SlideShare a Scribd company logo
Automated Security
Hardening with
OpenStack-Ansible
Major Hayden
major.hayden@rackspace.com
@majorhayden
2
Major Hayden
Principal Architect
since 2006
since 2012
since 2011
3
Agenda
• Security tug-of-war
• Meeting halfway
• Get involved!
4
We can all agree on one thing:
information security is
insanely difficult
5
We want just enough security
to create valuable outcomes
for our customers
6
We avoid security changes that
increase drag and friction
within our organizations
7Photo credit: Bruce Guenter (Flickr)
If the auditors aren’t happy,
nobody is happy.
8
How do we make valuable security
changes without disruption (and
keep the auditors happy)?
9Photo credit: Jaime Walker (jw1697, Flickr)
Make security automatic
(And yes, I know that makes it sound easy.)
10
When the going gets tough,
the tough adopt standards
(This isn’t a famous quote. I just made it up for these slides.)
11
Information security tip:
People should feel like
security is something
they are a part of;
not something that is
being done to them.
(I learned this lesson the hard way.)
12
Which sounds better?
Option #1
“As developers, you don’t know how
to secure systems properly. We will tell you
what to do and you must have it done in three months.
If you don’t, we can’t take credit cards.”
13
Which sounds better?
Option #2
“Since you use Ansible, we wrote some automation that
fits into your existing deployment method and won’t
disrupt your production environments.
Can we work with you to test it this month?”
14
Automated security
for OpenStack must be:
Easy to implement
Simple to maintain
Non-disruptive to existing clouds
Effective against attacks
Open and transparent
15
PCI-DSS 3.1 Requirement 2.2:
“Develop configuration standards for all system
components. Assure that these standards address all
known security vulnerabilities and are consistent with
industry-accepted system hardening standards.”
16
Selecting the right standard
is challenging
Some are as
long as novels
Very few
directly apply
to Ubuntu
Some have
restrictive
licenses
17
Our selection:
Security Technical Implementation Guide (STIG)
from the Defense Information Systems Agency (DISA)
18
Active services
Authentication
Boot-time security
Consoles
File permissions/ownership
File integrity management
Kernel tuning
Mail
Package management
SSH daemon
Syscall Auditing
The STIG covers many
of the most critical
security domains
19
STIG(RHEL 6)
20
Ansible is a
software platform for
configuration management
and deployment
(among many other things)
21
OpenStack-Ansible deploys a
production-ready OpenStack system
using Ansible tasks and roles
22
OpenStack-Ansible has
a security hardening role
with two components:
Ansible Role
Applies automated
security hardening to
multiple systems
Documentation
With content
for deployers
as well as auditors
23
openstack-ansible-security
role features:
Applies 200+ security
configurations in 90 seconds
Highly configurable
Comes with a built-in auditing
mode for testing or for use with
compliance auditors
Carefully written to be non-
disruptive to existing
OpenStack clouds
24
Documentation
Configuration requirement from
the STIG
Link to the STIG viewer
Notes for deployers about
exceptions and additional
configurations
(auditors want to see these, too)
25
Documentation
References Ansible
variable configuration
options
Warnings and advice
26
Configuration
27
Configuration
Flip a boolean and redeploy
the entire role or use a tag to
only deploy certain parts.
28
How do I get it?
OpenStack-Ansible
deployers
Rackspace Private Cloud
customers
Anyone on Earth
Already available in OpenStack-Ansible’s Liberty,
Mitaka, and Newton releases!
Adjust apply_security_hardening to True and deploy!
Coming soon in Rackspace Private Cloud 12.2!
Speak with your account manager for more details.
Use it with your existing Ansible playbooks!
The role works well in OpenStack and non-
OpenStack environments (see the docs).
29Photo credit: fvanrenterghem (Flickr)
The road ahead:
Support for Ubuntu 16.04 and
CentOS 7
Rebase using the new
STIG guidelines for RHEL 7
Improved reporting and metrics
Identify configuration security
issues within OpenStack services
30
Design Summit:
Join the
OpenStack-Ansible developers
this Thursday/Friday in Austin!
IRC:
#openstack-ansible
Mailing list:
openstack-dev (tag with [openstack-
ansible][security])
Want to get involved?
Found a bug?
Have a new idea?
31
Links:
Documentation: http://docs.openstack.org/developer/openstack-ansible-
security/
Source code:
https://github.com/openstack/openstack-ansible-security
Automated Security Hardening with OpenStack-Ansible
Thank you!
Major Hayden
major.hayden@rackspace.com
@majorhayden

More Related Content

PDF
Holistic Security for OpenStack Clouds
PPTX
OpenStack Security Project
PPT
Shmoocon 2013 - OpenStack Security Brief
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PPTX
Openstack security presentation 2013
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PPTX
Equifax cyber attack contained by containers
PPTX
Security at the Speed of the Network
Holistic Security for OpenStack Clouds
OpenStack Security Project
Shmoocon 2013 - OpenStack Security Brief
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Openstack security presentation 2013
Elastic Security: Enterprise Protection Built on the Elastic Stack
Equifax cyber attack contained by containers
Security at the Speed of the Network

What's hot (20)

PDF
Inherent Security Design Patterns for SDN/NFV Deployments
PDF
Oscar Cabanillas - Elastic - OSL19
PDF
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
PDF
Container Security Deep Dive & Kubernetes
PPTX
AWS Security Strategy
PDF
'Moon' Security Management System for OPNFV
PDF
Security threats with Kubernetes - Igor Khoroshchenko
PPTX
Introduction to Orchestration and DevOps with OpenStack
PDF
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
PDF
Elastic SIEM (Endpoint Security)
PDF
Tokyo meetup 20160224
PDF
Automate threat detections and avoid false positives
PDF
Cisco Cloud Networking Workshop
PPTX
Newt191 final project
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PDF
$HOME Sweet $HOME SANSFIRE Edition
PDF
Keynote: Elastic Security evolution and vision
PDF
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
PDF
Automatisez la détection des menaces et évitez les faux positifs
PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Inherent Security Design Patterns for SDN/NFV Deployments
Oscar Cabanillas - Elastic - OSL19
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
Container Security Deep Dive & Kubernetes
AWS Security Strategy
'Moon' Security Management System for OPNFV
Security threats with Kubernetes - Igor Khoroshchenko
Introduction to Orchestration and DevOps with OpenStack
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Elastic SIEM (Endpoint Security)
Tokyo meetup 20160224
Automate threat detections and avoid false positives
Cisco Cloud Networking Workshop
Newt191 final project
Elastic Security: Enterprise Protection Built on the Elastic Stack
$HOME Sweet $HOME SANSFIRE Edition
Keynote: Elastic Security evolution and vision
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
Automatisez la détection des menaces et évitez les faux positifs
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Ad

Viewers also liked (20)

PDF
Five things I learned about information security
PDF
Be an inspiration, not an impostor (Texas Linux Fest 2015)
PDF
Be an inspiration, not an impostor (Fedora Flock 2015)
PPTX
Xps 13 developer edition - slide share presentation-02.20.13
PDF
OpenStack-Ansible Security
PDF
System Hardening Using Ansible
PDF
Ansible tips & tricks
PDF
Sharepoint, Liferay & Co.: Social Business Integration in der Praxis
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PDF
More tips n tricks
PDF
Hacking ansible
PDF
Benchmark slideshow
ODP
Ansible & Vagrant
PDF
Flexible, simple deployments with OpenStack-Ansible
PDF
Managing sensitive data with Ansible vault
PPTX
Ansible for Enterprise
PPTX
[세미나] Vagrant 이지원
PDF
XE 모듈 개발 - 걸음마부터 날기까지 - 달리기
PDF
Ansible과 CloudFormation을 이용한 배포 자동화
PDF
Introduction to ansible
Five things I learned about information security
Be an inspiration, not an impostor (Texas Linux Fest 2015)
Be an inspiration, not an impostor (Fedora Flock 2015)
Xps 13 developer edition - slide share presentation-02.20.13
OpenStack-Ansible Security
System Hardening Using Ansible
Ansible tips & tricks
Sharepoint, Liferay & Co.: Social Business Integration in der Praxis
Comprehensive Cloud Security Requires an Automated Approach
More tips n tricks
Hacking ansible
Benchmark slideshow
Ansible & Vagrant
Flexible, simple deployments with OpenStack-Ansible
Managing sensitive data with Ansible vault
Ansible for Enterprise
[세미나] Vagrant 이지원
XE 모듈 개발 - 걸음마부터 날기까지 - 달리기
Ansible과 CloudFormation을 이용한 배포 자동화
Introduction to ansible
Ad

Similar to Automated Security Hardening with OpenStack-Ansible (20)

PDF
Securing OpenStack and Beyond with Ansible
PPTX
Security workflow with ansible
PDF
Bsides Delhi Security Automation for Red and Blue Teams
PDF
Deploying Kubernetes without scaring off your security team - KubeCon 2017
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PPTX
Overcoming Security Challenges in DevOps
PDF
When flexibility met simplicity: the friendship of OpenStack and Ansible
PDF
Automating security compliance for physical, virtual, cloud, and container en...
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
PPTX
Deploying OpenStack with Ansible
PDF
[Red Hat] OpenStack Automation with Ansible
PDF
Automating Security in Cloud Workloads with DevSecOps
PDF
Cloud security : Automate or die
PDF
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PDF
DevSecOps: The Open Source Way
PPTX
Integrating Security into DevOps
PDF
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
PDF
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
PDF
Ansible Case Studies
Securing OpenStack and Beyond with Ansible
Security workflow with ansible
Bsides Delhi Security Automation for Red and Blue Teams
Deploying Kubernetes without scaring off your security team - KubeCon 2017
DevSecCon London 2017: when good containers go bad by Tim Mackey
Overcoming Security Challenges in DevOps
When flexibility met simplicity: the friendship of OpenStack and Ansible
Automating security compliance for physical, virtual, cloud, and container en...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
Deploying OpenStack with Ansible
[Red Hat] OpenStack Automation with Ansible
Automating Security in Cloud Workloads with DevSecOps
Cloud security : Automate or die
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
Stephen Sadowski - Securely automating infrastructure in the cloud
DevSecOps: The Open Source Way
Integrating Security into DevOps
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
Ansible Case Studies

More from Major Hayden (10)

PDF
Continuous Kernel Integration
PDF
I was too burned out to name this talk
PDF
Cookies for kernel developers
PDF
Grow your community: Inspire an Impostor
PDF
Taming the Technical Talk - OWASP San Antonio
PDF
Taming the Technical Talk
PDF
The New Normal - Rackspace Solve 2015
PDF
The New Normal: Managing the constant stream of new vulnerabilities
PDF
Cloud Data Security
PPTX
ISACA Cloud Security Presentation 2013-09-24
Continuous Kernel Integration
I was too burned out to name this talk
Cookies for kernel developers
Grow your community: Inspire an Impostor
Taming the Technical Talk - OWASP San Antonio
Taming the Technical Talk
The New Normal - Rackspace Solve 2015
The New Normal: Managing the constant stream of new vulnerabilities
Cloud Data Security
ISACA Cloud Security Presentation 2013-09-24

Recently uploaded (20)

PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
AI in Product Development-omnex systems
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
history of c programming in notes for students .pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PDF
medical staffing services at VALiNTRY
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
AI in Product Development-omnex systems
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo POS Development Services by CandidRoot Solutions
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Materi_Pemrograman_Komputer-Looping.pptx
PTS Company Brochure 2025 (1).pdf.......
Design an Analysis of Algorithms I-SECS-1021-03
Online Work Permit System for Fast Permit Processing
Wondershare Filmora 15 Crack With Activation Key [2025
history of c programming in notes for students .pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
ISO 45001 Occupational Health and Safety Management System
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Design an Analysis of Algorithms II-SECS-1021-03
Introduction to Artificial Intelligence
medical staffing services at VALiNTRY
How to Choose the Right IT Partner for Your Business in Malaysia
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

Automated Security Hardening with OpenStack-Ansible