blue ocean it security

17
Jonathan Sinclair BLUE OCEAN IT Securit

Upload: jonathan-sinclair

Post on 16-Jan-2017

202 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Blue Ocean IT Security

Jonathan Sinclair

BLUEOCEANIT Security

Page 2: Blue Ocean IT Security

Sub headlineAGENDAAGENDA

•Inspiration

•Direction

•3 Pillars•Patching•Resiliance

•Automation

Page 3: Blue Ocean IT Security

• Inspired from Haroon Meer’s BlackHat Europe 2015 keynote where he made the following observations– An upcoming security apocalypse is on the horizon– There is a crisis of confidence– “For the thousands your organization spends on

security, you can't protect the one guy who is most valuable to you. Worse yet, would you even know if he was popped?”*

* http://blog.thinkst.com/2011/03/our-upcoming-security-apocalypse.html

Sub headlineAGENDABLUE OCEAN IT Security

Inspiration

Page 4: Blue Ocean IT Security

• The issues facing the IT security field haven’t changed in the last 15 years

• “Draining the swamp” issue leads to misdirection concerning the root-cause of the problem

• A perspective/cultural shift needs to take place concerning the approach

Sub headlineAGENDABLUE OCEAN IT Security

Direction

Page 5: Blue Ocean IT Security

Patching / Updates (Upgrades)When did we allow this bahviour to become the ‘norm’ and ‘expected’?

3 pillarsBLUE OCEAN STRATEGY

ResilianceWhat happened to load balancing/fail over?

AutomationHave all engineers been swollowed by the Tech firms?

Page 6: Blue Ocean IT Security

Your own footer Your Logo

Patching / Updates (Upgrades)

Sub headlineAGENDABLUE OCEAN STRATEGY

Page 7: Blue Ocean IT Security

• Why is patching accepted?– A legacy left over from the hardware days• Since the days of paper tape and punch cards, physical

patching was accepted • It was then translated into the software world• Designed principally as a mitigating action for

unreliable hardware– Hardware resiliance has improved, while software resiliance

has stagnated and in some cases deteriorated

Sub headlineAGENDABLUE OCEAN IT Security

Patching / Updates (Upgrades)

Page 8: Blue Ocean IT Security

• Do we accept this for microwaves, digital watches or other consumer goods?– You buy an item and don’t expect it to break

within 2 months.– Consumer rights acts exist to protect customers

against such situations (ratified through law)• T&C’s conveniently provide a ‘get-out-of-jail-

free’ card with a no opt-out option.– ‘Our way, or the high way’

Sub headlineAGENDABLUE OCEAN IT Security

Patching / Updates (Upgrades)

Page 9: Blue Ocean IT Security

• An open door– This mechanism allows 3rd parties access to our

systems at a privileged level– It’s provided the perfect back-dooring model

which everyone accepts (incl. the IT security community)

Sub headlineAGENDABLUE OCEAN IT Security

Patching / Updates (Upgrades)

Page 10: Blue Ocean IT Security

• The excuse:– Software engineering is hard and you will never

develop a bug free system• The response: – So what?:

• Which bugs really cripple systems operationally, when they’ve been correctly engineered?

• An answer:– Cleanroom software engineering (Harlan Mills)

• e.g. Avionics, mission critical systems etc.

Sub headlineAGENDABLUE OCEAN IT Security

Patching / Updates (Upgrades)

Page 11: Blue Ocean IT Security

Your own footer Your Logo

Resiliance

Sub headlineAGENDABLUE OCEAN STRATEGY

Page 12: Blue Ocean IT Security

• Build in resilience to your networks– When did it become acceptable to forget

principles of load balancing and fail-over?• e.g. banking site down for the weekend due to

maintenance

– Wasn’t the Cloud supposed to be a solution to this problem?

Sub headlineAGENDABLUE OCEAN IT Security

Resiliance

Page 13: Blue Ocean IT Security

• Network segmentation and zoning – Identify the threat– Lock down/Contain the threat – Purge the threat

Sub headlineAGENDABLUE OCEAN IT Security

Resiliance

Page 14: Blue Ocean IT Security

• Honeypots– Where did they go?– Technological resilience out of the box• Monitoring and containment also for free

• Risk based approach– Understand your assets and compartmentalise

them accordingly

Sub headlineAGENDABLUE OCEAN IT Security

Resiliance

Page 15: Blue Ocean IT Security

Your own footer Your Logo

Automation

Sub headlineAGENDABLUE OCEAN STRATEGY

Page 16: Blue Ocean IT Security

• Strong engineering principles must be adhered to

• Develop strong developer governance around SSDLC– Integrate mandatory security gating into the SDLC

• Internal talent retention– Holistic work flow automation – Internal employees often better positioned to take

birds-eye view to build-out process automation

Sub headlineAGENDABLUE OCEAN IT Security

Automation

Page 17: Blue Ocean IT Security

• Ensure security controls are automatically checked/reported– Without this, security will be by-passed

• Process automation critical– Excel must be replaced with dynamic reporting.

Static data analytics cripples agility– Remove the human

Sub headlineAGENDABLUE OCEAN IT Security

Automation