SlideShare a Scribd company logo
Zettaset
XCrypt Service Encryption
October 7–10, 2019
Austin Convention Center
Tim Reilly, COO Maksim Yankovskiy, VP Engineering
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Never has DATA been so IMPORTANT
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
of the world’s data
has been created
in the last 2 years
90%
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
16 Zettabytes (16x1021)
The world’s largest
taxi company, owns
no vehicles.
Uber
The world’s most
popular media owner,
creates no content.
Alibaba
The world’s largest
accommodation provider,
owns no real estate.
Facebook
Airbnb
The most valuable retailer,
has no inventory
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Source: Visual Capitalist, Q4 2018
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Digital Disruption
10x 1/10th
More Innovation The Cost
100xThe Power
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
DATARECORDS LOST OR STOLEN SINCE2013
6 million perday
onaverage
Technology
32%
Government
10%
Retail
9%
Financial
4%
Entertainment
3%
Healthcare
2%
Education
1%
Other
39%
Every type of organization is exposed
Traditional security is no longer sufficient
Breaches are growing year-on-year across all sectors
Source: Gemalto breachlevelindex, Q1 2018
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
UNENCRYPTED DATA
95%
of breaches involved
unencrypted data
Source: breachlevelindex, Q1 2018
Main cause of damages
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Largest component of data breach is lost business2018 Survey
• Data breaches will
increase in frequency &
diminish shareholder value
• Pessimistic about ability to
protect from cyber threats
• Cybersecurity is still not
considered a strategic
priority
• Unsecured IoT devices will
likely cause a data breach
• More investment to achieve
regulatory compliance
Data Breaches Are Frequent & Costly
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
DevOps & Data
• Storage platforms – scalable,
automated & dynamic
• Development data is still data
• Dev environment security lags
behind production
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
How Do Systems Get Breached?
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
The Foundation is Trust in Data
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Security & Compliance Requirements
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Why Not Just Use Traditional Data Protection Tools?
• Centralized
• Scalability issues
• Not data service agnostic
• Not cloud native
• Complicated
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Better Data Protection Through BOSH
• Transparency!
• Encrypt at runtime
• Data service agnostic: work with any data service
• Key management – separate but automated
• Scales with Pivotal Platform – set up, tear down
• No changes to existing processes
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
XCrypt BOSH Platform Architecture
1
7
Data Service
Instance
MySQL, Redis, etc.
Virtual Key Manager (KMIP),
Soft HSM (PKCS#11)
BOSH Release
License Server
BOSH Release
XCrypt Encryption
Client for BOSH
Add-On
persistent storage
(encrypted)
BOSH
Director *
deployment
key exchange
BOSH Agent*
* modified CF components,
contributed to open-source CF
Certificate Authority
BOSH Release
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
A Word About Containers
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Thank you!

More Related Content

PDF
What is a Bot and why you should care
PPTX
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PPTX
The Internet Report: Episode 7 Week of May 4 - May 10
PDF
Cybersecurity | Cylus: Railway Cybersecurity
PPTX
Building Data Environments for Production Microservices with Geode
PDF
Cloudflare Partner Program 2020
PDF
Capital FM Arena
What is a Bot and why you should care
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The Internet Report: Episode 7 Week of May 4 - May 10
Cybersecurity | Cylus: Railway Cybersecurity
Building Data Environments for Production Microservices with Geode
Cloudflare Partner Program 2020
Capital FM Arena

What's hot (17)

PPTX
Innovate for Cyber Resilience
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PPTX
Cisco IoT World Forum 2014: Airwatch Breakout Session
PPTX
Going Beyond the Cloud to Modernize Your Banking Infrastructure
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PDF
Security, Compliance and Cloud - Jelecos
PDF
Keynotes Akamai Trust No One City Tour
PDF
Social Engineering and other Foes in the GDPR Year
PDF
Cybersecurity | D-fend: Counter drone solution for urban environments
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
PDF
How to Counter Cybersecurity Attacks - Trust No One
PPTX
Ben goodman cybersecurity in the iiot
PPTX
Drones and logistics - What legal issues and how to handle them
PDF
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
PPTX
Living In a World of Data Exploitation - CPDP 2017
PPTX
IoT, arquitectura de solución y cómo enriquecerlo con Confluent
Innovate for Cyber Resilience
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Cisco IoT World Forum 2014: Airwatch Breakout Session
Going Beyond the Cloud to Modernize Your Banking Infrastructure
The Secure Path to Value in the Cloud by Denny Heaberlin
Security, Compliance and Cloud - Jelecos
Keynotes Akamai Trust No One City Tour
Social Engineering and other Foes in the GDPR Year
Cybersecurity | D-fend: Counter drone solution for urban environments
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
How to Counter Cybersecurity Attacks - Trust No One
Ben goodman cybersecurity in the iiot
Drones and logistics - What legal issues and how to handle them
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
Living In a World of Data Exploitation - CPDP 2017
IoT, arquitectura de solución y cómo enriquecerlo con Confluent
Ad

Similar to Software-Defined Security: The New School of Security Designed for DevOps (20)

PPTX
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
PDF
Beyond Caching: Extending Redis Enterprise for Real-Time Streams Processing
PPTX
Security in the Hybrid Cloud at Liberty Mutual
PPTX
Data Modernization for Spring-Based Microservices on Pivotal Platform
PPTX
The Cloud Challenge
PDF
Highly Available and Resilient Multi-Site Deployments Using Spinnaker
PPTX
It’s a Multi-Cloud World, But What About The Data?
PPTX
Tea Ceremonies: Steeping IT Ops in Your Developer's Hot Water
PPTX
Experience + Education = Empowerment
PDF
Achieving High Throughput With Reliability In Transactional Systems
PDF
AutoZone and the Road to Cloud Native
PDF
Cross-Platform Observability for Cloud Foundry
PPTX
Securing Pivotal Platform at Prime Therapeutics
PDF
Fast 5 Things You Can Do Now to Get Ready for the Cloud
PDF
Accelerating the Developers' Road to the Cloud at Enterprise Scale
PPTX
How to Manage Microservices and APIs with Apigee and Istio
PDF
Architectures That Bend but Don't Break
PDF
Spring Cloud Gateway - Stéphane Maldini
PDF
Lattice: A Cloud-Native Platform for Your Spring Applications
PDF
Spring Cloud Gateway
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
Beyond Caching: Extending Redis Enterprise for Real-Time Streams Processing
Security in the Hybrid Cloud at Liberty Mutual
Data Modernization for Spring-Based Microservices on Pivotal Platform
The Cloud Challenge
Highly Available and Resilient Multi-Site Deployments Using Spinnaker
It’s a Multi-Cloud World, But What About The Data?
Tea Ceremonies: Steeping IT Ops in Your Developer's Hot Water
Experience + Education = Empowerment
Achieving High Throughput With Reliability In Transactional Systems
AutoZone and the Road to Cloud Native
Cross-Platform Observability for Cloud Foundry
Securing Pivotal Platform at Prime Therapeutics
Fast 5 Things You Can Do Now to Get Ready for the Cloud
Accelerating the Developers' Road to the Cloud at Enterprise Scale
How to Manage Microservices and APIs with Apigee and Istio
Architectures That Bend but Don't Break
Spring Cloud Gateway - Stéphane Maldini
Lattice: A Cloud-Native Platform for Your Spring Applications
Spring Cloud Gateway
Ad

More from VMware Tanzu (20)

PDF
Spring into AI presented by Dan Vega 5/14
PDF
What AI Means For Your Product Strategy And What To Do About It
PDF
Make the Right Thing the Obvious Thing at Cardinal Health 2023
PPTX
Enhancing DevEx and Simplifying Operations at Scale
PDF
Spring Update | July 2023
PPTX
Platforms, Platform Engineering, & Platform as a Product
PPTX
Building Cloud Ready Apps
PDF
Spring Boot 3 And Beyond
PDF
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
PDF
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
PDF
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
PPTX
tanzu_developer_connect.pptx
PDF
Tanzu Virtual Developer Connect Workshop - French
PDF
Tanzu Developer Connect Workshop - English
PDF
Virtual Developer Connect Workshop - English
PDF
Tanzu Developer Connect - French
PDF
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
PDF
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
PDF
SpringOne Tour: The Influential Software Engineer
PDF
SpringOne Tour: Domain-Driven Design: Theory vs Practice
Spring into AI presented by Dan Vega 5/14
What AI Means For Your Product Strategy And What To Do About It
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Enhancing DevEx and Simplifying Operations at Scale
Spring Update | July 2023
Platforms, Platform Engineering, & Platform as a Product
Building Cloud Ready Apps
Spring Boot 3 And Beyond
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
tanzu_developer_connect.pptx
Tanzu Virtual Developer Connect Workshop - French
Tanzu Developer Connect Workshop - English
Virtual Developer Connect Workshop - English
Tanzu Developer Connect - French
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: Domain-Driven Design: Theory vs Practice

Recently uploaded (20)

PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
top salesforce developer skills in 2025.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Digital Strategies for Manufacturing Companies
PPTX
ai tools demonstartion for schools and inter college
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Softaken Excel to vCard Converter Software.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Design an Analysis of Algorithms I-SECS-1021-03
Operating system designcfffgfgggggggvggggggggg
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Computer Software and OS of computer science of grade 11.pptx
CHAPTER 2 - PM Management and IT Context
Odoo Companies in India – Driving Business Transformation.pdf
L1 - Introduction to python Backend.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Upgrade and Innovation Strategies for SAP ERP Customers
Adobe Illustrator 28.6 Crack My Vision of Vector Design
top salesforce developer skills in 2025.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Digital Strategies for Manufacturing Companies
ai tools demonstartion for schools and inter college
Reimagine Home Health with the Power of Agentic AI​
Wondershare Filmora 15 Crack With Activation Key [2025
Digital Systems & Binary Numbers (comprehensive )
Softaken Excel to vCard Converter Software.pdf

Software-Defined Security: The New School of Security Designed for DevOps

  • 1. Zettaset XCrypt Service Encryption October 7–10, 2019 Austin Convention Center Tim Reilly, COO Maksim Yankovskiy, VP Engineering
  • 2. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Never has DATA been so IMPORTANT
  • 3. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ of the world’s data has been created in the last 2 years 90%
  • 4. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 16 Zettabytes (16x1021)
  • 5. The world’s largest taxi company, owns no vehicles. Uber The world’s most popular media owner, creates no content. Alibaba The world’s largest accommodation provider, owns no real estate. Facebook Airbnb The most valuable retailer, has no inventory
  • 6. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Source: Visual Capitalist, Q4 2018
  • 7. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Digital Disruption 10x 1/10th More Innovation The Cost 100xThe Power
  • 8. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ DATARECORDS LOST OR STOLEN SINCE2013 6 million perday onaverage Technology 32% Government 10% Retail 9% Financial 4% Entertainment 3% Healthcare 2% Education 1% Other 39% Every type of organization is exposed Traditional security is no longer sufficient Breaches are growing year-on-year across all sectors Source: Gemalto breachlevelindex, Q1 2018
  • 9. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ UNENCRYPTED DATA 95% of breaches involved unencrypted data Source: breachlevelindex, Q1 2018 Main cause of damages
  • 10. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Largest component of data breach is lost business2018 Survey • Data breaches will increase in frequency & diminish shareholder value • Pessimistic about ability to protect from cyber threats • Cybersecurity is still not considered a strategic priority • Unsecured IoT devices will likely cause a data breach • More investment to achieve regulatory compliance Data Breaches Are Frequent & Costly
  • 11. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ DevOps & Data • Storage platforms – scalable, automated & dynamic • Development data is still data • Dev environment security lags behind production
  • 12. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ How Do Systems Get Breached?
  • 13. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ The Foundation is Trust in Data
  • 14. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Security & Compliance Requirements
  • 15. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Why Not Just Use Traditional Data Protection Tools? • Centralized • Scalability issues • Not data service agnostic • Not cloud native • Complicated
  • 16. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Better Data Protection Through BOSH • Transparency! • Encrypt at runtime • Data service agnostic: work with any data service • Key management – separate but automated • Scales with Pivotal Platform – set up, tear down • No changes to existing processes
  • 17. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ XCrypt BOSH Platform Architecture 1 7 Data Service Instance MySQL, Redis, etc. Virtual Key Manager (KMIP), Soft HSM (PKCS#11) BOSH Release License Server BOSH Release XCrypt Encryption Client for BOSH Add-On persistent storage (encrypted) BOSH Director * deployment key exchange BOSH Agent* * modified CF components, contributed to open-source CF Certificate Authority BOSH Release
  • 18. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ A Word About Containers
  • 19. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Thank you!