SlideShare a Scribd company logo
Making Security Approachable for
Developers and Operators
Armon Dadgar
Co-Founder and CTO, HashiCorp
@armon
PROVISION, SECURE AND RUN ANY INFRASTRUCTURE
Nomad Consul
Vault
Vagrant Packer Terraform
Consul Enterprise
Terraform Enterprise
Vault Enterprise
PRODUCT SUITEOSS TOOL SUITE
RUN
Applications
SECURE
Application Infrastructure
PROVISION
Infrastructure
FOR INDIVIDUALS FOR TEAMS
Nomad Enterprise
Goal:
Make Security Approachable
Developer
“Security is approachable! I don’t think about it!”
Narrator: We want to make security approachable for our developers…
Security Mindset
Start with Security Model
Simplifying Assumptions
Transparent to developers
Making Security Approachable for Developers and Operators
Castle & Moat Security
Network Perimeter Based
Traffic over ingress/egress filtered
Network middleware heavy
Firewalls, WAFs, SIEMs, etc.
Castle & Moat Mentality
Outside is adversarial and low trust
Inside is vetted and high trust
Network provides confidentiality and integrity
Division of Labor
Security Teams
Network Teams
Operation Teams
Developer Teams
Security Teams
Responsible for Policies and Rules
Firewall rules govern traffic flows
IP-based, millions of rules
Network Teams
Responsible for network topology
Must constrain traffic through middleware
Zone A Zone B
Operations Teams
Responsible for infrastructure and application
deployment
Must deploy to correct zone
Developer Teams
Responsible for application development
Security imposed at the network layer
What’s wrong?
Castle & Moat Model
Simplifying abstraction, not perfect
Make assumptions, which allow us to omit concerns
Consider: Insiders
Assumption: Insiders (employees, contractors, etc) are
all trustworthy and have good intent.
Real World: Insiders are not universally trustworthy,
and a major source of breaches and data exfiltration.
Insiders also subject fo phishing, malware, social
engineering, etc.
Consider: Network Integrity
Assumption: Network Perimeter is effective and lets
us assert an external low trust and internal high trust.
Real World: Perimeter is porous. Workstations and
mobile devices are connected via VPNs and corporate
fabrics. Software bugs lead to remote code execution
or attackers on box.
Castle & Moat in Practice
Real world does not match our assumptions
Assumptions were good enough for a while
Larger, more complex networks today
All-or-nothing vs defense-in-depth
Alternate Security Models
Zero Trust Model
Perimeter is 80% effective, not 100%
Do not trust the private network (or insiders)
Breaks our assumptions and approach
Demands more of applications
Secret Management
Secrets are sprawled everywhere in plaintext
Limited AuthN, AuthZ, and Audit of access
Zero Trust requires better hygiene
Centralized, Encrypted, Tightly Controlled
Applications need secrets!
Data Protection
Sensitive data written in plaintext to storage
Databases might use Transparent Disk Encrypt (TDE)
Protects against stealing a disk drive
Does not protect “SELECT * FROM CUSTOMERS”
Data Protection
Encrypt Data
Store Encrypt Data
Key Management
Crypto APIs
Databases
Data Warehouse
Application
Data Protection
Two factor compromise required
Keys cannot be exported or exfiltrated
Requires decryption to be done online
Strictly better than Transparent Disk Encryption
Traffic AuthN / AuthZ
Applications assumed network integrity / confidentiality
Not safe in Zero Trust model
Need caller identity (AuthN)
Need explicit caller authorization (AuthZ)
Applications network traffic must be encrypted for
confidentiality
Application Concerns
Existing Concerns
SQL Injection
XSS
User Passwords
Session Management
Access Controls
Application Concerns
Existing Concerns
SQL Injection
XSS
User Passwords
Session Management
Access Controls
New Concerns
Secret Management
Data Protection
AuthN / AuthZ of RPCs
Traffic Encryption
Complexity of Security
Security is a deep and broad domain
Not very accessible to beginners
Language makes heavy use of jargon
Java 7: Cipher Class Documentation:
Java Documentation
What is a block cipher?
What is padding and why does it matter?
What is AEAD / Authenticated Encryption with Associated
Data?
What are modes? GCM, CBC, CCM, ECB?
What is an IV? How is it related to a nonce?
…
Approachable Security
Path Forward
Not reasonable to make developers security experts
Externalization of concerns
Specialization of labor
Practitioner Education
Splitting the Problems
Platform Layer
Application Middleware
Frameworks
Application Logic
Broad Reach
Limited Reach
Platform Layer
Platforms like K8S, Nomad, etc
Lowest layer, and broadest reach
Secret management
AuthN / AuthZ of service traffic
Platform Layer
Platform Layer
ApplicationTraffic Proxy
Secrets
Isolated Namespace
Plaintext

Traffic
Plaintext

Secrets
Fetch Secrets
Authenticated

Authorized
Encrypted
Traffic
(Mutual TLS)
Application Middleware
Tools like HashiCorp Vault, Auth0, AWS KMS
Services with APIs
Key Management, Crypto APIs, User Passwords,
Data Protection
Vault for Cryptographic Offload
“Transit” backend, key management / crypto API
Define a named key
API for high level operations (encrypt, decrypt, random
bytes, etc)
Simple REST call
No knowledge of AES, GCM, IVs, etc. needed
Frameworks
Opinionated Frameworks (Rails, Django, etc)
Guard against common application logic issues
XSS, SQL Injection, Session Management, Access
Controls
Application Logic
Always vulnerable to logic bugs
Avoid re-inventing the wheel when possible
Consume APIs (middleware) and Libraries
(frameworks)
Safe languages to many classes of issues
Division of Labor
Security Teams
Network Teams
Operation Teams
Developer Teams
Security Teams
Responsible for Policies and Rules
Logical Service Rules (not Firewall Rules)
“Web Server to Database” not “IP1 to IP2”
Thousands vs Millions of Rules
Network Teams
Responsible for network topology
Traffic not constrained through middleware
Applications not assuming networking integrity
Operations Teams
Responsible for infrastructure and application
deployment
Provide facilities for secret management, data
protection, traffic filtering on endpoints
Developer Teams
Responsible for application development
Leverage frameworks, security middleware, and
platform features
Understand the threat model
Concerns externalized but not transparent
Practitioner Education
Specialization of labor
T-Shaped Specialists
Security language needs to be accessible
Teaching Security
Motivate the problems.
Mandate: Encrypt your data
Prompt: Consider if an attacker can reach the
database
Simple explanations
Descriptive power vs precision
Conclusion
Traditional Security
Castle & Moat / Perimeter Based
Based on simplifying assumptions that are wrong
Allowed developers to ignore many security concerns
Zero Trust
Zero Trust acknowledges perimeter is 80% effective
Network does not provide integrity or confidentiality
Requires secret management, data protection, service
segmentation
Growing Application Concerns
Developers already have many concerns (XSS, SQL
Inject, etc)
Lack of network trust adds even more to their plate
Impractical to assume deep security expertise
Involving and Scaling Developers
Security Aware / T-Shaped Practitioners
Zero Trust embedded into the Platform
Externalize to Frameworks, Services, and Platforms
Specialization of Labor
Practitioner-oriented education
Thanks!
Twitter: @armon
https://hashicorp.com

More Related Content

PDF
Consul: Service Mesh for Microservices
PPTX
Api service mesh and microservice tooling
PDF
Consul Connect - EPAM SEC - 22nd september 2018
PPTX
Building a scalable microservice architecture with envoy, kubernetes and istio
PDF
Stop reinventing the wheel with Istio by Mete Atamel (Google)
PPTX
ISTIO Deep Dive
PDF
Consul 1.6: Layer 7 Traffic Management and Mesh Gateways
PDF
Istio service mesh introduction
Consul: Service Mesh for Microservices
Api service mesh and microservice tooling
Consul Connect - EPAM SEC - 22nd september 2018
Building a scalable microservice architecture with envoy, kubernetes and istio
Stop reinventing the wheel with Istio by Mete Atamel (Google)
ISTIO Deep Dive
Consul 1.6: Layer 7 Traffic Management and Mesh Gateways
Istio service mesh introduction

What's hot (20)

PDF
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
PPTX
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
PPTX
Microservices With Istio Service Mesh
PPTX
The Internet of things for integration people - UKCSUG - public version
PPTX
Service mesh in action with onap
PDF
Understanding the New Enterprise Multi-Cloud Backbone for DevOps Engineers
PDF
Comparison of Current Service Mesh Architectures
PPTX
Microservice Pattern Launguage
PDF
Protecting Web Services from DDOS Attack
PDF
Istio Service Mesh
PDF
How to integration DataPower with Zos
PPTX
Navigating the service mesh landscape with Istio, Consul Connect, and Linkerd
PPTX
API Gateway - OFM Canberra October 2014
PPTX
Service Discovery with Consul
PPTX
Linkerd – Service mesh with service Discovery backend
PPTX
Webservice security considerations and measures
PPTX
DevDay: Developer Updates: Visual Studio Code, Java 11 and OpenAPI (oh my), L...
 
PDF
Istio: Using nginMesh as the service proxy
PDF
Layer 7 Observability and Centralized Configuration with Consul Service Mesh
PPTX
Istio a service mesh
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
Microservices With Istio Service Mesh
The Internet of things for integration people - UKCSUG - public version
Service mesh in action with onap
Understanding the New Enterprise Multi-Cloud Backbone for DevOps Engineers
Comparison of Current Service Mesh Architectures
Microservice Pattern Launguage
Protecting Web Services from DDOS Attack
Istio Service Mesh
How to integration DataPower with Zos
Navigating the service mesh landscape with Istio, Consul Connect, and Linkerd
API Gateway - OFM Canberra October 2014
Service Discovery with Consul
Linkerd – Service mesh with service Discovery backend
Webservice security considerations and measures
DevDay: Developer Updates: Visual Studio Code, Java 11 and OpenAPI (oh my), L...
 
Istio: Using nginMesh as the service proxy
Layer 7 Observability and Centralized Configuration with Consul Service Mesh
Istio a service mesh
Ad

Similar to Making Security Approachable for Developers and Operators (20)

PPTX
Automating your AWS Security Operations
PDF
Eximbank security presentation
PPTX
Enterprise Cloud Security - Concepts Mash-up
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
PPTX
Oracle Security Overview from Cloud World 2022
PDF
Cyber tooth briefing
PPTX
Azure Fundamentals Part 3
 
PDF
Security in the cloud protecting your cloud apps
PPTX
00. introduction to app sec v3
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPT
Information Security
PDF
CYBER SECURITY CAREER GUIDE CHEAT SHEET
PPT
Ecommerce Security
PDF
zero trust - how to build zero trust.pdf
PPT
Developing Secure Applications and Defending Against Common Attacks
PDF
Company_Profile_Updated_17032016
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PPTX
zerotrustmodelpresentation-200107094517.pptx
PPT
Oracle UCM Security: Challenges and Best Practices
Automating your AWS Security Operations
Eximbank security presentation
Enterprise Cloud Security - Concepts Mash-up
Corporate Security Issues and countering them using Unified Threat Management...
Oracle Security Overview from Cloud World 2022
Cyber tooth briefing
Azure Fundamentals Part 3
 
Security in the cloud protecting your cloud apps
00. introduction to app sec v3
microsoft-cybersecurity-reference-architectures (1).pptx
Information Security
CYBER SECURITY CAREER GUIDE CHEAT SHEET
Ecommerce Security
zero trust - how to build zero trust.pdf
Developing Secure Applications and Defending Against Common Attacks
Company_Profile_Updated_17032016
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
zerotrustmodelpresentation-200107094517.pptx
Oracle UCM Security: Challenges and Best Practices
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Making Security Approachable for Developers and Operators