SlideShare a Scribd company logo
Continuous Compliance via Data and Code
ERKANG ZHENG
Founder, JupiterOne | CISO, LifeOmic
November 2019
© 2019 JupiterOne
Pick assessor
Perform gap assessment
Implement remediation
Collect evidences
Assess and certify
Documented data flows
Conducted risk analysis
Wrote policies and
procedures
Created infrastructure
and security
architecture diagrams
REPEATMonitor, Manage, Optimize
START
Implemented 100+ controls
Endpoint
malware
protection
Server
vulnerability
scanning
Production
change
management
SSO + MFA
Application
code scanning +
pen testing
User training
Configuration
audit
Endpoint
compliance
agents
Vendor risk
management
Firewalls
and security
groups
Data encryption
WAF + DDoS
protection
Asset inventory
and tagging
Activity and log
monitoring
SEC
COMP
AUDITOR
Our
Security
Program
HIPAA SOC 2 FDA FedRAMP ...COMPLIANCE
Now what?
How? Is 100% visibility possible?
“I don’t need more controls. I need to be able to effectively
and efficiently manage and prove what I have.”
“I need to full visibility so that I can make decisions
faster, with confidence.”
Steps to continuous compliance via code
1. Define compliance framework in JSON
2. Write policies and procedures in Markdown
3. Aggregate data from everywhere (infrastructure, controls,
endpoints, users, training, code, etc.) to a single source of truth
4. Write queries to generate evidence from data
5. Map policies and evidence to compliance requirements
Step 1
Step 2
Step 3
Step 4
Step 5
Define Compliance Framework in JSON
Step 1
{
"standard": "HIPAA",
"version": "2013",
"webLink": "https://www.hhs.gov/hipaa/for-professionals/index.html",
"sections": [
{
"title": "Administrative Safeguards",
"requirements": [
{
"ref": "164.308(a)(1)(i)",
"title": "Security management process",
"summary": "Implement policies and procedures to prevent, detect, contain and correct security violations.",
},
{
"ref": "164.308(a)(1)(ii)(A)",
"title": "Risk analysis",
"summary": "Conduct an accurate and thorough assessment of the potential ......"
},
...
]
},
{ ... }
]
}
HIPAA example with sections and requirements
HIPAA Example
Define Compliance Framework in JSON
Step 1
{
"standard": "SOC 2 Security",
"version": ”AICPA 2017",
"webLink": "https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-
services-criteria.pdf",
"domains": [
{
"title": "Control Environment",
"controls": [
{
"ref": "CC1.1",
"title": "COSO Principle 1",
"summary": "The entity demonstrates a commitment to integrity and ethical values."
},
{
"ref": "CC1.1 (a)",
"summary": "A code of conduct/employee manual are in place and approved by top management"
},
...
]
},
{ ... }
]
}
SOC 2 example with domains and controls
SOC 2 Example
Write Security Policy and Procedure Docs in Markdown
• Written in Markdown
• Small, individual files –
“micro-docs” like micro-services
• Linked together via config.json
• Document reviews and approvals via PRs
• Templatized and published in HTML
Step 2 Policies Markdown
{
"id": "rar",
"file": "policies/rar.md",
"name": "Roles, Responsibilities and Training",
"adopted": true,
"procedures": [
"cp-role-assignment",
"cp-training-policy",
"cp-training-awareness",
"cp-training-hipaa",
"cp-internal-comms"
]
},
config.json
Publish to HTML
Step 2 Policies HTML Site
• Written in Markdown
• Small, individual files –
“micro-docs” like micro-services
• Linked together via config.json
• Document reviews and approvals via PRs
• Templatized and published in HTML
Build a single source of truth
Aggregate data from
• Cloud Service Providers (AWS, Azure, GCP)
• Identity Providers (Okta, Azure AD / O365, G Suite)
• Code Repos (Github, Bitbucket)
• Issues and Ticketing (Jira)
• User Awareness Training (KnowBe4)
• Endpoint Agents (Carbon Black, Stethoscope)
• Vulnerability Scanners (Inspector, Nessus)
• Code Scanners (Snyk, Veracode)
• Network Alert Findings (GuardDuty)
• Pen Tests, Bug Bounty (HackerOne)
• Risk Assessments (Manual)
• Vendors (SAML SSO Apps, Manual)
Step 3
DATA
Cloud Service
Providers (AWS,
Azure, GCP) Identity
Providers
(Okta, Azure
AD / O365, G
Suite)
Code Repos
(Github,
Bitbucket)
Issues and
Ticketing (Jira)
User
Awareness
Training
(KnowBe4)
Endpoint
Agents
(Carbon
Black,
Stethoscope)
Vulnerability
Scanners
(Inspector,
Nessus)
Code
Scanners
(Snyk,
Veracode)
Network Alert
Findings
(GuardDuty)
Pen Tests,
Bug Bounty
(HackerOne)
Risk
Assessments
(Manual)
Vendors
(SAML SSO
Apps, Manual)
Aggregate Data
Step 3 Data Model
Ask questions and get answers by data queries
Step 4
- query: |
Find DataStore with
classification=('sensitive' or 'confidential' or 'critical')
What is the inventory of my sensitive data stores?
Query Data
- query: |
Find HostAgent with
firewall='ON' as agent
that (PROTECTS|MONITORS|MANAGES)
(user_endpoint|workstation|laptop|desktop|computer) as device
return
device.displayName, device.owner,
agent.firewall
Are my end-user workstations protected by hosted-based firewall?
- query: |
Find (Person | Organization | Vendor) as assessor
that performed Assessment with createdOn > date.now-1yr or updatedOn > date.now-1yr as assessment
return
assessor.name, assessment._type, assessment.name, assessment.summary, assessment.reportURL
What security assessments have been done in the past year and who performed them?
User queries to perform gap analysis
Step 4
- name: good
query: |
Find DataStore with
classification=('sensitive' or 'confidential' or 'critical’)
- name: bad
query: |
Find DataStore with
(classification='' or classification=undefined) and (production=true or tag.Production=true)
- name: unknown
query: |
Find DataStore with (classification='' or classification=undefined)
What is the inventory of my sensitive data stores?
Query Gaps
- name: good
query: |
Find DataStore with
classification=('sensitive' or 'confidential' or 'critical’) and encrypted = true
- name: bad
query: |
Find DataStore with
classification=('sensitive' or 'confidential' or 'critical’) and encrypted != true
Is my sensitive data encrypted?
Map control procedures and evidence to compliance
Step 5 Create Mappings
[
{
"id": "cp-role-assignment",
"implements": [
{
"standard": "HIPAA",
"requirements": [
"164.308(a)(2)"
]
},
{
"standard": "PCI DSS",
"requirements": [
"12.1",
"12.3",
"12.4",
"12.5"
]
},
{
"standard": ”SOC 2 Security",
”controls": [ ... ]
}
]
},
...
Controls Mapping (policies/procedures)
- id: managed-question-data-direct-access-to-phi
title:
Which user or group or network or host has
access to data stores containing PHI/ePHI?
description: ...
queries:
- query: |
Find (User | UserGroup | Network | Host) as entity
that allows DataStore with
tag.PHI=true or tag.ePHI=true as ds
return
entity._type, entity.displayName, entity.email,
ds._type, ds.displayName, ds.tag.AccountName
tags:
- data
- SecOps
- compliance
- HIPAA
compliance:
- standard: default
controls:
- cp-access-phi
- standard: HIPAA
requirements:
- 164.308(a)(3)(ii)(B)
- 164.308(a)(4)(ii)(B)
Evidence Mapping (questions/queries)
Result: Continuous Compliance Dashboard
DATA
+
GRAPH
+
QUERY
Pick assessor
Perform gap assessment
Implement remediation
Monitor, Manage, Optimize
Collect evidences
Assess and certify
Documented data flows
Conducted risk analysis
Wrote policies and
procedures
Created infrastructure
and security
architecture diagrams
REPEAT
START
Implemented 100+ controls
Endpoint
malware
protection
Server
vulnerability
scanning
Production
change
management
SSO + MFA
Application
code scanning +
pen testing
User training
Configuration
audit
Endpoint
compliance
agents
Vendor risk
management
Firewalls
and security
groups
Data encryption
WAF + DDoS
protection
Asset inventory
and tagging
Activity and log
monitoring
CSEC
AUDITOR
CA / CC
VISIBILITY
GOVERNANCE
ASSURANCE
Our
Security
Program
HIPAA SOC 2 FDA FedRAMP ...COMPLIANCE
Data
Graph
Query
Asset inventory
and CMDB
Cloud
configuration
visibility
Access analysis
Network and
application
architecture
diagrams
Vulnerability
management
Alerts /
monitoring
Metrics
reporting
User training
status
Incident
correlation
Policy and
procedure
docs
Vendor
management
Compliance
evidence
collection
What else can you do?
It’s not only about compliance. Additional use cases:
• Asset inventory and CMDB
• Cloud configuration visibility
• Access analysis
• Network and application
architecture diagrams
• Vulnerability management
• Alerts / monitoring
• Metrics reporting
• User training status
• Policies and procedures documentation
• Vendor management
• Compliance evidence collection
S3 Bucket
Access
Are there non-public S3 bucket
access granted to anybody
outside of its account?
Find aws_s3_bucket with
classification!='public' as bucket
that ALLOWS * as grantee
where
bucket.tag.AccountName !=
grantee.tag.AccountName
return tree
SSO Access
Which Okta user is assigned what
AWS IAM role?
find okta_user
that ASSIGNED aws_iam_role
return tree
Vulnerability
in Code
Which PRs / developer
introduced new vulnerability
findings this past week?
Find User that OPENED PR
with createdOn > date.now-7days
that RELATES TO CodeRepo
that HAS (Vulernability|Finding)
with _createdOn > date.now-7days
return tree
Use query to create alerts and trigger remediation
Alert rules from query with actions:
• Send Email
• Send Slack message
• Create Jira issue
• Capture Trend
Future remediation automation:
• Trigger Webhook
• Invoke Lambda Function
• etc.
Metrics and charts built with queries
Users
and Access
Knowledge is Power
Knowledge =
Information (data) +
Insights (understanding of that data)
The graph is now the core of our
entire security program.
A knowledgebase, a foundation that
allows me to take actions with
confidence, faster.
GRAPH
Asset inventory and
CMDB
Cloud configuration
visibility
Access analysis
Network and
application
architecture diagrams
Vulnerability
management
Questions? Demo?
jupiterone.com

More Related Content

PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
Veracode Automation CLI (using Jenkins for SDL integration)
PDF
Introduction to DevSecOps
PDF
Application Security Guide for Beginners
PDF
Threat modeling with architectural risk patterns
PDF
Using threat models to control project brief
PDF
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
PPTX
Introduction to DevSecOps
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Veracode Automation CLI (using Jenkins for SDL integration)
Introduction to DevSecOps
Application Security Guide for Beginners
Threat modeling with architectural risk patterns
Using threat models to control project brief
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Introduction to DevSecOps

What's hot (20)

PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
Scalable threat modelling with risk patterns
PPTX
DevSecOps without DevOps is Just Security
PDF
CSS17: Houston - Introduction to Security in the Cloud
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PPTX
Application Security at DevOps Speed and Portfolio Scale
PDF
DevSecOps: Minimizing Risk, Improving Security
PPTX
The New Security Practitioner
PPTX
AppSec California 2016 - Making Security Agile
PPTX
DevSecOps : an Introduction
PPTX
Integrate Security into DevOps - SecDevOps
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
DevSecOps | DevOps Sec
PPTX
DevOps and the Future of Enterprise Security
PDF
The Web AppSec How-To: The Defender's Toolbox
PPTX
CSS17: Dallas - Thawing the Frozen Middle
PDF
CSS17: Houston - Protecting Web Apps
PDF
CSS17: Houston - Stories from the Security Operations Center
PPTX
Simplify Dev with Complicated Security Tools
PPTX
Ten Tenets of CISO Success
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Scalable threat modelling with risk patterns
DevSecOps without DevOps is Just Security
CSS17: Houston - Introduction to Security in the Cloud
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Application Security at DevOps Speed and Portfolio Scale
DevSecOps: Minimizing Risk, Improving Security
The New Security Practitioner
AppSec California 2016 - Making Security Agile
DevSecOps : an Introduction
Integrate Security into DevOps - SecDevOps
Bringing Security Testing to Development: How to Enable Developers to Act as ...
DevSecOps | DevOps Sec
DevOps and the Future of Enterprise Security
The Web AppSec How-To: The Defender's Toolbox
CSS17: Dallas - Thawing the Frozen Middle
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Stories from the Security Operations Center
Simplify Dev with Complicated Security Tools
Ten Tenets of CISO Success
Ad

Similar to Continuous compliance using data and code (20)

PDF
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
PPTX
Build a complete security operations and compliance program using a graph dat...
PDF
MBM A Risk Management Approach to HITECH Whitepaper
PPTX
DOC-20250530-WA0008.pptx.................
PPTX
Lets talk about soc2s, baby! BSidesLV 2021
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
Cloudsolutionday 2016: Compliance and cost controlling on AWS
PPTX
AWS Spotlight Series - Modernization and Security with AWS
PDF
Good-cyber-hygiene-at-scale-and-speed
PDF
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
PDF
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
PDF
Securing Healthcare Data on AWS for HIPAA
PPTX
Finding Security a Home in a DevOps World
PPTX
Finding-Security-A-Home-In-A-DevOps-World.pptx
PPT
Security Capability Model - InfoSec Forum VIII
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PPTX
Security on AWS
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Build a complete security operations and compliance program using a graph dat...
MBM A Risk Management Approach to HITECH Whitepaper
DOC-20250530-WA0008.pptx.................
Lets talk about soc2s, baby! BSidesLV 2021
Cybersecurity Frameworks and You: The Perfect Match
Cloudsolutionday 2016: Compliance and cost controlling on AWS
AWS Spotlight Series - Modernization and Security with AWS
Good-cyber-hygiene-at-scale-and-speed
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
Securing Healthcare Data on AWS for HIPAA
Finding Security a Home in a DevOps World
Finding-Security-A-Home-In-A-DevOps-World.pptx
Security Capability Model - InfoSec Forum VIII
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
DevSecCon Keynote
DevSecCon KeyNote London 2015
Security on AWS
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology

Continuous compliance using data and code

  • 1. Continuous Compliance via Data and Code ERKANG ZHENG Founder, JupiterOne | CISO, LifeOmic November 2019 © 2019 JupiterOne
  • 2. Pick assessor Perform gap assessment Implement remediation Collect evidences Assess and certify Documented data flows Conducted risk analysis Wrote policies and procedures Created infrastructure and security architecture diagrams REPEATMonitor, Manage, Optimize START Implemented 100+ controls Endpoint malware protection Server vulnerability scanning Production change management SSO + MFA Application code scanning + pen testing User training Configuration audit Endpoint compliance agents Vendor risk management Firewalls and security groups Data encryption WAF + DDoS protection Asset inventory and tagging Activity and log monitoring SEC COMP AUDITOR Our Security Program HIPAA SOC 2 FDA FedRAMP ...COMPLIANCE
  • 3. Now what? How? Is 100% visibility possible? “I don’t need more controls. I need to be able to effectively and efficiently manage and prove what I have.” “I need to full visibility so that I can make decisions faster, with confidence.”
  • 4. Steps to continuous compliance via code 1. Define compliance framework in JSON 2. Write policies and procedures in Markdown 3. Aggregate data from everywhere (infrastructure, controls, endpoints, users, training, code, etc.) to a single source of truth 4. Write queries to generate evidence from data 5. Map policies and evidence to compliance requirements Step 1 Step 2 Step 3 Step 4 Step 5
  • 5. Define Compliance Framework in JSON Step 1 { "standard": "HIPAA", "version": "2013", "webLink": "https://www.hhs.gov/hipaa/for-professionals/index.html", "sections": [ { "title": "Administrative Safeguards", "requirements": [ { "ref": "164.308(a)(1)(i)", "title": "Security management process", "summary": "Implement policies and procedures to prevent, detect, contain and correct security violations.", }, { "ref": "164.308(a)(1)(ii)(A)", "title": "Risk analysis", "summary": "Conduct an accurate and thorough assessment of the potential ......" }, ... ] }, { ... } ] } HIPAA example with sections and requirements HIPAA Example
  • 6. Define Compliance Framework in JSON Step 1 { "standard": "SOC 2 Security", "version": ”AICPA 2017", "webLink": "https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust- services-criteria.pdf", "domains": [ { "title": "Control Environment", "controls": [ { "ref": "CC1.1", "title": "COSO Principle 1", "summary": "The entity demonstrates a commitment to integrity and ethical values." }, { "ref": "CC1.1 (a)", "summary": "A code of conduct/employee manual are in place and approved by top management" }, ... ] }, { ... } ] } SOC 2 example with domains and controls SOC 2 Example
  • 7. Write Security Policy and Procedure Docs in Markdown • Written in Markdown • Small, individual files – “micro-docs” like micro-services • Linked together via config.json • Document reviews and approvals via PRs • Templatized and published in HTML Step 2 Policies Markdown { "id": "rar", "file": "policies/rar.md", "name": "Roles, Responsibilities and Training", "adopted": true, "procedures": [ "cp-role-assignment", "cp-training-policy", "cp-training-awareness", "cp-training-hipaa", "cp-internal-comms" ] }, config.json
  • 8. Publish to HTML Step 2 Policies HTML Site • Written in Markdown • Small, individual files – “micro-docs” like micro-services • Linked together via config.json • Document reviews and approvals via PRs • Templatized and published in HTML
  • 9. Build a single source of truth Aggregate data from • Cloud Service Providers (AWS, Azure, GCP) • Identity Providers (Okta, Azure AD / O365, G Suite) • Code Repos (Github, Bitbucket) • Issues and Ticketing (Jira) • User Awareness Training (KnowBe4) • Endpoint Agents (Carbon Black, Stethoscope) • Vulnerability Scanners (Inspector, Nessus) • Code Scanners (Snyk, Veracode) • Network Alert Findings (GuardDuty) • Pen Tests, Bug Bounty (HackerOne) • Risk Assessments (Manual) • Vendors (SAML SSO Apps, Manual) Step 3 DATA Cloud Service Providers (AWS, Azure, GCP) Identity Providers (Okta, Azure AD / O365, G Suite) Code Repos (Github, Bitbucket) Issues and Ticketing (Jira) User Awareness Training (KnowBe4) Endpoint Agents (Carbon Black, Stethoscope) Vulnerability Scanners (Inspector, Nessus) Code Scanners (Snyk, Veracode) Network Alert Findings (GuardDuty) Pen Tests, Bug Bounty (HackerOne) Risk Assessments (Manual) Vendors (SAML SSO Apps, Manual) Aggregate Data
  • 10. Step 3 Data Model
  • 11. Ask questions and get answers by data queries Step 4 - query: | Find DataStore with classification=('sensitive' or 'confidential' or 'critical') What is the inventory of my sensitive data stores? Query Data - query: | Find HostAgent with firewall='ON' as agent that (PROTECTS|MONITORS|MANAGES) (user_endpoint|workstation|laptop|desktop|computer) as device return device.displayName, device.owner, agent.firewall Are my end-user workstations protected by hosted-based firewall? - query: | Find (Person | Organization | Vendor) as assessor that performed Assessment with createdOn > date.now-1yr or updatedOn > date.now-1yr as assessment return assessor.name, assessment._type, assessment.name, assessment.summary, assessment.reportURL What security assessments have been done in the past year and who performed them?
  • 12. User queries to perform gap analysis Step 4 - name: good query: | Find DataStore with classification=('sensitive' or 'confidential' or 'critical’) - name: bad query: | Find DataStore with (classification='' or classification=undefined) and (production=true or tag.Production=true) - name: unknown query: | Find DataStore with (classification='' or classification=undefined) What is the inventory of my sensitive data stores? Query Gaps - name: good query: | Find DataStore with classification=('sensitive' or 'confidential' or 'critical’) and encrypted = true - name: bad query: | Find DataStore with classification=('sensitive' or 'confidential' or 'critical’) and encrypted != true Is my sensitive data encrypted?
  • 13. Map control procedures and evidence to compliance Step 5 Create Mappings [ { "id": "cp-role-assignment", "implements": [ { "standard": "HIPAA", "requirements": [ "164.308(a)(2)" ] }, { "standard": "PCI DSS", "requirements": [ "12.1", "12.3", "12.4", "12.5" ] }, { "standard": ”SOC 2 Security", ”controls": [ ... ] } ] }, ... Controls Mapping (policies/procedures) - id: managed-question-data-direct-access-to-phi title: Which user or group or network or host has access to data stores containing PHI/ePHI? description: ... queries: - query: | Find (User | UserGroup | Network | Host) as entity that allows DataStore with tag.PHI=true or tag.ePHI=true as ds return entity._type, entity.displayName, entity.email, ds._type, ds.displayName, ds.tag.AccountName tags: - data - SecOps - compliance - HIPAA compliance: - standard: default controls: - cp-access-phi - standard: HIPAA requirements: - 164.308(a)(3)(ii)(B) - 164.308(a)(4)(ii)(B) Evidence Mapping (questions/queries)
  • 15. DATA + GRAPH + QUERY Pick assessor Perform gap assessment Implement remediation Monitor, Manage, Optimize Collect evidences Assess and certify Documented data flows Conducted risk analysis Wrote policies and procedures Created infrastructure and security architecture diagrams REPEAT START Implemented 100+ controls Endpoint malware protection Server vulnerability scanning Production change management SSO + MFA Application code scanning + pen testing User training Configuration audit Endpoint compliance agents Vendor risk management Firewalls and security groups Data encryption WAF + DDoS protection Asset inventory and tagging Activity and log monitoring CSEC AUDITOR CA / CC VISIBILITY GOVERNANCE ASSURANCE Our Security Program HIPAA SOC 2 FDA FedRAMP ...COMPLIANCE
  • 16. Data Graph Query Asset inventory and CMDB Cloud configuration visibility Access analysis Network and application architecture diagrams Vulnerability management Alerts / monitoring Metrics reporting User training status Incident correlation Policy and procedure docs Vendor management Compliance evidence collection What else can you do? It’s not only about compliance. Additional use cases: • Asset inventory and CMDB • Cloud configuration visibility • Access analysis • Network and application architecture diagrams • Vulnerability management • Alerts / monitoring • Metrics reporting • User training status • Policies and procedures documentation • Vendor management • Compliance evidence collection
  • 17. S3 Bucket Access Are there non-public S3 bucket access granted to anybody outside of its account? Find aws_s3_bucket with classification!='public' as bucket that ALLOWS * as grantee where bucket.tag.AccountName != grantee.tag.AccountName return tree
  • 18. SSO Access Which Okta user is assigned what AWS IAM role? find okta_user that ASSIGNED aws_iam_role return tree
  • 19. Vulnerability in Code Which PRs / developer introduced new vulnerability findings this past week? Find User that OPENED PR with createdOn > date.now-7days that RELATES TO CodeRepo that HAS (Vulernability|Finding) with _createdOn > date.now-7days return tree
  • 20. Use query to create alerts and trigger remediation Alert rules from query with actions: • Send Email • Send Slack message • Create Jira issue • Capture Trend Future remediation automation: • Trigger Webhook • Invoke Lambda Function • etc.
  • 21. Metrics and charts built with queries Users and Access
  • 22. Knowledge is Power Knowledge = Information (data) + Insights (understanding of that data) The graph is now the core of our entire security program. A knowledgebase, a foundation that allows me to take actions with confidence, faster. GRAPH Asset inventory and CMDB Cloud configuration visibility Access analysis Network and application architecture diagrams Vulnerability management