development CI Interval Trigger Assessment Production

Application Risk Classification Security Requirement Definition Secure Libraries Static Analysis/IDE SCM Open Source Governance(CI) Secure Coding Standards Perimeter Assessment Dynamic Assessments Threat-Based Pen Test Web Application Firewalls Automated Attack/ Bot Defense Container Security Management

Security Mavens (Security-Trained Developers and Operations) Role Based Software Security Training

Continuous Monitoring, Analytics and KPI Gathering Preventative Detective

Container Security Compliance (CI) Threat modeling Static Analysis (CI)

Implementing DevOps in a Regulated Environment

slide-34
SLIDE 34

CVE-2017-5638

slide-35
SLIDE 35

Software Supply Chain

35

Delivery Team Version Control Build Test Release

DevOps Example

Stage Prod

slide-36
SLIDE 36

Software Supply Chain

36

Delivery Team Version Control Build Test Release

DevOps Example

Delivery Team Version Control Build Test Release

DevSecOps Example

Stage Prod

slide-37
SLIDE 37

37

More Security Meta Points

  • Have security create templates, recipes, playbook
  • Create a Wiki for Security
  • All Issues managed in a common issue system
  • Create a Github Repo for OWASP code examples
  • Create interactive visual environments for security
  • Visualize all the things….
  • A bug is a bug is a bug….
slide-38
SLIDE 38

38

DevSecOps and Cloud Configuration

  • IAM and resource policies (S3 Bucket, SQS, etc.)
  • Permissive policies (e.g. wildcards)
  • Security Group ingress and egress rules
  • Liberal rules (e.g. 0.0.0.0/0, port range 1-65535 is open)
  • Encryption
  • Encryption that is not enabled or enforced for applicable resources
  • Automatic Key Rotation
  • KMS keys that don't have rotation enabled,
  • Invalid SSL configurations
  • ELBs with invalid SSL configurations
slide-39
SLIDE 39

39

DevSecOps and Containers

  • Base Image Policies
  • Signed images
  • Capabilities policies
  • Vulnerability Image Scans
  • Port Restrictions
  • Secrets Management
slide-40
SLIDE 40

40

DevSecOps and Serverless

  • OWASP top 10 are still relevant
  • Proper Permissions
  • Data, Keys and Secrets
  • Still can have vulnerable code dependancies
slide-41
SLIDE 41

41

Delivery Team Version Control Build Test Release

DevSecOps Example

Stage Prod

DevSecOps Basics

Security Training Security Requirements Threat Modeling Architecture Review OWASP Top 10 IDE Plugins Code Examples Fail the Build Static Code Analysis Security Policy Testing Configuration Analysis Vulnerability Scanning Code and App Analysis Automated Pen Testing Static Code Analysis Security Policy Testing Configuration Analysis Security Monitoring
 Configuration Monitoring

slide-42
SLIDE 42
slide-43
SLIDE 43

Best Practices for DevSecOps

  • Train development teams to develop secure code
  • Track security issues the same as software issues
  • If infrastructure is now code, then security should be code.
  • Integrate security controls in the software pipeline
  • Automate security test in the build process
  • Detect known vulnerabilities during the pipeline
  • Monitor security in production for known states
  • Inject failure to ensure security is hardened

Gene Kim, Jez Humble, Patrick Dubois, and John Willis. 
 The DevOps Handbook; It Revolution Press, LLC.;2016.

slide-44
SLIDE 44

Devops Kaizen - Full Life Cycle

1.Key Outcomes 2.Countermeasures 3.Storyboard 4.Kanban Board 5.Post Retrospective 1 2 3 4 5

slide-45
SLIDE 45

45

Bill Bryson - A Short History of Nearly Everything

slide-46
SLIDE 46

46

Bonus Material

slide-47
SLIDE 47

DevSecOps - Kill Chain Lab

47

Amazon AWS Amazon VPC

slide-48
SLIDE 48

48

Immutable Service Delivery

Fortune 500 Insurance Company

  • Tracks critical and high security defect rate per 10k

lines of code

  • Started out with (10/10k)
  • After applying Devops practices and principles (4/10k)
  • After applying Toyota Supply Chain 4VL (1/10k )
  • After Docker with Immutable Delivery (0.1/10k)
slide-49
SLIDE 49

49

With Docker

Fortune 500 Insurance Company

  • One Service
  • One Container
  • One Read Only File System
  • One Port