SlideShare a Scribd company logo
SESSION ID:
#RSAC
Aaron Rinehart
ChaoSlingr: Introducing Security-Based
Chaos Testing
CSV-W04
Chief Enterprise Security Architect
UnitedHealth Group
Grayson Brewer
IT Security Consultant
UnitedHealth Group
#RSAC
Security + Chaos = Security Experimentation
2
#RSAC
About Aaron
3
#RSAC
About Grayson
4
#RSAC
Overview UnitedHealth Group
5
#RSAC
Outline
6
#RSAC
A Tool to Build or a Weapon to Destroy?
7
#RSAC
The Reality is…...
8
#RSAC
Failure is Necessary
9
#RSAC
10
#RSAC
Revisiting the Problem
11
#RSAC
Where do Security Failures come from?
12
#RSAC
The Gap b/t Modern Software & Security
13
#RSAC
Distributed Systems Are Tricky
14
#RSAC
Distributed Systems Are Tricky
15
#RSAC
Don't Drift into the Unknown
16
#RSAC
Ask Better Questions
17
#RSAC
Ask yourself……...
18
#RSAC
Ask yourself……...
19
#RSAC
Ask yourself……...
20
#RSAC
So in fact do we identify Security Failures?
21
#RSAC
Its toooooo late…..
22
#RSAC
It worked for Rebel Alliance but not here
23
#RSAC
Build Confidence through Instrumentation
24
#RSAC
What is Chaos Engineering?
25
#RSAC
A brief history of Chaos
26
SecurityExperimentationSecurityExperimentation
THENEWPLAYBOOK
#RSAC
Do Less, Better
28
#RSAC
The New Playbook
29
#RSAC
What's the Difference?
30
• Testing is assessment or validation of an expected
outcome
• Experimentation seeks to derive new insights and
information that were previously unknown
#RSAC
Security Experimentation: A Definition
31
#RSAC
32
• Drive out failure.
• Observe failure.
• Learn from failure.
• Build resilient systems.
Be Objective & Use Failure as a Tool
#RSAC
Build a Learning Culture
33
#RSAC
Why do it?
34
• Build Confidence in Security Measures
• Strengthen Incident Management
• Measure Incident Response Readiness
• Identify Security Failures within the Security Control Plane
• Proactively Detect Security Failures
• Measure Investments in Security Technology
#RSAC
GameDays + Post Mortem
35
#RSAC
Value of Game Day Exercises
36
• Provides Objective Measurement for Security Incident Response
• Identify Control Coverage Gaps
• Keeping the Team Sharp and “Battle Ready”
• Learn how your Security Really Works vs. How you Assume it Works.
“If you’re not cultivating a Learning Culture,
you wIll probably end up losing to someone
else who is.”
#RSAC
Open Source Security Experimentation Tool
37
#RSAC
So, eh, what is it exactly
38
#RSAC
FYI ChaoSlingr is on Github (FREE!)
39
#RSAC
An Example Experiment Using ChaoSlingr
40
#RSAC
An Example Security Experiment
41
#RSAC
How the experiment works
42
#RSAC
Summary: Takeaways
43
• Security Problems in
Distributed Systems
• Chaos Engineering
• Security Experimentation
• ChaoSlingr: Open Source Tool
• Think Differently, Be Objective
#RSAC
Apply What You Have Learned Today
44
• Next week you should:
• Start asking yourself the Right Questions
• Go to Github and check out ChaoSlingr
• Find out if your organization has an Site Reliability Engineer and tell them what you learned in this talk.
• In the first three months following this presentation you should:
• Conduct your first GameDay Exercise and manual Security Chaos Experiment
• Attend a Chaos Engineering Community Event near you
• Within six months you should:
• Write your own experiments for ChaoSlingr or your own tool.
• Run your first automated Security Chaos Experiment
#RSAC
The New Normal: Continuous Evolution
45
#RSAC
Questions
@aaronrinehart
@BrewerSecurity
Hit us with some questions

More Related Content

PDF
A Pragmatic Union: Security and SRE
PDF
Building and Adopting a Cloud-Native Security Program
PDF
Red team-view-gaps-in-the-serverless-application-attack-surface
PDF
Corpsec: “What Happened to Corpses A and B?”
PDF
Security Program Development for the Hipster Company
PDF
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
PDF
Establishing a-quality-vulnerability-management-program
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
A Pragmatic Union: Security and SRE
Building and Adopting a Cloud-Native Security Program
Red team-view-gaps-in-the-serverless-application-attack-surface
Corpsec: “What Happened to Corpses A and B?”
Security Program Development for the Hipster Company
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Establishing a-quality-vulnerability-management-program
Stephen Sadowski - Securely automating infrastructure in the cloud

What's hot (17)

PPTX
Azure for Auditors
PDF
Chaos engineering for cloud native security
PDF
Incident response-in-the-cloud
PDF
Practical appsec lessons learned in the age of agile and DevOps
PPTX
Top 5 Priorities for Cloud Security
PPTX
AllDayDevOps 2019 AppSensor
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
Collaborative security : Securing open source software
PDF
Securing 100 products - How hard can it be?
PDF
Estimating Development Security Maturity in About an Hour
PDF
DevSecOps in Baby Steps
PDF
Lessons from a recovering runtime application self protection addict
PPTX
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PDF
Take Control: Design a Complete DevSecOps Program
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
DevSecOps - Building continuous security into it and app infrastructures
Azure for Auditors
Chaos engineering for cloud native security
Incident response-in-the-cloud
Practical appsec lessons learned in the age of agile and DevOps
Top 5 Priorities for Cloud Security
AllDayDevOps 2019 AppSensor
Elizabeth Lawler - Devops, security, and compliance working in unison
Collaborative security : Securing open source software
Securing 100 products - How hard can it be?
Estimating Development Security Maturity in About an Hour
DevSecOps in Baby Steps
Lessons from a recovering runtime application self protection addict
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
[OPD 2019] Governance as a missing part of IT security architecture
Take Control: Design a Complete DevSecOps Program
Extending Amazon GuardDuty with Cloud Insight Essentials
DevSecOps - Building continuous security into it and app infrastructures
Ad

Similar to ChaoSlingr: Introducing Security-Based Chaos Testing (20)

PDF
Security precognition chaos engineering in incident response
PDF
Using security to drive chaos engineering - April 2018
PDF
The case for chaos testing
PDF
The Case for Chaos Testing
PDF
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
PPTX
Chaos engineering
PDF
Using security to drive chaos engineering
PDF
Trust and Confidence through Chaos Keynote for W-JAX Munich 2018
PDF
Chaos Engineering 101: A Field Guide
PPTX
Black ops 2012
PDF
From Chaos to Verification at Expedia Group, London
PDF
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st...
PDF
Chaos Engineering
PDF
Applying Chaos Engineering to Build Resilient Serverless Applications
PPTX
Resilience and chaos engineering
ODP
muCon 2017 - Build Confidence in your System with Chaos Engineering
PPTX
Green Custard Friday Talk 19: Chaos Engineering
PPTX
ChaosEngineeringITEA.pptx
PDF
Chaos Engineering and Systems Reliability
PDF
Choose your own adventure Chaos Engineering - QCon NYC 2017
Security precognition chaos engineering in incident response
Using security to drive chaos engineering - April 2018
The case for chaos testing
The Case for Chaos Testing
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Chaos engineering
Using security to drive chaos engineering
Trust and Confidence through Chaos Keynote for W-JAX Munich 2018
Chaos Engineering 101: A Field Guide
Black ops 2012
From Chaos to Verification at Expedia Group, London
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st...
Chaos Engineering
Applying Chaos Engineering to Build Resilient Serverless Applications
Resilience and chaos engineering
muCon 2017 - Build Confidence in your System with Chaos Engineering
Green Custard Friday Talk 19: Chaos Engineering
ChaosEngineeringITEA.pptx
Chaos Engineering and Systems Reliability
Choose your own adventure Chaos Engineering - QCon NYC 2017
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
20250228 LYD VKU AI Blended-Learning.pptx
sap open course for s4hana steps from ECC to s4
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology

ChaoSlingr: Introducing Security-Based Chaos Testing