Trevor Vaughan, Onyx Point
X
Trevor Vaughan, Onyx Point
X
Trevor Vaughan
VP Engineering, Onyx Point
SIMP Product Lead
B.S. Comp Eng, M. S. IA
RHCE, PCP, PCD
One Year in Open Source
All trademarks are property of their respective owners. All company, product and service names used in this presentation are for identification purposes
only. Use of these names, logos, and brands does not imply endorsement.
Trevor Vaughan, Onyx Point
X
Trevor Vaughan, Onyx Point
X
The presentation that you are about to see is not, in any
way, representative of, or endorsed by, the National
Security Agency or the Government of the United States
of America. As stated in their press release, the NSA, in
releasing the code to the public, is attempting to reduce
any duplication of effort surrounding the general goals of
the SIMP project.
Disclaimer
Trevor Vaughan, Onyx Point
X
About Onyx Point, Inc.
● Consulting and Federal Contracting Since 2009
○ DevOps
○ Infrastructure Automation
○ Security Compliance
● Community Maintainers of
○ First FOSS Stewardship CRADA with the NSA
● Red Hat Partners
● Puppet Service Provider Gold Partners
● Puppet-Certified Trainers
Trevor Vaughan, Onyx Point
X
WHAT IS
YOUR
STUFF
OUR
EXPERTISE
Trevor Vaughan, Onyx Point
X
SIMP Stack
Trevor Vaughan, Onyx Point
X
Goals
● 100% FOSS Core
● Full Scope Red Hat/CentOS Systems Management
○ Puppet for Automation
○ Does not preclude other systems
● Reduce Complexity of Technical Compliance
● Focus on Mission and Business
○ Enhance Security and Compliance
○ Understand Your Environment
● Leverage and Enhance the Open Source Community
Trevor Vaughan, Onyx Point
X
ONE YEAR
FOSSCOMPLIANCE
AUTOMATION1 MAY 2015 - PRESENT
OF
Trevor Vaughan, Onyx Point
X
Trevor Vaughan, Onyx Point
X
TESTING
Trevor Vaughan, Onyx Point
X
Test Coverage
Type # Modules # Tests OS OS Version Total
Rspec (Unit) 88 6,472
RHEL
CentOS
6.8
7.2
2,278,144
Beaker (Acceptance) 43 1,989
RHEL
CentOS
6.8
7.2
342,108
~30 OS Bugs Discovered
● Rsyslog Encryption
● ‘i_version’ Kernel Panic
● Kickstart ‘curl’ FIPS Fail
● ‘krb5kdc’ SELinux Policy Issues
● Auditd Syscall Translation
● ‘cancel-path’ for Libvirt
● GDM Fail with ‘noexec /var/tmp’
● ‘Systemctl’ Returns 0 on Mask
Trevor Vaughan, Onyx Point
X
Multi-Node Acceptance Tests
rsyslog/spec/acceptance/
├── class_spec.rb
├── client_server_no_tls_spec.rb
├── client_server_udp_spec.rb
├── client_server_using_tls_spec.rb
├── failover_no_tls_spec.rb
├── failover_using_tls_spec.rb
└── nodesets
└── default.yml
Trevor Vaughan, Onyx Point
X
Test Suites
nfs/spec/acceptance/
├── nodesets
│ └── default.yml
└── suites
├── default
│ ├── 00_basic_test_spec.rb
│ ├── 02_krb5_test_spec.rb
│ └── nodesets -> ../../nodesets
└── stunnel
├── 00_basic_test_spec.rb
├── 03_stunnel_test_spec.rb
├── metadata.yml
└── nodesets -> ../../nodesets
Trevor Vaughan, Onyx Point
X
COMPLIANCE
MAPPER
Trevor Vaughan, Onyx Point
X
Trevor Vaughan, Onyx Point
X
700+
Variables Mapped
NIST 800-53
NIST 800-171
DISA STIG
ISO/IEC 27001
Trevor Vaughan, Onyx Point
X
Trevor Vaughan, Onyx Point
X
A Glimpse of the Future
---
version: "1.0.0"
compliance_profiles:
test_profile:
compliant:
"Class[Test2::Test3]":
parameters:
arg3_1:
Identifiers: [“ID1.2”]
compliant_value: foo3_1
system_value: foo3_1
non_compliant: {}
documented_missing_resources:
- unmapped1
- "unmapped1::subclass"
documented_missing_parameters:
- "test2::test3::ref_miss1"
Trevor Vaughan, Onyx Point
X
SecCONOP
Trevor Vaughan, Onyx Point
X
NIST Special Publication 800-137
Trevor Vaughan, Onyx Point
X
SecCONOP
● Completely Updated
● A Kickstart Toward Certification and Accreditation
● Built-in NIST 800-53 References
● Designed for Flexibility
○ Provide your own updates in the build
● Currently 49 pages
● http://simp.readthedocs.io/en/5.2.0-0/security_conop
Trevor Vaughan, Onyx Point
X
1.2
IMA
+ TPM
Trevor Vaughan, Onyx Point
X
Integrity Management Architecture (IMA)
● Automated!
○ https://github.com/simp/pupmod-simp-tpm
● Tested!
● Not Recommended for Production!
○ Unable to Restrict Memory Usage
○ Unable to Update Policy Without Reboot
○ Some Issues with DoS via Valid Policies
Trevor Vaughan, Onyx Point
X
Trusted Platform Module (TPM) 1.2
● Integrated
○ https://github.com/simp/pupmod-simp-tpm
● Ownership Automated
● Facter Facts Created
● In Progress
○ Trusted Boot
○ PKCS11 Interface Automation
Trevor Vaughan, Onyx Point
X
IPSEC
Trevor Vaughan, Onyx Point
X
Libreswan
● Integrated for EL7
● Feature Request in for RHS ‘any’
● Goal
○ Full X.509-based Opportunistic IPSec
○ Everything except DNS and Puppet
Trevor Vaughan, Onyx Point
X
ELG
Trevor Vaughan, Onyx Point
X
ELG
● Completely Updated
● Same Basic Architecture
● Replaced Kibana With Grafana
○ Multi-Tenant Support
○ LDAP Support
○ Safer Default Usage
● SIMP Dashboards in Progress!
Trevor Vaughan, Onyx Point
X
LESSONS
LEARNED
Trevor Vaughan, Onyx Point
X
GOVERNMENT
+ OPEN SOURCE
Trevor Vaughan, Onyx Point
X
Contracts
Contracts
Trevor Vaughan, Onyx Point
X
GOVERNMENT
+ OPEN SOURCE
Trevor Vaughan, Onyx Point
X
COMMUNITY
EXPECTATIONS
(2015 © NBC)
Trevor Vaughan, Onyx Point
X
Our Expectations
(2007 © Warner Brothers)
Trevor Vaughan, Onyx Point
X
Reality
(2001 © New Line Cinema)
Trevor Vaughan, Onyx Point
X
Experiences
(1965 © DC Comics)
● Many environments stuck on one-time apply
● “Will this help me DevOps?!”
● Technology is not the problem
○ Undertrained and Understaffed
■ “How do I ‘vi’ a file?” - Senior Administrator
Trevor Vaughan, Onyx Point
X
Seriously...
(1999 © 20th Century Fox)
Trevor Vaughan, Onyx Point
X
TESTING
A TALE OF WOE
+ SORROW
Trevor Vaughan, Onyx Point
X
What Worked
● All Tests Must Be Able to Be Run by Hand
○ ‘rake spec’, ‘rake beaker:suites’, etc…
○ The ‘travish’ Ruby gem is very useful here
Trevor Vaughan, Onyx Point
X
What Worked
● Beaker + Vagrant
○ Docker was erratic on different systems
■ Aufs + Docker == /var death
○ Can’t test FIPS and non-FIPS in Docker
○ Can’t validate external protections (IPTables, etc…) in Docker
Trevor Vaughan, Onyx Point
X
What Didn’t Work
Trevor Vaughan, Onyx Point
X
Where We’re Heading
Trevor Vaughan, Onyx Point
X
FUTURE
THE
(1985 © Universal Studios)
Trevor Vaughan, Onyx Point
X
Upcoming Features
● TPM
○ Automated Trusted Boot
○ Credential Protection
○ PKCS11
■ Hook in Everything!
● IPSec
○ Opportunistic IPSec
■ X.509 is the Target
● Hashicorp Vault
○ Secret Storage
○ Good for HIPAA...and TPMs?
● Compliance Mapper 1.0
○ Report on compliant and
non-compliant entries
○ Less code modification
Trevor Vaughan, Onyx Point
X
Upcoming Features
● FreeIPA
○ Easier Management
● Seamless Puppet Enterprise
● Puppet AIO
○ Puppet 3 EOL - Dec 31, 2016
● Fapolicyd
○ Thanks to Steve Grubb!
● OpenSCAP Suites
○ Targeted Tests in Modules
● Full Stack KRB5 Integration
○ PAM
○ SSH
● Immediate Remediation
○ Based on last Puppet
Catalog
Trevor Vaughan, Onyx Point
X
LESSONS
LEARNED
Trevor Vaughan- VP
Engineering, Onyx Point
tvaughan@onyxpoint.com
@peiriannydd

More Related Content

PDF
PuppetConf 2016: Automating Datastore Fleets with Puppet – Joseph Lynch, Yelp
PPT
Spil Games @ FOSDEM: Galera Replicator IRL
PDF
PuppetConf 2016: Writing Custom Types to Manage Web-Based Applications – Tim ...
PDF
PuppetConf 2016: How You Actually Get Hacked – Ben Hughes, Etsy
PDF
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PDF
Cisco Automation with Puppet and onePK - PuppetConf 2013
PDF
James Brew Experience Highlights
PDF
DevTernity - DevOps with smell
PuppetConf 2016: Automating Datastore Fleets with Puppet – Joseph Lynch, Yelp
Spil Games @ FOSDEM: Galera Replicator IRL
PuppetConf 2016: Writing Custom Types to Manage Web-Based Applications – Tim ...
PuppetConf 2016: How You Actually Get Hacked – Ben Hughes, Etsy
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
Cisco Automation with Puppet and onePK - PuppetConf 2013
James Brew Experience Highlights
DevTernity - DevOps with smell

Similar to PuppetConf 2016: A Year in Open Source: Automated Compliance With Puppet – Trevor Vaughan, Onyx Point, Inc. (20)

PDF
Dev ops with smell v1.2
PDF
The Return of the Dull Stack Engineer
PDF
Neighborly nagios
PDF
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
PDF
Open Source Monitoring in 2019
PDF
It's Time to Debloat the Cloud with Unikraft
PDF
Cocktail of Environments. How to Mix Test and Development Environments and St...
PDF
Canary Analyze All the Things
PDF
Kubernetes Native Java and Eclipse MicroProfile | EclipseCon Europe 2019
PDF
Kubernetes Native Java and Eclipse MicroProfile | EclipseCon Europe 2019
PDF
DoS and DDoS mitigations with eBPF, XDP and DPDK
ODP
Continuous Delivery of (y)our infrastructure.
PDF
Continuous Infrastructure First
PDF
What is a Service Mesh and what can it do for your Microservices
PDF
Moby is killing your devops efforts
PPTX
Running Rancher and Docker on Dev Machines - Rancher Online Meetup - May 2016
PDF
OpenStack Ottawa MeetUp - April 3rd 2018
PDF
SDN - Openflow + OpenVSwitch + Quantum
PDF
twMVC#44 如何測試與保護你的 web application with playwright
PDF
Get your instance by name integration of nova, neutron and designate
Dev ops with smell v1.2
The Return of the Dull Stack Engineer
Neighborly nagios
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
Open Source Monitoring in 2019
It's Time to Debloat the Cloud with Unikraft
Cocktail of Environments. How to Mix Test and Development Environments and St...
Canary Analyze All the Things
Kubernetes Native Java and Eclipse MicroProfile | EclipseCon Europe 2019
Kubernetes Native Java and Eclipse MicroProfile | EclipseCon Europe 2019
DoS and DDoS mitigations with eBPF, XDP and DPDK
Continuous Delivery of (y)our infrastructure.
Continuous Infrastructure First
What is a Service Mesh and what can it do for your Microservices
Moby is killing your devops efforts
Running Rancher and Docker on Dev Machines - Rancher Online Meetup - May 2016
OpenStack Ottawa MeetUp - April 3rd 2018
SDN - Openflow + OpenVSwitch + Quantum
twMVC#44 如何測試與保護你的 web application with playwright
Get your instance by name integration of nova, neutron and designate
Ad

More from Puppet (20)

PPTX
Puppet Community Day: Planning the Future Together
PPTX
The Evolution of Puppet: Key Changes and Modernization Tips
PPTX
Can You Help Me Upgrade to Puppet 8? Tips, Tools & Best Practices for Your Up...
PPTX
Bolt Dynamic Inventory: Making Puppet Easier
PPTX
Customizing Reporting with the Puppet Report Processor
PPTX
Puppet at ConfigMgmtCamp 2025 Sponsor Deck
PPTX
The State of Puppet in 2025: A Presentation from Developer Relations Lead Dav...
PPTX
Let Red be Red and Green be Green: The Automated Workflow Restarter in GitHub...
PDF
Puppet camp2021 testing modules and controlrepo
PPTX
Puppetcamp r10kyaml
PDF
2021 04-15 operational verification (with notes)
PPTX
Puppet camp vscode
PDF
Modules of the twenties
PDF
Applying Roles and Profiles method to compliance code
PPTX
KGI compliance as-code approach
PDF
Enforce compliance policy with model-driven automation
PDF
Keynote: Puppet camp compliance
PPTX
Automating it management with Puppet + ServiceNow
PPTX
Puppet: The best way to harden Windows
PPTX
Simplified Patch Management with Puppet - Oct. 2020
Puppet Community Day: Planning the Future Together
The Evolution of Puppet: Key Changes and Modernization Tips
Can You Help Me Upgrade to Puppet 8? Tips, Tools & Best Practices for Your Up...
Bolt Dynamic Inventory: Making Puppet Easier
Customizing Reporting with the Puppet Report Processor
Puppet at ConfigMgmtCamp 2025 Sponsor Deck
The State of Puppet in 2025: A Presentation from Developer Relations Lead Dav...
Let Red be Red and Green be Green: The Automated Workflow Restarter in GitHub...
Puppet camp2021 testing modules and controlrepo
Puppetcamp r10kyaml
2021 04-15 operational verification (with notes)
Puppet camp vscode
Modules of the twenties
Applying Roles and Profiles method to compliance code
KGI compliance as-code approach
Enforce compliance policy with model-driven automation
Keynote: Puppet camp compliance
Automating it management with Puppet + ServiceNow
Puppet: The best way to harden Windows
Simplified Patch Management with Puppet - Oct. 2020
Ad

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Architecture types and enterprise applications.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Configure Apache Mutual Authentication
DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Five Habits of High-Impact Board Members
PPT
What is a Computer? Input Devices /output devices
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
sustainability-14-14877-v2.pddhzftheheeeee
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Microsoft Excel 365/2024 Beginner's training
Architecture types and enterprise applications.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Configure Apache Mutual Authentication
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
Flame analysis and combustion estimation using large language and vision assi...
Abstractive summarization using multilingual text-to-text transfer transforme...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
Five Habits of High-Impact Board Members
What is a Computer? Input Devices /output devices
sbt 2.0: go big (Scala Days 2025 edition)
sustainability-14-14877-v2.pddhzftheheeeee

PuppetConf 2016: A Year in Open Source: Automated Compliance With Puppet – Trevor Vaughan, Onyx Point, Inc.

  • 1. Trevor Vaughan, Onyx Point X Trevor Vaughan, Onyx Point X Trevor Vaughan VP Engineering, Onyx Point SIMP Product Lead B.S. Comp Eng, M. S. IA RHCE, PCP, PCD One Year in Open Source All trademarks are property of their respective owners. All company, product and service names used in this presentation are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.
  • 2. Trevor Vaughan, Onyx Point X Trevor Vaughan, Onyx Point X The presentation that you are about to see is not, in any way, representative of, or endorsed by, the National Security Agency or the Government of the United States of America. As stated in their press release, the NSA, in releasing the code to the public, is attempting to reduce any duplication of effort surrounding the general goals of the SIMP project. Disclaimer
  • 3. Trevor Vaughan, Onyx Point X About Onyx Point, Inc. ● Consulting and Federal Contracting Since 2009 ○ DevOps ○ Infrastructure Automation ○ Security Compliance ● Community Maintainers of ○ First FOSS Stewardship CRADA with the NSA ● Red Hat Partners ● Puppet Service Provider Gold Partners ● Puppet-Certified Trainers
  • 4. Trevor Vaughan, Onyx Point X WHAT IS YOUR STUFF OUR EXPERTISE
  • 5. Trevor Vaughan, Onyx Point X SIMP Stack
  • 6. Trevor Vaughan, Onyx Point X Goals ● 100% FOSS Core ● Full Scope Red Hat/CentOS Systems Management ○ Puppet for Automation ○ Does not preclude other systems ● Reduce Complexity of Technical Compliance ● Focus on Mission and Business ○ Enhance Security and Compliance ○ Understand Your Environment ● Leverage and Enhance the Open Source Community
  • 7. Trevor Vaughan, Onyx Point X ONE YEAR FOSSCOMPLIANCE AUTOMATION1 MAY 2015 - PRESENT OF
  • 9. Trevor Vaughan, Onyx Point X TESTING
  • 10. Trevor Vaughan, Onyx Point X Test Coverage Type # Modules # Tests OS OS Version Total Rspec (Unit) 88 6,472 RHEL CentOS 6.8 7.2 2,278,144 Beaker (Acceptance) 43 1,989 RHEL CentOS 6.8 7.2 342,108 ~30 OS Bugs Discovered ● Rsyslog Encryption ● ‘i_version’ Kernel Panic ● Kickstart ‘curl’ FIPS Fail ● ‘krb5kdc’ SELinux Policy Issues ● Auditd Syscall Translation ● ‘cancel-path’ for Libvirt ● GDM Fail with ‘noexec /var/tmp’ ● ‘Systemctl’ Returns 0 on Mask
  • 11. Trevor Vaughan, Onyx Point X Multi-Node Acceptance Tests rsyslog/spec/acceptance/ ├── class_spec.rb ├── client_server_no_tls_spec.rb ├── client_server_udp_spec.rb ├── client_server_using_tls_spec.rb ├── failover_no_tls_spec.rb ├── failover_using_tls_spec.rb └── nodesets └── default.yml
  • 12. Trevor Vaughan, Onyx Point X Test Suites nfs/spec/acceptance/ ├── nodesets │ └── default.yml └── suites ├── default │ ├── 00_basic_test_spec.rb │ ├── 02_krb5_test_spec.rb │ └── nodesets -> ../../nodesets └── stunnel ├── 00_basic_test_spec.rb ├── 03_stunnel_test_spec.rb ├── metadata.yml └── nodesets -> ../../nodesets
  • 13. Trevor Vaughan, Onyx Point X COMPLIANCE MAPPER
  • 15. Trevor Vaughan, Onyx Point X 700+ Variables Mapped NIST 800-53 NIST 800-171 DISA STIG ISO/IEC 27001
  • 17. Trevor Vaughan, Onyx Point X A Glimpse of the Future --- version: "1.0.0" compliance_profiles: test_profile: compliant: "Class[Test2::Test3]": parameters: arg3_1: Identifiers: [“ID1.2”] compliant_value: foo3_1 system_value: foo3_1 non_compliant: {} documented_missing_resources: - unmapped1 - "unmapped1::subclass" documented_missing_parameters: - "test2::test3::ref_miss1"
  • 18. Trevor Vaughan, Onyx Point X SecCONOP
  • 19. Trevor Vaughan, Onyx Point X NIST Special Publication 800-137
  • 20. Trevor Vaughan, Onyx Point X SecCONOP ● Completely Updated ● A Kickstart Toward Certification and Accreditation ● Built-in NIST 800-53 References ● Designed for Flexibility ○ Provide your own updates in the build ● Currently 49 pages ● http://simp.readthedocs.io/en/5.2.0-0/security_conop
  • 21. Trevor Vaughan, Onyx Point X 1.2 IMA + TPM
  • 22. Trevor Vaughan, Onyx Point X Integrity Management Architecture (IMA) ● Automated! ○ https://github.com/simp/pupmod-simp-tpm ● Tested! ● Not Recommended for Production! ○ Unable to Restrict Memory Usage ○ Unable to Update Policy Without Reboot ○ Some Issues with DoS via Valid Policies
  • 23. Trevor Vaughan, Onyx Point X Trusted Platform Module (TPM) 1.2 ● Integrated ○ https://github.com/simp/pupmod-simp-tpm ● Ownership Automated ● Facter Facts Created ● In Progress ○ Trusted Boot ○ PKCS11 Interface Automation
  • 24. Trevor Vaughan, Onyx Point X IPSEC
  • 25. Trevor Vaughan, Onyx Point X Libreswan ● Integrated for EL7 ● Feature Request in for RHS ‘any’ ● Goal ○ Full X.509-based Opportunistic IPSec ○ Everything except DNS and Puppet
  • 26. Trevor Vaughan, Onyx Point X ELG
  • 27. Trevor Vaughan, Onyx Point X ELG ● Completely Updated ● Same Basic Architecture ● Replaced Kibana With Grafana ○ Multi-Tenant Support ○ LDAP Support ○ Safer Default Usage ● SIMP Dashboards in Progress!
  • 28. Trevor Vaughan, Onyx Point X LESSONS LEARNED
  • 29. Trevor Vaughan, Onyx Point X GOVERNMENT + OPEN SOURCE
  • 30. Trevor Vaughan, Onyx Point X Contracts Contracts
  • 31. Trevor Vaughan, Onyx Point X GOVERNMENT + OPEN SOURCE
  • 32. Trevor Vaughan, Onyx Point X COMMUNITY EXPECTATIONS (2015 © NBC)
  • 33. Trevor Vaughan, Onyx Point X Our Expectations (2007 © Warner Brothers)
  • 34. Trevor Vaughan, Onyx Point X Reality (2001 © New Line Cinema)
  • 35. Trevor Vaughan, Onyx Point X Experiences (1965 © DC Comics) ● Many environments stuck on one-time apply ● “Will this help me DevOps?!” ● Technology is not the problem ○ Undertrained and Understaffed ■ “How do I ‘vi’ a file?” - Senior Administrator
  • 36. Trevor Vaughan, Onyx Point X Seriously... (1999 © 20th Century Fox)
  • 37. Trevor Vaughan, Onyx Point X TESTING A TALE OF WOE + SORROW
  • 38. Trevor Vaughan, Onyx Point X What Worked ● All Tests Must Be Able to Be Run by Hand ○ ‘rake spec’, ‘rake beaker:suites’, etc… ○ The ‘travish’ Ruby gem is very useful here
  • 39. Trevor Vaughan, Onyx Point X What Worked ● Beaker + Vagrant ○ Docker was erratic on different systems ■ Aufs + Docker == /var death ○ Can’t test FIPS and non-FIPS in Docker ○ Can’t validate external protections (IPTables, etc…) in Docker
  • 40. Trevor Vaughan, Onyx Point X What Didn’t Work
  • 41. Trevor Vaughan, Onyx Point X Where We’re Heading
  • 42. Trevor Vaughan, Onyx Point X FUTURE THE (1985 © Universal Studios)
  • 43. Trevor Vaughan, Onyx Point X Upcoming Features ● TPM ○ Automated Trusted Boot ○ Credential Protection ○ PKCS11 ■ Hook in Everything! ● IPSec ○ Opportunistic IPSec ■ X.509 is the Target ● Hashicorp Vault ○ Secret Storage ○ Good for HIPAA...and TPMs? ● Compliance Mapper 1.0 ○ Report on compliant and non-compliant entries ○ Less code modification
  • 44. Trevor Vaughan, Onyx Point X Upcoming Features ● FreeIPA ○ Easier Management ● Seamless Puppet Enterprise ● Puppet AIO ○ Puppet 3 EOL - Dec 31, 2016 ● Fapolicyd ○ Thanks to Steve Grubb! ● OpenSCAP Suites ○ Targeted Tests in Modules ● Full Stack KRB5 Integration ○ PAM ○ SSH ● Immediate Remediation ○ Based on last Puppet Catalog
  • 45. Trevor Vaughan, Onyx Point X LESSONS LEARNED Trevor Vaughan- VP Engineering, Onyx Point tvaughan@onyxpoint.com @peiriannydd