SlideShare a Scribd company logo
LONDON 2015Join the conversation #devseccon
Transforming security from
qualitative to quantitative
Scott Russell
Transforming security from
qualitative to quantitative
Scott Russell
How many tickles does
it take to make an
Octopus Laugh?
10Ten-Tickles
Justin Arbuckle
“If you cannot state the policy in a way that can be coded,
or automated, then the policy is wrong, or worse un-enforc
Justin Arbuckle
“the compliance of an organisation is in direct proportion
to the extent that their policies are expressed as code."
Arbuckle’s Law
Non-bullet Slide
Non-bullet slide subtitle
CI
Security happens in tears tiers…
• At the OS,
• At check-in to Source Control
• Running of orchestration Jobs
• Update to Chef Server
• Updates to Analytics Server
• Feeds to Splunk/Elastic Search
• In feedback loops
• At customer contact points
Simple Feedback Workflow/Pipeline
https://supermarket.chef.io/cookbooks/audit-cis
The Audit – CIS cookbook.
Real world example of
quantifiable Security
Cis Audit cookbook – CIS audit rule descritption
• 7.5 Lock Inactive User Accounts (Scored)
Profile Applicability:
Level 1
Description:
User accounts that have been inactive for over a given period of time can be
automatically
disabled. It is recommended that accounts that are inactive for 35 or more days
be
disabled.
Cis Audit cookbook – Actual Security Readable output
Caveats for Quantifiable Secure Infrastructure
• Information is a “human problem”
• Risk assessment is an iterative process
• Someone has ‘root’
• Someone has the ‘private key’
• Policy must be translatable into code, ( or already expressed as
code )
• Security involved in the CD/build pipeline from Day 1
• Security able to specify tooling and coding to be run at all
stages.
• Security sign off on the validity of the CD/Build pipeline
No security plan survives initial contact
with Continuous Deployment
The Positive side of DevSecOPS tooling
• Favor tools that expose good API’s for automation
• Move from one firewall per company, to one virtual firewall per app, or per
protocol. Change becomes easier to manage politically.
• Integrate error reporting ( of security testing )into the build process , providing
instant feedback
Implementing Security with DevSecOps Challenges
• Firewall ( hardware ) manufacturers tend to be “API challenged”
• Security software vendors favor “static config” of their tools. The challenge is to
make this more dynamic ( using chef of course )
• Tooling is moving towards friendly API’s, but slooooowly
• Creation and updating of automated security tests across multiple builds is
Haaaard!.
• Risk assessment on single firewall, with automated changes involves the entire
company, needs automated testing ( of everything ), and is unlikely to pass risk
assesement. Individual firewall’s carry less risk.
Chefdevseccon2015
LONDON 2015Join the conversation #devseccon
End

More Related Content

PPTX
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PDF
From Gates to Guardrails: Alternate Approaches to Product Security
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PPTX
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Application Security at DevOps Speed - DevOpsDays Singapore 2016
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
From Gates to Guardrails: Alternate Approaches to Product Security
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
WhiteSource Webinar What's New With WhiteSource in December 2018
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...

What's hot (20)

PDF
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
PDF
Dev seccon london 2016 intelliment security
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PDF
Your Resolution for 2018: Five Principles For Securing DevOps
PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
Keynote: Puppet camp compliance
PDF
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
PPTX
Are your DevOps and Security teams friends or foes?
PDF
A Secure DevOps Journey
PDF
PIACERE - DevSecOps Automated
PDF
How to automate your DevSecOps successfully
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
PPTX
Turning security into code by Jeff Williams
PPTX
What's New in Puppet Enterprise 2015.3 (APAC)
PPTX
Testing in the new age of DevOps
PDF
Why to DevSecOps - Introduction of Bangalore Azure Group meetup
PDF
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
PDF
Managing Quality of Service for Containerized Microservice Applications
PPTX
2018 07-24 network security at the speed of dev ops - webinar
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
Dev seccon london 2016 intelliment security
Automating Open Source Security: A SANS Review of WhiteSource
Your Resolution for 2018: Five Principles For Securing DevOps
Connect Ops and Security with Flexible Web App and API Protection
Keynote: Puppet camp compliance
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
Are your DevOps and Security teams friends or foes?
A Secure DevOps Journey
PIACERE - DevSecOps Automated
How to automate your DevSecOps successfully
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
Turning security into code by Jeff Williams
What's New in Puppet Enterprise 2015.3 (APAC)
Testing in the new age of DevOps
Why to DevSecOps - Introduction of Bangalore Azure Group meetup
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
Managing Quality of Service for Containerized Microservice Applications
2018 07-24 network security at the speed of dev ops - webinar
Ad

Similar to Chefdevseccon2015 (20)

PDF
Dev secops opsec, devsec, devops ?
PDF
Integrating DevOps and Security
PPTX
Finding-Security-A-Home-In-A-DevOps-World.pptx
PDF
Top 20 DevSecOps Interview Questions and Answers
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
PDF
Are You Ready to Ace Your DevSecOps Interview?
PDF
Top 20 DevsecOps Interview Questions.pdf
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
PDF
DevSecOps and the CI/CD Pipeline
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PPTX
Finding Security a Home in a DevOps World
PDF
Pragmatic Pipeline Security
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
DevSecOps - Background, Status and Future Challenges
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
Dev secops opsec, devsec, devops ?
Integrating DevOps and Security
Finding-Security-A-Home-In-A-DevOps-World.pptx
Top 20 DevSecOps Interview Questions and Answers
Top 20 DevSecOps Interview Questions.pdf
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
Are You Ready to Ace Your DevSecOps Interview?
Top 20 DevsecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdf
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
DevSecOps and the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
Finding Security a Home in a DevOps World
Pragmatic Pipeline Security
The Emergent Cloud Security Toolchain for CI/CD
DevSecOps - Background, Status and Future Challenges
The Emergent Cloud Security Toolchain for CI/CD
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
DevSecCon Keynote
DevSecCon KeyNote London 2015
Ad

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
E -tech empowerment technologies PowerPoint
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Introduction to Information and Communication Technology
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPTX
innovation process that make everything different.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
newyork.pptxirantrafgshenepalchinachinane
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
E -tech empowerment technologies PowerPoint
Unit-1 introduction to cyber security discuss about how to secure a system
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Introduction to Information and Communication Technology
Sims 4 Historia para lo sims 4 para jugar
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Exploring VPS Hosting Trends for SMBs in 2025
innovation process that make everything different.pptx
Unit-3 cyber security network security of internet system
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Funds Management Learning Material for Beg
presentation_pfe-universite-molay-seltan.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Job_Card_System_Styled_lorem_ipsum_.pptx
Power Point - Lesson 3_2.pptx grad school presentation
An introduction to the IFRS (ISSB) Stndards.pdf

Chefdevseccon2015

  • 1. LONDON 2015Join the conversation #devseccon Transforming security from qualitative to quantitative Scott Russell
  • 2. Transforming security from qualitative to quantitative Scott Russell
  • 3. How many tickles does it take to make an Octopus Laugh? 10Ten-Tickles
  • 4. Justin Arbuckle “If you cannot state the policy in a way that can be coded, or automated, then the policy is wrong, or worse un-enforc
  • 5. Justin Arbuckle “the compliance of an organisation is in direct proportion to the extent that their policies are expressed as code." Arbuckle’s Law
  • 7. Security happens in tears tiers… • At the OS, • At check-in to Source Control • Running of orchestration Jobs • Update to Chef Server • Updates to Analytics Server • Feeds to Splunk/Elastic Search • In feedback loops • At customer contact points
  • 9. https://supermarket.chef.io/cookbooks/audit-cis The Audit – CIS cookbook. Real world example of quantifiable Security
  • 10. Cis Audit cookbook – CIS audit rule descritption • 7.5 Lock Inactive User Accounts (Scored) Profile Applicability: Level 1 Description: User accounts that have been inactive for over a given period of time can be automatically disabled. It is recommended that accounts that are inactive for 35 or more days be disabled.
  • 11. Cis Audit cookbook – Actual Security Readable output
  • 12. Caveats for Quantifiable Secure Infrastructure • Information is a “human problem” • Risk assessment is an iterative process • Someone has ‘root’ • Someone has the ‘private key’ • Policy must be translatable into code, ( or already expressed as code ) • Security involved in the CD/build pipeline from Day 1 • Security able to specify tooling and coding to be run at all stages. • Security sign off on the validity of the CD/Build pipeline
  • 13. No security plan survives initial contact with Continuous Deployment
  • 14. The Positive side of DevSecOPS tooling • Favor tools that expose good API’s for automation • Move from one firewall per company, to one virtual firewall per app, or per protocol. Change becomes easier to manage politically. • Integrate error reporting ( of security testing )into the build process , providing instant feedback
  • 15. Implementing Security with DevSecOps Challenges • Firewall ( hardware ) manufacturers tend to be “API challenged” • Security software vendors favor “static config” of their tools. The challenge is to make this more dynamic ( using chef of course ) • Tooling is moving towards friendly API’s, but slooooowly • Creation and updating of automated security tests across multiple builds is Haaaard!. • Risk assessment on single firewall, with automated changes involves the entire company, needs automated testing ( of everything ), and is unlikely to pass risk assesement. Individual firewall’s carry less risk.
  • 17. LONDON 2015Join the conversation #devseccon End

Editor's Notes

  • #8: At the OS, Provenance - Where did the ISO come from? How was it built? Show me the logs?, no, for this image, v1.3.2, at 09:15:23, on 21st march. 2015? Who built it? What was the version of the scripts used to build it? Show me the security test and audit results ( for that image build ) At Source Control Who checked in the code? Who has access to the code? Show me the logs?, no, for this commit, at 09:15:23, on 21st march. 2015? Integration to AD, again show me the logs Alerting on denied access, etc? Alerting on “dangerous code commits” - ‘rm- Rf /’ At Orchestration level What security tests ( and versions ) were run for this job Who initiated the job? Show me the error logs for the security tests?, no, for this run, at 11:13:12, on 22nd march. 2015? Integration to AD, again show me the logs Regular security scanning of the UX?, every patch? At Chef server update Who logged into chef? Service account or user? What was updated? – Chef analytics? Show me the error logs for the security tests?, no, for this run, at 11:13:12, on 22nd march. 2015? Integration to AD, again show me the logs Pass in a unique id for later tracking? Regular security scanning of the chef server?, every patch? At Analytics server update Who logged into chef? Service account or user? What nodes/resources were updated? Were they successful updates Feedback loop back to orchestation with a unique id to confirm update? Show me the logs for the security audit logs?, no, for this run, at 12:43:12, on 22nd march. 2015? Regular security scanning of the chef server?, every patch? At analytics feeds to splunk/ELK Do the splunk/ELK index’s match the chef environments? Why? What alerts are being implemented, are the being driven by security code? Did the updates to “Alerts” all happenen via an orchestrated code update? Show me the logs? Show me the timeline for the unique change id XXX ,for this job, starting at 12:43:12, on 22nd march. 2015?