“you build it, you secure it” - qcon san francisco · devsecops requirements & design...

49
“You Build It, You Secure It” ( Introduction to DevSecOps ) John Willis @botchagalupe

Upload: others

Post on 21-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

“You Build It, You Secure It” ( Introduction to DevSecOps )

John Willis @botchagalupe

Page 2: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

https://github.com/botchagalupe/my-presentations

Page 3: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Devops is about Humans

3

Devops is a set of practices and patterns that turn human

capital into high performance organizational capital.

Page 4: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 5: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

DTO Solutions

Page 6: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

• CAMS

• Culture • Automation • Measurement • Sharing

Devops Taxonomies

• The Three Ways

•The First Way •The Second Way •The Third Way

Page 7: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Devops Practices and Patterns• Continuous Delivery

• Everything in version control • Small batch principle • Trunk based deployments • Manage flow (WIP) • Automate everything

• Culture • Everyone is responsible • Done means released • Stop the line when it breaks • Remove silos

7

itrevolution.com/devops-handbook

Page 8: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Ron Westrum - “A typology of organizational cultures

8

Page 9: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

30x 200xmore frequent deployments

faster lead times

60x 168xthe change success rate

faster mean time to recover (MTTR)

2x 50%more likely to exceed profitability, market share & productivity goals

higher market capitalization growth over 3 years*

High performers compared to their peers…

Data from 2014/2015 State of DevOps Report - https://puppetlabs.com/2015-devops-report

Recent IT Performance Data is Compelling

Page 10: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

30x 200xmore frequent deployments

faster lead times

60x 168xthe change success rate

faster mean time to recover (MTTR)

2x 50%more likely to exceed profitability, market share & productivity goals

higher market capitalization growth over 3 years*

High performers compared to their peers…

Data from 2014/2015 State of DevOps Report - https://puppetlabs.com/2015-devops-report

Recent IT Performance Data is Compelling

Faster

HigherQuality

MoreEffective

2555x

Page 11: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Fast

CheapGood

“Pick Two!”

Conventional Wisdom

Page 12: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Fast

CheapGood

“Pick Two!”

Conventional Wisdom

Page 13: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Generative Behavior

ResilienceSpeed

“Must Have All Three!”

New Triangle

Page 14: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Devops Automated Deployment Pipeline

14

Source: Wikipedia - Continuous Delivery

Page 15: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 16: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

16

Devops ResultsGoogle

• Over 15,000 engineers in over 40 offices • 4,000+ projects under active development • 5500+ code submissions per day (20+ p/m) • Over 75M test cases run daily • 50% of code changes monthly • Single source tree

• Over 75M test cases run daily

Page 17: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

17

Devops ResultsGoogle

• Over 15,000 engineers in over 40 offices • 4,000+ projects under active development • 5500+ code submissions per day (20+ p/m) • Over 75M test cases run daily • 50% of code changes monthly • Single source tree

• Over 75M test cases run daily

2016 150 Million automated

tests run daily…

Page 18: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

18

Devops ResultsAmazon

• 11.6 second mean time between deploys. • 1079 max deploys in a single hour. • 10,000 mean number of hosts

simultaneously receiving a deploy. • 30,000 max number of hosts simultaneously

receiving a deploy

Page 19: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

19

Unicorns and Horses (Enterprises)

Unicorns

Enterprise

Shamelessly stolen and repurposed from: Pete Cheslock

Page 20: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

20

Devops Results

Enterprise Organizations

• Ticketmaster - 98% reduction in MTTR • Nordstrom - 20% shorter Lead Time • Target - Full Stack Deploy 3 months to minutes • USAA - Release from 28 days to 7 days • ING - 500 applications teams doing devops • CSG - From 200 incidents per release to 18

Page 21: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 22: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Dev : Ops 10 : 1

Page 23: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 24: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Dev : Ops : Sec 100 : 10 : 1

Page 25: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 26: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

26

Summary

• Agile took us from months to days to deliver software • Devops took from months to days to deploy software • Now security is the bottleneck

Page 27: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

27

Security Meta Points

• It’s 30 time cheaper to fix a security defect in Dev vs. Prod • Average data breach incident cost 5.4 million • High performing organizations include security in the

software delivery process • 80% to 90% of every modern application consists of open

source components

Page 28: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Actual Exploitation 2015 VZ DBIR

Page 29: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

29

Page 30: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 31: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 32: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

DevSecOps as Supply Chain?

32

Source: Wikipedia - Continuous Delivery

Page 33: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

DevSecOps

Requirements & Design Development CI

Interval Trigger

AssessmentProduction

Application Risk Classification

Security Requirement Definition

Secure Libraries

Static Analysis/IDE

SCM

Open Source Governance(CI)

Secure Coding Standards

Perimeter Assessment

Dynamic Assessments

Threat-Based Pen Test

Web Application Firewalls

Automated Attack/Bot Defense

Container Security Management

Security Mavens (Security-Trained Developers and Operations)Role Based Software Security Training

Continuous Monitoring, Analytics and KPI Gathering

Preventative Detective

Container Security Compliance (CI)

Threat modeling

Static Analysis (CI)

Implementing DevOps in a Regulated Environment

Page 34: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

CVE-2017-5638

Page 35: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Software Supply Chain

35

Delivery Team

Version Control Build Test Release

DevOps Example

Stage

Prod

Page 36: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Software Supply Chain

36

Delivery Team

Version Control Build Test Release

DevOps Example

Delivery Team

Version Control Build Test Release

DevSecOps Example

Stage

Prod

Page 37: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

37

More Security Meta Points

• Have security create templates, recipes, playbook • Create a Wiki for Security • All Issues managed in a common issue system • Create a Github Repo for OWASP code examples • Create interactive visual environments for security • Visualize all the things…. • A bug is a bug is a bug….

Page 38: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

38

DevSecOps and Cloud Configuration

• IAM and resource policies (S3 Bucket, SQS, etc.) • Permissive policies (e.g. wildcards)

• Security Group ingress and egress rules • Liberal rules (e.g. 0.0.0.0/0, port range 1-65535 is open)

• Encryption • Encryption that is not enabled or enforced for applicable resources

• Automatic Key Rotation • KMS keys that don't have rotation enabled,

• Invalid SSL configurations • ELBs with invalid SSL configurations

Page 39: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

39

DevSecOps and Containers

• Base Image Policies • Signed images • Capabilities policies • Vulnerability Image Scans • Port Restrictions • Secrets Management

Page 40: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

40

DevSecOps and Serverless

• OWASP top 10 are still relevant • Proper Permissions • Data, Keys and Secrets • Still can have vulnerable code dependancies

Page 41: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

41

Delivery Team

Version Control Build Test Release

DevSecOps Example

Stage

Prod

DevSecOps Basics

Security Training Security Requirements Threat Modeling Architecture Review OWASP Top 10 IDE Plugins Code Examples

Fail the Build Static Code Analysis Security Policy Testing Configuration Analysis Vulnerability Scanning Code and App Analysis

Automated Pen Testing Static Code Analysis Security Policy Testing Configuration Analysis Security MonitoringConfiguration Monitoring

Page 42: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security
Page 43: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Best Practices for DevSecOps• Train development teams to develop secure code • Track security issues the same as software issues • If infrastructure is now code, then security should be code. • Integrate security controls in the software pipeline • Automate security test in the build process • Detect known vulnerabilities during the pipeline • Monitor security in production for known states • Inject failure to ensure security is hardened

Gene Kim, Jez Humble, Patrick Dubois, and John Willis.  The DevOps Handbook; It Revolution Press, LLC.;2016.

Page 44: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

Devops Kaizen - Full Life Cycle

1.Key Outcomes2.Countermeasures3.Storyboard4.Kanban Board5.Post Retrospective

1

23

4

5

Page 45: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

45

Bill Bryson - A Short History of Nearly Everything

Page 46: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

46

Bonus Material

Page 47: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

DevSecOps - Kill Chain Lab

47

Amazon AWS

Amazon VPC

Page 48: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

48

Immutable Service Delivery

Fortune 500 Insurance Company

• Tracks critical and high security defect rate per 10k lines of code

• Started out with (10/10k) • After applying Devops practices and principles (4/10k) • After applying Toyota Supply Chain 4VL (1/10k ) • After Docker with Immutable Delivery (0.1/10k)

Page 49: “You Build It, You Secure It” - QCon San Francisco · DevSecOps Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security

49

With Docker

Fortune 500 Insurance Company

• One Service • One Container • One Read Only File System • One Port