SlideShare a Scribd company logo
Rudder: non visible immersed part of the shipwheel,
it is the boat part that actually lets you correct the course when the boat is
drifting away.
Continuous Auditing – Continuous Configuration
2
Rudder devops♡
→ Culture → Automate → Measure → Share →
devops
Conbination of « developer » and « operations » (= « system administrator »)
3
Modern IT production service management
4
Modern IT production service management
Provisioning
Installation
Configuration
Mise à jour
Patch
5
Modern IT production service management
Automatisation
Provisioning
Installation
Configuration
Mise à jour
Patch
6
Installation
Configuration
Mise à jour
Patch
Open source brick for each level
Provisioning
Briques
open source
7
IT is becoming continuous
Continuous
growth
Continuous
threat
Continuous
availability
Continuous *
8
IT is becoming continuous
IT management must become continuous
Continuous
growth
Continuous
threat
Continuous
availability
Continuous Auditing – Continuous Configuration
9
Continuous approach benefits
Continuous auditing & configuration
Reliable reporting
Real-time and continuous
analysis
KPIs for your IT
Time saved
Deployment ,
maintenance, evolutions
Management not
impacted by park growth
Ensured reliability
Operational maintenance
Controlled changes
10
Overview
Node-server communication
Centralized management Local agents↔
11
Key points (1/3)
Good citizen
Easy to insert in your chaintool :
change requests, audit log
AD/LDAP authentication , ...
Vigilance
Continuous checking to react
fast and rely on accurate
Information.
Production ready
Audit Enforce↔
Each configuration can be set in
Audit mode, only checking its
compliance, of in Enforce
mode, to actually apply itself.
Don't guess anymore. Know.
Rapport
Re-
médiation
12
Key points (2/3)
CLI / Code
Create new configuration
templates.
Trigger events.
Web
Use configuration templates.
See compliance.
A role-based solution
API
Automatically add new nodes.
Integrate with third party tools.
13
CloudServers
Desktop Embedded/IoT
Mobile
Every scales
Performance
Relay components
2
→
> 10 000
Multi-OS
(Possible portage on almost every
existing OS, except iOS)
Cross-platform
Physical, VM, cloud,
mobile, embedded, …
Key points (3/3)
Universel
14
The desired state concept
Defining desired state
Cible
Imperative Declarative Update openssl package
Package openssl always up-to-date
Restart ntpd service
Ntpd service must be running
Copy sshd_config.template file
sshd_config file must contain
“PermitRootLogin no”
15
Audit mode: hello Continuous Auditing!
Rudder's lifecycle with
continuous {auditing, configuration}
Define
desired
state
Distribute to
agents
OK
NOK
Check state
locally
OS-Specific
Implementations
Report
Remediate
?
REPEAT
16
Features: defining configuration
Techniques
Ready to use configuration templates
17
Features: defining configuration
Techniques
Ready to use configuration templates
A few examples :
1. Users, groups, passwords
2. Software (deb/rpm/exe/MSI)
3. Configurations files
(fulls, templates, per line, per section, ...)
4. Services management
5. Application configurations
(OpenSSH, Apache HTTPd, IIS, NFS, ...)
→ For everything else, the Technique Editor
18
Features: defining configuration
19
Features: defining configuration
Technical directive examples
1. Auto logout
après inactivité
2. Passwords
(force, durée de vie, ...)
3. No compilers
in production
4. Alert following a
distant connexion
5. Software vulnerability
Patching
GOAL
Protect
access
Protect
access
Abide by the
law
IMPLEMENTATION
File/register
content
File/register
content
Missing
package
File/register
content
Installed/up-
to-date
package
Avoid potential
exploitations
Avoid known
exploitations
20
Feature: defining configuration
Technique Editor (IDE)
Create any configuration with primary blocks
21
Features: defining configuration
Technique Editor (IDE)
Create any configuration with primary blocks
Package
absent
Package
absent
Security directive #2
File
enforce
Service
running
Security directive #3
Package
present
File
edit
Security directive #1
Corporate security policy Security best practices
RULERULE
22
Reporting graphique pour
analyser en détail un état
Rapport agrégé
de conformité
Compliance report
Features: Reporting
Detailed reporting by configuration rule
23
Features: Reporting
Dashboard – overview
24
Double validation / Change Requests
Features: double validation
25
Restauration automatique
de la configuration
précédente en cas de besoin
Features: audit log + rollback
Changes automatic tracking
26
Network architecture
Central server
Node Node Node
TCP communication (port 5309)
File metadata
File contents
Authentification + encryption (TLS)
TCP communication
(ports 443 et 514)
Protocols: HTTPS, syslog
Node Node Node
Isolated network zone
Relay server
Aggregated data
Inventory
+ Reports
Configuration
policy
27
Summary : key points
Universal
Cross-platform and multi-OS
Smallest to biggest scales
Lightweight and autonomous agent
Production ready
Vigilance
Audit Enforce↔
Good citizen of the chaintool
Key points
Role based
Interface web / API / CLI
User friendly
Fast learning curve
Advanced extensibility
Reporting
Re-
mediation
2
→
> 10 000
28
Summary : continuous approach
Continuous auditing & configuration
Reliable reporting
Real-time and continuous
analysis
KPIs for your IT
Time saved
Deployment ,
maintenance, evolutions
Management not
impacted by park growth
Ensured reliability
Operational maintenance
Controlled changes
29
Rudder devops♡
→ Culture → Automate → Measure → Share →
devops
Conbination of « developer » and « operations » (= « system administrator »)
Normation – 87 rue de Turbigo, 75003 PARIS, France –Normation – 87 rue de Turbigo, 75003 PARIS, France – contact@normation.comcontact@normation.com – +33.1.83.62.26.96 –– +33.1.83.62.26.96 – http://www.normation.com/http://www.normation.com/
Continuous Auditing
Continuous Configuration
Jonathan CLARKE
Co-founder & Product
jcl@normation.com

More Related Content

PDF
Automating the manual - feedback on including existing systems in configurati...
PDF
Rudder: what's new and what's next? Roadmap, vision and thoughts
PDF
O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder
PPTX
Cloud Platform Symantec Meetup Nov 2014
PDF
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...
PDF
Monitoramento de Vulnerabilidades com Zabbix, RHEL e Yum Security Plugin
ODP
PostgreSQL: Welcome To Total Security
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
Automating the manual - feedback on including existing systems in configurati...
Rudder: what's new and what's next? Roadmap, vision and thoughts
O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder
Cloud Platform Symantec Meetup Nov 2014
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...
Monitoramento de Vulnerabilidades com Zabbix, RHEL e Yum Security Plugin
PostgreSQL: Welcome To Total Security
ModSecurity and NGINX: Tuning the OWASP Core Rule Set

What's hot (20)

PDF
Linux conna kpatch-without-stopmachine-fixed
PDF
Rudder 3.0 - what's new ?
PPTX
Cloud-based Virtualization for Test Automation
PPTX
BEST REST in OpenStack
PPT
Managing Oracle Enterprise Manager Cloud Control 12c with Oracle Clusterware
PDF
2009-01-20 RHEL 5.3 for System z
ODP
Nagios Conference 2011 - Mike Guthrie - Distributed Monitoring With Nagios
PPTX
Addressing DHCP and DNS scalability issues in OpenStack Neutron
DOCX
PDF
Network Security
PDF
Hardening Linux and introducing Securix Linux
PDF
PostgresOpen 2013 A Comparison of PostgreSQL Encryption Options
PPTX
World Domination Through Helix Broker
PDF
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
DOCX
Audit commands by shift
PPTX
Presentation on rhce
PDF
Red Hat Satellite
PDF
The Linux Audit Framework
ODP
Nagios Conference 2013 - Mike Weber - Distributed Monitoring with Raspberry Pi
PPTX
Tips for Administering Complex Distributed Perforce Environments
Linux conna kpatch-without-stopmachine-fixed
Rudder 3.0 - what's new ?
Cloud-based Virtualization for Test Automation
BEST REST in OpenStack
Managing Oracle Enterprise Manager Cloud Control 12c with Oracle Clusterware
2009-01-20 RHEL 5.3 for System z
Nagios Conference 2011 - Mike Guthrie - Distributed Monitoring With Nagios
Addressing DHCP and DNS scalability issues in OpenStack Neutron
Network Security
Hardening Linux and introducing Securix Linux
PostgresOpen 2013 A Comparison of PostgreSQL Encryption Options
World Domination Through Helix Broker
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
Audit commands by shift
Presentation on rhce
Red Hat Satellite
The Linux Audit Framework
Nagios Conference 2013 - Mike Weber - Distributed Monitoring with Raspberry Pi
Tips for Administering Complex Distributed Perforce Environments
Ad

Similar to RUDDER - Continuous Configuration (configuration management + continuous auditing) [English] (20)

PDF
What is RUDDER and when should I use it?
PDF
"Wie passen Serverless & Autonomous zusammen?"
PDF
Pragmatic Pipeline Security
PDF
The Twelve Factor Apps
PDF
Building your macOS Baseline Requirements MacadUK 2018
PPTX
devops ppt for hjs jsdjhjd hsdbusinees.pptx
PPT
Tivoli_Introduction_SPE_09-03-2004_!!!.ppt
PPTX
InfrastructureDevOps.pptx it is most sui
PPTX
FOISDBA-Ver1.1.pptx
DOCX
Benedicta_Resume
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
PPTX
FortinetFortinetFortinetFortinetFortinetFortinetFortinetFortinetFortinet
PDF
The Domino 10 RHEL 7 Primer
PPTX
Software update for embedded systems
PPTX
SCOM Tips and Tricks
PDF
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
DOCX
Arun Prasad-R.DOCX
PDF
Git Gerrit Mit Teamforge
PPTX
FIWARE Wednesday Webinars - How to Debug IoT Agents
PPTX
Windows 7 Security Enhancements
What is RUDDER and when should I use it?
"Wie passen Serverless & Autonomous zusammen?"
Pragmatic Pipeline Security
The Twelve Factor Apps
Building your macOS Baseline Requirements MacadUK 2018
devops ppt for hjs jsdjhjd hsdbusinees.pptx
Tivoli_Introduction_SPE_09-03-2004_!!!.ppt
InfrastructureDevOps.pptx it is most sui
FOISDBA-Ver1.1.pptx
Benedicta_Resume
How to Secure Your Kubernetes Software Supply Chain at Scale
FortinetFortinetFortinetFortinetFortinetFortinetFortinetFortinetFortinet
The Domino 10 RHEL 7 Primer
Software update for embedded systems
SCOM Tips and Tricks
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
Arun Prasad-R.DOCX
Git Gerrit Mit Teamforge
FIWARE Wednesday Webinars - How to Debug IoT Agents
Windows 7 Security Enhancements
Ad

More from RUDDER (20)

PDF
What if configuration management didn't need to be lvl60 in dev?
PDF
Servers compliance: audit, remediation, proof
PDF
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
PDF
OW2Con - Configurations, do you prove yours?
PDF
The new plugin ecosystem in RUDDER 5.0
PDF
What uses for observing operations of Configuration Management?
PDF
UX challenges of a UI-centric config management tool
PDF
What happened in RUDDER in 2018 and what’s next?
PDF
Fosdem - Configurations do you prove yours?
PDF
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
PDF
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
PDF
Stay up - voyage d'un éditeur de logiciels libres
PDF
How we scaled Rudder to 10k, and the road to 50k
PDF
What's new and what's next in Rudder
PDF
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
PDF
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
PDF
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
PDF
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
PDF
RUDDER - Continuous Configuration (configuration management + continuous audi...
PDF
OSIS 2017 - Scala REX dans Rudder
What if configuration management didn't need to be lvl60 in dev?
Servers compliance: audit, remediation, proof
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OW2Con - Configurations, do you prove yours?
The new plugin ecosystem in RUDDER 5.0
What uses for observing operations of Configuration Management?
UX challenges of a UI-centric config management tool
What happened in RUDDER in 2018 and what’s next?
Fosdem - Configurations do you prove yours?
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Stay up - voyage d'un éditeur de logiciels libres
How we scaled Rudder to 10k, and the road to 50k
What's new and what's next in Rudder
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
RUDDER - Continuous Configuration (configuration management + continuous audi...
OSIS 2017 - Scala REX dans Rudder

Recently uploaded (20)

PPTX
ai tools demonstartion for schools and inter college
PDF
medical staffing services at VALiNTRY
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
top salesforce developer skills in 2025.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
System and Network Administration Chapter 2
PDF
System and Network Administraation Chapter 3
PPTX
Transform Your Business with a Software ERP System
ai tools demonstartion for schools and inter college
medical staffing services at VALiNTRY
wealthsignaloriginal-com-DS-text-... (1).pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
top salesforce developer skills in 2025.pdf
Softaken Excel to vCard Converter Software.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
L1 - Introduction to python Backend.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Designing Intelligence for the Shop Floor.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Which alternative to Crystal Reports is best for small or large businesses.pdf
System and Network Administration Chapter 2
System and Network Administraation Chapter 3
Transform Your Business with a Software ERP System

RUDDER - Continuous Configuration (configuration management + continuous auditing) [English]

  • 1. Rudder: non visible immersed part of the shipwheel, it is the boat part that actually lets you correct the course when the boat is drifting away. Continuous Auditing – Continuous Configuration
  • 2. 2 Rudder devops♡ → Culture → Automate → Measure → Share → devops Conbination of « developer » and « operations » (= « system administrator »)
  • 3. 3 Modern IT production service management
  • 4. 4 Modern IT production service management Provisioning Installation Configuration Mise à jour Patch
  • 5. 5 Modern IT production service management Automatisation Provisioning Installation Configuration Mise à jour Patch
  • 6. 6 Installation Configuration Mise à jour Patch Open source brick for each level Provisioning Briques open source
  • 7. 7 IT is becoming continuous Continuous growth Continuous threat Continuous availability Continuous *
  • 8. 8 IT is becoming continuous IT management must become continuous Continuous growth Continuous threat Continuous availability Continuous Auditing – Continuous Configuration
  • 9. 9 Continuous approach benefits Continuous auditing & configuration Reliable reporting Real-time and continuous analysis KPIs for your IT Time saved Deployment , maintenance, evolutions Management not impacted by park growth Ensured reliability Operational maintenance Controlled changes
  • 11. 11 Key points (1/3) Good citizen Easy to insert in your chaintool : change requests, audit log AD/LDAP authentication , ... Vigilance Continuous checking to react fast and rely on accurate Information. Production ready Audit Enforce↔ Each configuration can be set in Audit mode, only checking its compliance, of in Enforce mode, to actually apply itself. Don't guess anymore. Know. Rapport Re- médiation
  • 12. 12 Key points (2/3) CLI / Code Create new configuration templates. Trigger events. Web Use configuration templates. See compliance. A role-based solution API Automatically add new nodes. Integrate with third party tools.
  • 13. 13 CloudServers Desktop Embedded/IoT Mobile Every scales Performance Relay components 2 → > 10 000 Multi-OS (Possible portage on almost every existing OS, except iOS) Cross-platform Physical, VM, cloud, mobile, embedded, … Key points (3/3) Universel
  • 14. 14 The desired state concept Defining desired state Cible Imperative Declarative Update openssl package Package openssl always up-to-date Restart ntpd service Ntpd service must be running Copy sshd_config.template file sshd_config file must contain “PermitRootLogin no”
  • 15. 15 Audit mode: hello Continuous Auditing! Rudder's lifecycle with continuous {auditing, configuration} Define desired state Distribute to agents OK NOK Check state locally OS-Specific Implementations Report Remediate ? REPEAT
  • 17. 17 Features: defining configuration Techniques Ready to use configuration templates A few examples : 1. Users, groups, passwords 2. Software (deb/rpm/exe/MSI) 3. Configurations files (fulls, templates, per line, per section, ...) 4. Services management 5. Application configurations (OpenSSH, Apache HTTPd, IIS, NFS, ...) → For everything else, the Technique Editor
  • 19. 19 Features: defining configuration Technical directive examples 1. Auto logout après inactivité 2. Passwords (force, durée de vie, ...) 3. No compilers in production 4. Alert following a distant connexion 5. Software vulnerability Patching GOAL Protect access Protect access Abide by the law IMPLEMENTATION File/register content File/register content Missing package File/register content Installed/up- to-date package Avoid potential exploitations Avoid known exploitations
  • 20. 20 Feature: defining configuration Technique Editor (IDE) Create any configuration with primary blocks
  • 21. 21 Features: defining configuration Technique Editor (IDE) Create any configuration with primary blocks Package absent Package absent Security directive #2 File enforce Service running Security directive #3 Package present File edit Security directive #1 Corporate security policy Security best practices RULERULE
  • 22. 22 Reporting graphique pour analyser en détail un état Rapport agrégé de conformité Compliance report Features: Reporting Detailed reporting by configuration rule
  • 24. 24 Double validation / Change Requests Features: double validation
  • 25. 25 Restauration automatique de la configuration précédente en cas de besoin Features: audit log + rollback Changes automatic tracking
  • 26. 26 Network architecture Central server Node Node Node TCP communication (port 5309) File metadata File contents Authentification + encryption (TLS) TCP communication (ports 443 et 514) Protocols: HTTPS, syslog Node Node Node Isolated network zone Relay server Aggregated data Inventory + Reports Configuration policy
  • 27. 27 Summary : key points Universal Cross-platform and multi-OS Smallest to biggest scales Lightweight and autonomous agent Production ready Vigilance Audit Enforce↔ Good citizen of the chaintool Key points Role based Interface web / API / CLI User friendly Fast learning curve Advanced extensibility Reporting Re- mediation 2 → > 10 000
  • 28. 28 Summary : continuous approach Continuous auditing & configuration Reliable reporting Real-time and continuous analysis KPIs for your IT Time saved Deployment , maintenance, evolutions Management not impacted by park growth Ensured reliability Operational maintenance Controlled changes
  • 29. 29 Rudder devops♡ → Culture → Automate → Measure → Share → devops Conbination of « developer » and « operations » (= « system administrator »)
  • 30. Normation – 87 rue de Turbigo, 75003 PARIS, France –Normation – 87 rue de Turbigo, 75003 PARIS, France – contact@normation.comcontact@normation.com – +33.1.83.62.26.96 –– +33.1.83.62.26.96 – http://www.normation.com/http://www.normation.com/ Continuous Auditing Continuous Configuration Jonathan CLARKE Co-founder & Product jcl@normation.com