SlideShare a Scribd company logo
LONDON 2015Join the conversation #devseccon
Public And Private Cloud
Metadata And Why It Is
Useful
Steven Armstrong
Who Am I And What Do I Do?
• Steven Armstrong
• Principal Automation
Engineer @Betfair
• I make invisible robots
• Working in configuration
management for 9 years
• DevOps practitioner
• Build continuous
integration and
deployment pipelines
• Automate everything,
always
Security Has Changed…
So Security Processes Need To
Evolve
DevOps Processes Should
Mean..
And Should Make PCI Easier
Current Situation With Some
Security Practitioners
Current Viewpoint Of Some IT
Staff
DevOps And Security
Practitioners Have A
Responsibility To Avoid
We Need To Help Avoid
And Move To This
How Cloud Metadata Can Help
Sort Information
Introducing Ansible To Help
Ansible Inventory File
Provision VMs or Physical
Servers tag with metadata
Ansible Dynamic Inventory
• Python dynamic inventory
file queries underlying
apis to act as a service
discovery tool
• Returns json inventory in
real time of cloud estate
• Filter machines based on
tags
• Carry out particular
operations on servers
using filters
•
•
ansible-playbook
–i openstack.py
–l riemann_qa
playbooks/run_chef.yml
•
All Cloud Providers Have
Metadata And Ansible Dynamic
Inventories
DevOps Use Case: Install
software on boxes
ansible-playbook
–i openstack.py
–l riemann_prod
playbooks/run_chef.yml
•
DevOps Use Case: Roll boxes off
load balancer at a particular version
and new boxes into service
ansible-playbook
–i openstack.py
–l riemann_prod
playbooks/loadbalancer.yml
•
Security Use Case: Assign
Servers To Teams or Owners
ansible-playbook
–i openstack.py
–l production
playbooks/email_owners.yml
•
Security Use Case: Tag Open
Vulnerabilities On Boxes
Security Use Case: Targeted
Patching or Updates Like Shellshock
ansible-playbook
–i openstack.py
–l production
playbooks/ad_hoc_patch.yml
•
Lots More Possibilities
Questions?
LONDON 2015Join the conversation #devseccon
Contact Info: steven.armstrong@betfair.com
Blog: http://www.devarmstrongops.blogspot.co.uk/
tweet: @Steve9Armstrong
!!!Come to our continuous delivery workshop later today
which will show Betfairs deployment pipeline and how
we have integrated security scanning into it!!!

More Related Content

PPTX
My slides from SharePoint Saturday Oslo
PDF
Tracing Java Applications on Azure
PPTX
Collab365 Global Summit Slides
PDF
How to adopt React for moving fast startup
PPTX
Deploying Kubernetes on AWS Using Terraform
PPTX
Signal r azurepresentation
PPTX
European SharePoint Conference - TH3
PPTX
MongoDB World 2018: Using Puppet, Ansible and Ops Manager to Create Your Own ...
My slides from SharePoint Saturday Oslo
Tracing Java Applications on Azure
Collab365 Global Summit Slides
How to adopt React for moving fast startup
Deploying Kubernetes on AWS Using Terraform
Signal r azurepresentation
European SharePoint Conference - TH3
MongoDB World 2018: Using Puppet, Ansible and Ops Manager to Create Your Own ...

What's hot (19)

PPTX
Session Slides from DEVintersection Europe
PPTX
My session slides from unityConnect 2016 in Haarlem
PDF
When Our Serverless Team Chooses Containers
PPTX
Monitor Azure Kubernetes Cluster With Prometheus by Mamta Jha
PPTX
The Future of Enterprise Applications is Serverless
PDF
AWS for web developers
PPTX
Session Slides from DEVintersection Europe
PPTX
Netflix s2e1lightningtalk
PDF
Modern application delivery with Consul
PPTX
CREATING REAL TIME DASHBOARD WITH BLAZOR, AZURE FUNCTION COSMOS DB AN AZURE S...
PDF
Sustainable software development / Jätkusuutlik tarkvaraarendus
PPTX
From AIX to Zero-ops by Pierre Baillet
PDF
Zero Latency: Building a Telemetry Platform on the Elastic Stack
PDF
Building Cloud-agnostic Serverless APIs
PDF
FMEWT17 Getting Satrted FME 2017 (Ken)
PDF
Migrating .NET and .NET Core to Pivotal Cloud Foundry (1/2)
PPTX
Keynote TIAD Camp Serverless
PPTX
Leveraging Akamai to Make Your Cloud Transformation Initiatives Successful
PPTX
NodeTime Tool Review
Session Slides from DEVintersection Europe
My session slides from unityConnect 2016 in Haarlem
When Our Serverless Team Chooses Containers
Monitor Azure Kubernetes Cluster With Prometheus by Mamta Jha
The Future of Enterprise Applications is Serverless
AWS for web developers
Session Slides from DEVintersection Europe
Netflix s2e1lightningtalk
Modern application delivery with Consul
CREATING REAL TIME DASHBOARD WITH BLAZOR, AZURE FUNCTION COSMOS DB AN AZURE S...
Sustainable software development / Jätkusuutlik tarkvaraarendus
From AIX to Zero-ops by Pierre Baillet
Zero Latency: Building a Telemetry Platform on the Elastic Stack
Building Cloud-agnostic Serverless APIs
FMEWT17 Getting Satrted FME 2017 (Ken)
Migrating .NET and .NET Core to Pivotal Cloud Foundry (1/2)
Keynote TIAD Camp Serverless
Leveraging Akamai to Make Your Cloud Transformation Initiatives Successful
NodeTime Tool Review
Ad

Viewers also liked (10)

PPTX
An experiment in agile threat modelling
ODP
Public and private cloud metadata and why it is useful
PPTX
Using Excel in project management
PDF
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
POTX
Tao of security science
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PPTX
Alfredo Reino - Monitoring aws and azure
ODP
Simon Bennetts - Automating ZAP
PDF
Renato Rodrigues - Security in the wild
PDF
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
An experiment in agile threat modelling
Public and private cloud metadata and why it is useful
Using Excel in project management
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
Tao of security science
Stephen Sadowski - Securely automating infrastructure in the cloud
Alfredo Reino - Monitoring aws and azure
Simon Bennetts - Automating ZAP
Renato Rodrigues - Security in the wild
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
Ad

Similar to Public and private cloud metadata and why it is useful (20)

PDF
DevSecOps - Background, Status and Future Challenges
PPTX
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
PDF
Cloud - NDT - Presentation
PPTX
Deploying On-Prem as SaaS: Why we go with Ansible
PDF
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
PDF
DevSecOps: What Why and How : Blackhat 2019
PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
PDF
The State of DevSecOps
PDF
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
PPTX
State of DevSecOps - DevSecOpsDays 2019
PDF
Building private-clouds-qconsf
PPTX
Introduction to DevSecOps
PPTX
State of DevSecOps - GTACS 2019
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PDF
The Future of DevSecOps
PPTX
2016 quali continuous testing quest for quality conference
PPTX
How to Get Started with DevSecOps
PDF
4 approaches to integrate dev secops in development cycle
PPTX
Cloud basics for pen testers, red teamers, and defenders
PPT
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
DevSecOps - Background, Status and Future Challenges
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Cloud - NDT - Presentation
Deploying On-Prem as SaaS: Why we go with Ansible
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: What Why and How : Blackhat 2019
State of DevSecOps - DevOpsDays Jakarta 2019
The State of DevSecOps
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
State of DevSecOps - DevSecOpsDays 2019
Building private-clouds-qconsf
Introduction to DevSecOps
State of DevSecOps - GTACS 2019
talk6securingcloudamarprusty-191030091632.pptx
The Future of DevSecOps
2016 quali continuous testing quest for quality conference
How to Get Started with DevSecOps
4 approaches to integrate dev secops in development cycle
Cloud basics for pen testers, red teamers, and defenders
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime

More from DevSecCon (20)

PDF
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
PDF
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
PDF
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
PDF
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
PPTX
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
PPTX
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
PPTX
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
PPTX
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
PDF
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
PPTX
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
PDF
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
PDF
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
PDF
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
PDF
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
PDF
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
PDF
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
PDF
DevSecCon Singapore 2019: Preventative Security for Kubernetes
PPTX
DevSecCon London 2018: Is your supply chain your achille's heel
PPTX
DevSecCon London 2018: Get rid of these TLS certificates
PDF
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Open DevSecOps

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Public and private cloud metadata and why it is useful