SlideShare a Scribd company logo
PAGE1
DEVOPS INDONESIA
PAGE
1
Bobby Limitra
Solutions Engineer, F5
Jakarta, 10 Juni 2020
Security and Data Breach
Security and Data Breach
What & How it Happened? How to Mitigate?
Bobby Limitra
Solutions Engineer, F5 Networks
“Data Breach is a security violation in which
sensitive, protected or confidential data is copied,
transmitted, viewed, stolen or used by an individual
unauthorized to do so”
Source: Verizon 2020 DBIR
| ©2019 F5​5 CONFIDENTIAL
Data Breach: What Tactics are Utilized?
Verizon 2020 DBIR
| ©2019 F5​6 CONFIDENTIAL
Top Hacking Varieties & Vectors in Breaches
Data Breaches
In the last 8 years more than
7.1 billion identities have been
exposed in data breaches
70
MILLION
accounts
427
MILLION
accounts
150
MILLION
accounts
3
BILLION
accounts
117
MILLION
accounts
1. Symantec Internet Security Threat Report, April 2017
2. https://www.entrepreneur.com/article/246902#
Nearly 3 out of 4 consumers
use duplicate passwords,
many of which have not been
changed in five years or more.
3 out of 4
| ©2019 F5​8
https://haveibeenpwned.com
USERNAME Credit Card
Data
USERNAME Intellectual
Property
USERNAME Healthcare
Data
USERNAME Passport
Data
USERNAME Financial
Data
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
Credentials from
Previous Breaches
• Educate employees / customers and boost security awareness
• Bot detection & prevention
• Design your login form so that it is impossible for the attacker’s bot to
recognize the fields
• Use multifactor authentication
• Monitor for failed authentication attempt
• Formjacking uses code injected by an attacker to
siphon payment card information from an online
form and deliver it to the attacker
• The recent rise of formjacking indicates that any
organization that accepts payment card information
over the web is going to have their shopping cart
targeted, regardless of sector
Confidential / / Part of F5
Formjacking / Magecart
https://cdn.appdynamics.com/adrum/adrum-latest.js
https://cdn.gladly.com/assets/chat-sdk/fece5b8abfb/main.js
https://cdn.krxd.net/ctjs/controltag.js
https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/rollups/md5.js
https://connect.facebook.net/en_US/fbevents.js
https://d1fc8wv8zag5ca.cloudfront.net/2.10.2/sp.js
https://d2wy8f7a9ursnm.cloudfront.net/bugsnag-2.min.js
https://fullstory.com/s/fs.js
https://js.stripe.com/v2/
https://s.btstatic.com/tag.js
https://secure.flyr.io/v3/js/flyr.js
https://tag.bounceexchange.com/1907/i.js
https://uwhfgjlv.micpn.com/p/js/1.js
https://vt.myvisualiq.net/2/tDogjioRT72xXtfNK23F7A%3D%3D/vt-77.js
Typical Add Payment page loads JS from a dozen sources
Confidential / / Part of F5
Magecart on British Airways (facing US$230M fine)
SOURCE: https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
Compromised file: https://www.britishairways.com/cms/global/scripts/lib/modernizr-2.6.2.min.js
• Injection Detection
• Inventory
• Patching
• Scanning
• Change Control
• Multi-Factor Authentication (MFA)
• Web Application Firewall (WAF)
• Server Tools (e.g: CSP, SRI)
• Monitor (for newly registered domains
and certificates of your brand)
Security and Data Breach
• DevOps adoption is increasing, but Security typically remain afterthoughts.
• Security has largely been divorced from software development.
Security in DevOps ?
| ©2019 F5​17
Cultural shift
In a DevOps mentality,
security is everybody’s
RESPONSIBILITY.
FROM TO
A shift away from security is the
TRAFFIC COP / GATEKEEPER
mentality.
| ©2018 F5 NETWORKS​18
Collaborative Model
Development Operations
Security
• Avoid security at the end
• Greater collaboration with security
“in the room” at the beginning.
• Move to a risk based model rather
than being a traffic cop.
• Collaboration brings understanding.
• Understanding shapes how we
react.
| ©2018 F5 NETWORKS​19
The DevSecOps way
Business
Requirement
New Code ProductionTesting
Security
SHIFT LEFT
Risk based
security as
part of
normal
business.
Develop
initial sprint
with security
in mind
Deploy to
production
with regular
security
reviews
Test security
in an
automated
way
Shifting left refers to moving security earlier in the development process.
This means that security becomes everyone’s responsibility.
It also denotes a move to a risk based approach as opposed to a traffic cop approach.
It is not just about the speed, but also the safety
The earlier that security requirements can be addressed in the Software
Development Lifecycle, the lower the cost and impact.
| ©2019 F5​20
Wrap Up: DevSecOps Principles
​Breaking down
the silos
​Shifting Left ​Nurturing security
champions
​Continuous
Testing/Test
automation
​Making the
secure path the
easy path
| ©2019 F5​21
Join us virtually for ASEAN CES 2020!
SIGN UP AT: GO.F5.NET/ASEANCES
​Join industry-leading experts
in multi-cloud application
and gain insights on
developing and delivering a
modern apps architecture
leveraging APIs, DevOps,
SRE and Microservices!
| ©2019 F5​22
Connect with us!
JOIN IN THE CONVERSATION ON SOCIAL MEDIA
CONFIDENTIAL STATE OF APPLICATION SERVICES, 2020
Find us on Facebook
@f5asiapacific
Add us on LinkedIn
F5
Follow us on Twitter
@F5_AsiaPacific
Security and Data Breach
PAGE24
DEVOPS INDONESIA
Stay Connected
@devopsindonesia
http://www.devopsindonesia.com
@IDDevOps
@DevOpsIndonesia
@IDDevOps DevOps Indonesia
PAGE25
DEVOPS INDONESIA
Alone We are smart, together We are brilliant
THANK YOU !
Quote by Steve Anderson

More Related Content

PDF
Digital Transformation in Infrastructure "NetOps in The Era of Modern IT"
PDF
Modern App Architecture - Microservices, API Friendly
PDF
When Automation Keeps Your T-shirt Clean
PDF
Shift Left Security - The What, Why and How
PPTX
Microsoft, Citrix and SCOM: EOL or a New Beginning ?
PPTX
Best Practices for Troubleshooting Slow Citrix Logon and Ensuring Excellent U...
PPTX
Best Practices for Troubleshooting Four Real-world Java Performance Issues
PPTX
How to monitor all aspects of Citrix NetScaler usage and performance within t...
Digital Transformation in Infrastructure "NetOps in The Era of Modern IT"
Modern App Architecture - Microservices, API Friendly
When Automation Keeps Your T-shirt Clean
Shift Left Security - The What, Why and How
Microsoft, Citrix and SCOM: EOL or a New Beginning ?
Best Practices for Troubleshooting Slow Citrix Logon and Ensuring Excellent U...
Best Practices for Troubleshooting Four Real-world Java Performance Issues
How to monitor all aspects of Citrix NetScaler usage and performance within t...

What's hot (20)

PDF
Managing Citrix Digital Business Services Performance - Make your first Impre...
PPT
eG Innovations
PDF
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
PPTX
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
PDF
Digital Workspaces and the Customer Experience
PPTX
Citrix troubleshooting 101
PDF
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
PPTX
2018 Citrix Migration Survey - Industry Insights
PPTX
Citrix Cloud Services - Are they right for you ?
PPTX
Citrix Troubleshooting 101
PDF
Measure Customer Value with Self-Service Observability
PDF
The Complete User Experience Monitoring Solution - eG Enterprise v7
DOC
Akant_Kukreja
PPTX
Securing Your Infrastructure: Identity Management and Data Protection
PPTX
How to Get the Fastest Possible Citrix Logon Times?
PPTX
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
PPTX
How to Deliver an Exceptional End User Experience in your Citrix Environment
PPTX
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
PPTX
How to consolidate Citrix Monitoring in a Single Pane of Glass
PPTX
How to Achieve Great Citrix User Experience
Managing Citrix Digital Business Services Performance - Make your first Impre...
eG Innovations
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
Digital Workspaces and the Customer Experience
Citrix troubleshooting 101
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
2018 Citrix Migration Survey - Industry Insights
Citrix Cloud Services - Are they right for you ?
Citrix Troubleshooting 101
Measure Customer Value with Self-Service Observability
The Complete User Experience Monitoring Solution - eG Enterprise v7
Akant_Kukreja
Securing Your Infrastructure: Identity Management and Data Protection
How to Get the Fastest Possible Citrix Logon Times?
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
How to Deliver an Exceptional End User Experience in your Citrix Environment
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to Achieve Great Citrix User Experience
Ad

Similar to Security and Data Breach (20)

PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
PDF
Why Data Security Should Be a Priority in Your Software Development Strategy?
PPTX
Presentation 10.pptx
PDF
The What, Why, and How of DevSecOps
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
Your security posture may define your company’s future
PDF
Introduction to Cybersecurity
PPTX
Secure Iowa Oct 2016
PDF
Your're Special (But Not That Special)
PDF
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
PPTX
Security and Mobility Co Create Week Jakarta
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPTX
Solnet dev secops meetup
PDF
The State of Data Security
PDF
The 10 Secret Codes of Security
PPTX
Privacies are Coming
Tech Talent Meetup Hacking Security Event Recap
Data Protection - Safeguarding Your Business in the Digital Age.pdf
Be More Secure than your Competition: MePush Cyber Security for Small Business
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Why Data Security Should Be a Priority in Your Software Development Strategy?
Presentation 10.pptx
The What, Why, and How of DevSecOps
Wfh security risks - Ed Adams, President, Security Innovation
Your security posture may define your company’s future
Introduction to Cybersecurity
Secure Iowa Oct 2016
Your're Special (But Not That Special)
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
Security and Mobility Co Create Week Jakarta
SCS DevSecOps Seminar - State of DevSecOps
Solnet dev secops meetup
The State of Data Security
The 10 Secret Codes of Security
Privacies are Coming
Ad

More from DevOps Indonesia (20)

PDF
DevSecOps Implementation Journey
PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
PDF
Securing an NGINX deployment for K8s
PDF
DevOps Indonesia Meetup #52 - announcement
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
PDF
Securing DevOps Lifecycle
PDF
DevOps Meetup 50 : Securing your Application - Announcement
PDF
Secure your Application with Google cloud armor
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
PDF
Operate Containers with AWS Copilot
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
PDF
Securing Your Database Dynamic DB Credentials
PDF
DevOps Indonesia (online) meetup 45 - Announcement
PDF
The Death and Rise of Enterprise DevOps
PDF
API Security Webinar - Credential Stuffing
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Hendra Tanto
PDF
API Security Webinar : Credential Stuffing
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevSecOps Implementation Journey
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
Securing an NGINX deployment for K8s
DevOps Indonesia Meetup #52 - announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Securing DevOps Lifecycle
DevOps Meetup 50 : Securing your Application - Announcement
Secure your Application with Google cloud armor
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
Operate Containers with AWS Copilot
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
Securing Your Database Dynamic DB Credentials
DevOps Indonesia (online) meetup 45 - Announcement
The Death and Rise of Enterprise DevOps
API Security Webinar - Credential Stuffing
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Hendra Tanto
API Security Webinar : Credential Stuffing
API Security Webinar : Security Guidelines for Providing and Consuming APIs

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf

Security and Data Breach

  • 1. PAGE1 DEVOPS INDONESIA PAGE 1 Bobby Limitra Solutions Engineer, F5 Jakarta, 10 Juni 2020 Security and Data Breach
  • 2. Security and Data Breach What & How it Happened? How to Mitigate? Bobby Limitra Solutions Engineer, F5 Networks
  • 3. “Data Breach is a security violation in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so”
  • 5. | ©2019 F5​5 CONFIDENTIAL Data Breach: What Tactics are Utilized? Verizon 2020 DBIR
  • 6. | ©2019 F5​6 CONFIDENTIAL Top Hacking Varieties & Vectors in Breaches
  • 7. Data Breaches In the last 8 years more than 7.1 billion identities have been exposed in data breaches 70 MILLION accounts 427 MILLION accounts 150 MILLION accounts 3 BILLION accounts 117 MILLION accounts 1. Symantec Internet Security Threat Report, April 2017 2. https://www.entrepreneur.com/article/246902# Nearly 3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more. 3 out of 4
  • 9. USERNAME Credit Card Data USERNAME Intellectual Property USERNAME Healthcare Data USERNAME Passport Data USERNAME Financial Data USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME Credentials from Previous Breaches
  • 10. • Educate employees / customers and boost security awareness • Bot detection & prevention • Design your login form so that it is impossible for the attacker’s bot to recognize the fields • Use multifactor authentication • Monitor for failed authentication attempt
  • 11. • Formjacking uses code injected by an attacker to siphon payment card information from an online form and deliver it to the attacker • The recent rise of formjacking indicates that any organization that accepts payment card information over the web is going to have their shopping cart targeted, regardless of sector
  • 12. Confidential / / Part of F5 Formjacking / Magecart https://cdn.appdynamics.com/adrum/adrum-latest.js https://cdn.gladly.com/assets/chat-sdk/fece5b8abfb/main.js https://cdn.krxd.net/ctjs/controltag.js https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/rollups/md5.js https://connect.facebook.net/en_US/fbevents.js https://d1fc8wv8zag5ca.cloudfront.net/2.10.2/sp.js https://d2wy8f7a9ursnm.cloudfront.net/bugsnag-2.min.js https://fullstory.com/s/fs.js https://js.stripe.com/v2/ https://s.btstatic.com/tag.js https://secure.flyr.io/v3/js/flyr.js https://tag.bounceexchange.com/1907/i.js https://uwhfgjlv.micpn.com/p/js/1.js https://vt.myvisualiq.net/2/tDogjioRT72xXtfNK23F7A%3D%3D/vt-77.js Typical Add Payment page loads JS from a dozen sources
  • 13. Confidential / / Part of F5 Magecart on British Airways (facing US$230M fine) SOURCE: https://www.riskiq.com/blog/labs/magecart-british-airways-breach/ Compromised file: https://www.britishairways.com/cms/global/scripts/lib/modernizr-2.6.2.min.js
  • 14. • Injection Detection • Inventory • Patching • Scanning • Change Control • Multi-Factor Authentication (MFA) • Web Application Firewall (WAF) • Server Tools (e.g: CSP, SRI) • Monitor (for newly registered domains and certificates of your brand)
  • 16. • DevOps adoption is increasing, but Security typically remain afterthoughts. • Security has largely been divorced from software development. Security in DevOps ?
  • 17. | ©2019 F5​17 Cultural shift In a DevOps mentality, security is everybody’s RESPONSIBILITY. FROM TO A shift away from security is the TRAFFIC COP / GATEKEEPER mentality.
  • 18. | ©2018 F5 NETWORKS​18 Collaborative Model Development Operations Security • Avoid security at the end • Greater collaboration with security “in the room” at the beginning. • Move to a risk based model rather than being a traffic cop. • Collaboration brings understanding. • Understanding shapes how we react.
  • 19. | ©2018 F5 NETWORKS​19 The DevSecOps way Business Requirement New Code ProductionTesting Security SHIFT LEFT Risk based security as part of normal business. Develop initial sprint with security in mind Deploy to production with regular security reviews Test security in an automated way Shifting left refers to moving security earlier in the development process. This means that security becomes everyone’s responsibility. It also denotes a move to a risk based approach as opposed to a traffic cop approach. It is not just about the speed, but also the safety The earlier that security requirements can be addressed in the Software Development Lifecycle, the lower the cost and impact.
  • 20. | ©2019 F5​20 Wrap Up: DevSecOps Principles ​Breaking down the silos ​Shifting Left ​Nurturing security champions ​Continuous Testing/Test automation ​Making the secure path the easy path
  • 21. | ©2019 F5​21 Join us virtually for ASEAN CES 2020! SIGN UP AT: GO.F5.NET/ASEANCES ​Join industry-leading experts in multi-cloud application and gain insights on developing and delivering a modern apps architecture leveraging APIs, DevOps, SRE and Microservices!
  • 22. | ©2019 F5​22 Connect with us! JOIN IN THE CONVERSATION ON SOCIAL MEDIA CONFIDENTIAL STATE OF APPLICATION SERVICES, 2020 Find us on Facebook @f5asiapacific Add us on LinkedIn F5 Follow us on Twitter @F5_AsiaPacific
  • 25. PAGE25 DEVOPS INDONESIA Alone We are smart, together We are brilliant THANK YOU ! Quote by Steve Anderson