SlideShare a Scribd company logo
Strategies on How to Overcome
Security Challenges Unique to Cloud-
Native Apps
Zane Lackey
@ZaneLackey
Kamala Dasika
@DasikaKN
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Transform how the world builds software.
Modern Software Methodology | Modern Cloud-Native Platform
About Pivotal
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
76% 35%
100-
150
* April 2017 Internet Security Threat Report
+ Web Applications Security Statistics Report 2016
Websites with
Vulnerabilities*
Increase in
Ransomeware*
Days to Patch/Fix
in Enterprises+
Security Matters to All of Us
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Bespoke Application Process Drives Complex,
Manual Deploys & Waterfall Release Cycles
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
The brittle stack.
The long accreditation cycle.
The culture of no.
The unpatched server.
The un-versioned application.
The inconsistent configuration
The leaked credential.
Security Tradition
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Security Tradition Reduce risk by slowing down.
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Reduce risk by going faster.Cloud Native Security
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
CORE
PILLARS
Turn-key
Compliance
Repair Repave Rotate
Starve Resources Needed for Attacks
Time/Delays, Misconfigured/Unpatched Software, Leaked
Credentials
Address vlnerabilities
caused by
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Immutable consistent infrastructure
2-layer scheduler
Hardened container boundary
Constant, full-stack patching
Ephemeral servers
Fully encrypted network
Ubiquitous policy enforcement
Control of software supply chain
Monitoring and scanning integration
Turn-key compliance
Platform Security
Concepts
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Everything to Deploy and Manage the App
4. Health
management
2. Metrics
3. Log
Aggregation
1. Roles and
Policy
5. Security
and
Isolation
7. Scaling
6. Blue-
Green
deploymentü  Consistent Contracts
ü  Fully Automated, Repeatable
platform managed DevOps
processes
ü  Developer + Ops + Security
Friendly Constructs
ü  Infrastructure Failure
Agnostic
Structured Automation
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
12
Deployment & Buildpacks
cf push
cf push –b <buildpack>
Deployed
Artifact
Detect
(Buildpack)
Compile
(Dependencies)
Release
(Execution config
& command)
Community
Buildpacks
Custom
Buildpacks
Partner
Buildpacks
Built-In
Code
Artifacts
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
13
Deployment & Buildpacks
cf push
cf push –b <buildpack>
Deployed
Artifact
Detect
(Buildpack)
Compile
(Dependencies)
Release
(Execution config
& command)
Community
Buildpacks
Custom
Buildpacks
Partner
Buildpacks
Built-In
Code
Artifacts
Detect
Compile
Release
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Stemcell Hardening
•  Stemcell = Bare minimal OS +
PCF specific utilities and
configuration files
•  Hardening guidance from
commercial and govt. sources
•  BOSH Add Ons
–  Ensure certain software runs
on all VMs managed by the
Director.
–  E.g. security agents like
Tripwire, IPsec, etc., anti-
viruses like McAfee, health
monitoring agents l and
logging agents
BOSH/
Ops
Manager
Stemcell
VM
VMVM
VM
VM
VM
Release
Manifest
(simplified to illustrate the point)
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Stemcell Hardening
•  Stemcell = Bare minimal OS +
PCF specific utilities and
configuration files
•  Hardening guidance from
commercial and govt. sources
•  BOSH Add Ons
–  Ensure certain software runs
on all VMs managed by the
Director.
–  E.g. security agents like
Tripwire, IPsec, etc., anti-
viruses like McAfee, health
monitoring agents l and
logging agents
BOSH/
Ops
Manager
Stemcell
VM
VMVM
VM
VM
VM
Release
Manifest
(simplified to illustrate the point)
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Each Layer Upgradable with No Downtime
App Runtime*
File system mapping
Application
Linux host & kernel
Blue-Green deploy
Canary style deploy
* e.g. Embedded webserver, app configurations, JRE, agents for services packaged as buildpacks
C
o
n
t
a
i
n
e
r
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Upgrade and patch with rolling “canary” deploys
X YM NA B Update introduced. If the tests
pass, keep going
X YM NA B
X YM NA B
Apps redeployed to clear VMs
A,B,M,N,X,Y - Application instances
- VM prior to update
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Upgrade and patch with rolling “canary” deploys
X YM NA B
X YM NA B
X YM N
X YM NA B
X YM NA B
Automated, No downtime
Atomic rolling update
X YM NA B A B
19
“The first time ever we fully upgraded Cloud
Infrastructure with Zero Impact.
In Production.
During Business Hours.
During Peak Business Hours.”
Source: Internal Feedback Shown by Greg Otto, Executive Director@Comcast at Cloud Foundry Summit 2016
© Copyright 2017 Pivotal Software, Inc. All rights reserved.
Guest Speaker: Zane Lackey
•  Started out in offense
–  iSEC Partners / NCC Group
•  Moved to defense
–  First head of security at Etsy, built and
lead the four security groups
•  Now scaling defense for many orgs
–  Co-founder / CSO at Signal Sciences,
delivering a product that defends web
applications in the DevOps/Cloud world
Lessons learned being at the forefront of the shift
to DevOps/Cloud
Spoiler: Security shifts from being a gatekeeper
to enabling teams to be secure by default
What has changed?
The new realities in a DevSecOps world:
1.  Changes happen multiple orders of magnitude faster
than previously
2.  Security only becomes successful if it can bake in to
the Development/DevOps process
3.  For many apps, cost of attack is so low you will be
attacked even if you’re not a brand name
The new realities in a DevSecOps world:
1.  Changes happen multiple orders of magnitude faster
than previously
2.  Security only becomes successful if it can bake in to
the Development/DevOps process
3.  For many apps, cost of attack is so low you will be
attacked even if you’re not a brand name
The new realities in a DevSecOps world:
1.  Changes happen multiple orders of magnitude faster
than previously
2.  Security only becomes successful if it can bake in to
the Development/DevOps process
3.  For many apps, cost of attack is so low you will be
attacked even if you’re not a brand name
Let’s	change	our	approach
What new concepts should security focus on?
What new concepts should security focus on?
Visibility + Feedback
Except… These aren’t new concepts!
Performance monitoring, data analytics,
A/B testing are all about visibility + feedback
The same hard lessons are slowly shifting to
security
First, a story from the old days…
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
How can we improve?
Ex: Which of these is a quicker way to spot an
attack?
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
Surface security visibility for everyone, not just
the security team
(if the security team even exists)
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
Obtaining	be3er	feedback
Three keys to modern feedback loops:
1.  Combination of bug bounty + pentests
2.  Bounty is not a replacement for pentest, it augments
pentest
3.  Bounty gives general but more real time feedback,
pentest shifts to giving more directed but less
frequent feedback
Three keys to modern feedback loops:
1.  Combination of bug bounty + pentests
2.  Bounty is not a replacement for pentest, it augments
pentest
3.  Bounty gives general but more real time feedback,
pentest shifts to giving more directed but less
frequent feedback
Three keys to modern feedback loops:
1.  Combination of bug bounty + pentests
2.  Bounty is not a replacement for pentest, it augments
pentest
3.  Bounty gives general but more real time feedback,
pentest shifts to giving more directed but less
frequent feedback
Visibility + Feedback success story:
“I discovered the vulnerability late Friday afternoon and
wasn't quite ready to email it to them … [Etsy] had
detected my requests and pushed a patch Saturday
morning before I could email them. This was by far the
fastest response time by any company I've reported to.”
- Source: https://www.reddit.com/r/netsec/comments/vbrzg/
etsy_has_been_one_of_the_best_companies_ive
Embrace DevOps, Cloud, and other means of
increasing velocity. But do safely by obtaining:
Visibility + Feedback
Thanks!
Strategies on How to Overcome
Security Challenges Unique to Cloud-
Native Apps
Zane Lackey
@ZaneLackey
Kamala Dasika
@DasikaKN

More Related Content

PDF
Journey to Cloud-Native - Reducing Production Risks at Scale
PDF
Journey to Cloud-Native: Making Sense of Your Service Interactions
PPTX
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
PDF
How to Overcome Data Challenges When Refactoring Monoliths to Microservices
PDF
Pivotal Cloud Foundry: A Technical Overview
PPTX
Don't Let Legacy CDNs Hold You Back
PDF
Webinar - What's New at Cloudflare (8/23/18)
PPTX
Application Security in the Cloud - Best Practices
Journey to Cloud-Native - Reducing Production Risks at Scale
Journey to Cloud-Native: Making Sense of Your Service Interactions
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
How to Overcome Data Challenges When Refactoring Monoliths to Microservices
Pivotal Cloud Foundry: A Technical Overview
Don't Let Legacy CDNs Hold You Back
Webinar - What's New at Cloudflare (8/23/18)
Application Security in the Cloud - Best Practices

What's hot (19)

PDF
Pivotal Cloud Foundry 1.10: First Look - Windows at Scale, Network Isolation
PPTX
From Monolith to Microservices – and Beyond!
PDF
Using Pivotal Cloud Foundry with Google’s BigQuery and Cloud Vision API
PDF
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
PDF
Pivotal Web Services - a Real World Example of Running Cloud Foundry at Scale...
PPTX
The Cloud Native Journey
PDF
Cloud Native Computing: What does it mean, and is your app Cloud Native?
PDF
Why Microservice
PPTX
SRV210 Improving Microservice and Serverless Observability with Monitoring Data
PDF
DevOps in the Real World: Know What it Takes to Make it Work
PDF
Azure Spring Cloud Workshop - June 17, 2020
PDF
Azure F5 Solutions
PPTX
Microservice architecture case study
PPTX
Julia Liuson at SpringOne 2020
PDF
Cloud Foundry Summit 2015: Managing Hybrid Deployments Using Cloud Foundry on...
PDF
Accelerate Digital Transformation with Pivotal Cloud Foundry on Azure
PDF
Enterprise Development Trends 2016 - Cloud, Container and Microservices Insig...
PDF
Pivotal Cloud Foundry 2.3: A First Look
PPTX
July 28: Tanzu Mission Control: Resolving Kubernetes fragmentation across Dev...
Pivotal Cloud Foundry 1.10: First Look - Windows at Scale, Network Isolation
From Monolith to Microservices – and Beyond!
Using Pivotal Cloud Foundry with Google’s BigQuery and Cloud Vision API
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
Pivotal Web Services - a Real World Example of Running Cloud Foundry at Scale...
The Cloud Native Journey
Cloud Native Computing: What does it mean, and is your app Cloud Native?
Why Microservice
SRV210 Improving Microservice and Serverless Observability with Monitoring Data
DevOps in the Real World: Know What it Takes to Make it Work
Azure Spring Cloud Workshop - June 17, 2020
Azure F5 Solutions
Microservice architecture case study
Julia Liuson at SpringOne 2020
Cloud Foundry Summit 2015: Managing Hybrid Deployments Using Cloud Foundry on...
Accelerate Digital Transformation with Pivotal Cloud Foundry on Azure
Enterprise Development Trends 2016 - Cloud, Container and Microservices Insig...
Pivotal Cloud Foundry 2.3: A First Look
July 28: Tanzu Mission Control: Resolving Kubernetes fragmentation across Dev...
Ad

Similar to Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps (20)

PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
PDF
dotSecurity2017
PDF
Pragmatic Pipeline Security
PDF
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
PPTX
Securing a great DX - DevSecOps Days Singapore 2018
PPT
How to Build a DevOps Toolchain
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
DevOps trends to look out for in 2022.pdf
PDF
DevSecOps in 2031: How robots and humans will secure apps together Log
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Patterns and Antipatterns for Software updates
PDF
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
PDF
5 Challenges of Moving Applications to the Cloud
PDF
Agile and continuous delivery – How IBM Watson Workspace is built
PPTX
Continuous security: Bringing agility to the secure development lifecycle
PDF
Continuous Delivery in a Legacy Shop—One Step at a Time
PDF
5 principles-securing-devops-veracode-whitepaper
PDF
DevSecOps and the CI/CD Pipeline
PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
PPT
Continuous Deployment
2021-10-14 The Critical Role of Security in DevOps.pdf
dotSecurity2017
Pragmatic Pipeline Security
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a great DX - DevSecOps Days Singapore 2018
How to Build a DevOps Toolchain
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
DevOps trends to look out for in 2022.pdf
DevSecOps in 2031: How robots and humans will secure apps together Log
The End of Security as We Know It - Shannon Lietz
Patterns and Antipatterns for Software updates
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
5 Challenges of Moving Applications to the Cloud
Agile and continuous delivery – How IBM Watson Workspace is built
Continuous security: Bringing agility to the secure development lifecycle
Continuous Delivery in a Legacy Shop—One Step at a Time
5 principles-securing-devops-veracode-whitepaper
DevSecOps and the CI/CD Pipeline
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Continuous Deployment
Ad

More from VMware Tanzu (20)

PDF
Spring into AI presented by Dan Vega 5/14
PDF
What AI Means For Your Product Strategy And What To Do About It
PDF
Make the Right Thing the Obvious Thing at Cardinal Health 2023
PPTX
Enhancing DevEx and Simplifying Operations at Scale
PDF
Spring Update | July 2023
PPTX
Platforms, Platform Engineering, & Platform as a Product
PPTX
Building Cloud Ready Apps
PDF
Spring Boot 3 And Beyond
PDF
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
PDF
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
PDF
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
PPTX
tanzu_developer_connect.pptx
PDF
Tanzu Virtual Developer Connect Workshop - French
PDF
Tanzu Developer Connect Workshop - English
PDF
Virtual Developer Connect Workshop - English
PDF
Tanzu Developer Connect - French
PDF
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
PDF
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
PDF
SpringOne Tour: The Influential Software Engineer
PDF
SpringOne Tour: Domain-Driven Design: Theory vs Practice
Spring into AI presented by Dan Vega 5/14
What AI Means For Your Product Strategy And What To Do About It
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Enhancing DevEx and Simplifying Operations at Scale
Spring Update | July 2023
Platforms, Platform Engineering, & Platform as a Product
Building Cloud Ready Apps
Spring Boot 3 And Beyond
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
tanzu_developer_connect.pptx
Tanzu Virtual Developer Connect Workshop - French
Tanzu Developer Connect Workshop - English
Virtual Developer Connect Workshop - English
Tanzu Developer Connect - French
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: Domain-Driven Design: Theory vs Practice

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction

Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps

  • 1. Strategies on How to Overcome Security Challenges Unique to Cloud- Native Apps Zane Lackey @ZaneLackey Kamala Dasika @DasikaKN
  • 2. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Transform how the world builds software. Modern Software Methodology | Modern Cloud-Native Platform About Pivotal
  • 4. © Copyright 2017 Pivotal Software, Inc. All rights reserved. 76% 35% 100- 150 * April 2017 Internet Security Threat Report + Web Applications Security Statistics Report 2016 Websites with Vulnerabilities* Increase in Ransomeware* Days to Patch/Fix in Enterprises+ Security Matters to All of Us
  • 5. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Bespoke Application Process Drives Complex, Manual Deploys & Waterfall Release Cycles
  • 6. © Copyright 2017 Pivotal Software, Inc. All rights reserved. The brittle stack. The long accreditation cycle. The culture of no. The unpatched server. The un-versioned application. The inconsistent configuration The leaked credential. Security Tradition
  • 7. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Security Tradition Reduce risk by slowing down.
  • 8. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Reduce risk by going faster.Cloud Native Security
  • 9. © Copyright 2017 Pivotal Software, Inc. All rights reserved. CORE PILLARS Turn-key Compliance Repair Repave Rotate Starve Resources Needed for Attacks Time/Delays, Misconfigured/Unpatched Software, Leaked Credentials Address vlnerabilities caused by
  • 10. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Immutable consistent infrastructure 2-layer scheduler Hardened container boundary Constant, full-stack patching Ephemeral servers Fully encrypted network Ubiquitous policy enforcement Control of software supply chain Monitoring and scanning integration Turn-key compliance Platform Security Concepts
  • 11. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Everything to Deploy and Manage the App 4. Health management 2. Metrics 3. Log Aggregation 1. Roles and Policy 5. Security and Isolation 7. Scaling 6. Blue- Green deploymentü  Consistent Contracts ü  Fully Automated, Repeatable platform managed DevOps processes ü  Developer + Ops + Security Friendly Constructs ü  Infrastructure Failure Agnostic Structured Automation
  • 12. © Copyright 2017 Pivotal Software, Inc. All rights reserved. 12 Deployment & Buildpacks cf push cf push –b <buildpack> Deployed Artifact Detect (Buildpack) Compile (Dependencies) Release (Execution config & command) Community Buildpacks Custom Buildpacks Partner Buildpacks Built-In Code Artifacts
  • 13. © Copyright 2017 Pivotal Software, Inc. All rights reserved. 13 Deployment & Buildpacks cf push cf push –b <buildpack> Deployed Artifact Detect (Buildpack) Compile (Dependencies) Release (Execution config & command) Community Buildpacks Custom Buildpacks Partner Buildpacks Built-In Code Artifacts Detect Compile Release
  • 14. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Stemcell Hardening •  Stemcell = Bare minimal OS + PCF specific utilities and configuration files •  Hardening guidance from commercial and govt. sources •  BOSH Add Ons –  Ensure certain software runs on all VMs managed by the Director. –  E.g. security agents like Tripwire, IPsec, etc., anti- viruses like McAfee, health monitoring agents l and logging agents BOSH/ Ops Manager Stemcell VM VMVM VM VM VM Release Manifest (simplified to illustrate the point)
  • 15. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Stemcell Hardening •  Stemcell = Bare minimal OS + PCF specific utilities and configuration files •  Hardening guidance from commercial and govt. sources •  BOSH Add Ons –  Ensure certain software runs on all VMs managed by the Director. –  E.g. security agents like Tripwire, IPsec, etc., anti- viruses like McAfee, health monitoring agents l and logging agents BOSH/ Ops Manager Stemcell VM VMVM VM VM VM Release Manifest (simplified to illustrate the point)
  • 16. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Each Layer Upgradable with No Downtime App Runtime* File system mapping Application Linux host & kernel Blue-Green deploy Canary style deploy * e.g. Embedded webserver, app configurations, JRE, agents for services packaged as buildpacks C o n t a i n e r
  • 17. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Upgrade and patch with rolling “canary” deploys X YM NA B Update introduced. If the tests pass, keep going X YM NA B X YM NA B Apps redeployed to clear VMs A,B,M,N,X,Y - Application instances - VM prior to update
  • 18. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Upgrade and patch with rolling “canary” deploys X YM NA B X YM NA B X YM N X YM NA B X YM NA B Automated, No downtime Atomic rolling update X YM NA B A B
  • 19. 19 “The first time ever we fully upgraded Cloud Infrastructure with Zero Impact. In Production. During Business Hours. During Peak Business Hours.” Source: Internal Feedback Shown by Greg Otto, Executive Director@Comcast at Cloud Foundry Summit 2016
  • 20. © Copyright 2017 Pivotal Software, Inc. All rights reserved. Guest Speaker: Zane Lackey •  Started out in offense –  iSEC Partners / NCC Group •  Moved to defense –  First head of security at Etsy, built and lead the four security groups •  Now scaling defense for many orgs –  Co-founder / CSO at Signal Sciences, delivering a product that defends web applications in the DevOps/Cloud world
  • 21. Lessons learned being at the forefront of the shift to DevOps/Cloud
  • 22. Spoiler: Security shifts from being a gatekeeper to enabling teams to be secure by default
  • 24. The new realities in a DevSecOps world: 1.  Changes happen multiple orders of magnitude faster than previously 2.  Security only becomes successful if it can bake in to the Development/DevOps process 3.  For many apps, cost of attack is so low you will be attacked even if you’re not a brand name
  • 25. The new realities in a DevSecOps world: 1.  Changes happen multiple orders of magnitude faster than previously 2.  Security only becomes successful if it can bake in to the Development/DevOps process 3.  For many apps, cost of attack is so low you will be attacked even if you’re not a brand name
  • 26. The new realities in a DevSecOps world: 1.  Changes happen multiple orders of magnitude faster than previously 2.  Security only becomes successful if it can bake in to the Development/DevOps process 3.  For many apps, cost of attack is so low you will be attacked even if you’re not a brand name
  • 28. What new concepts should security focus on?
  • 29. What new concepts should security focus on? Visibility + Feedback
  • 30. Except… These aren’t new concepts!
  • 31. Performance monitoring, data analytics, A/B testing are all about visibility + feedback
  • 32. The same hard lessons are slowly shifting to security
  • 33. First, a story from the old days…
  • 36. How can we improve?
  • 37. Ex: Which of these is a quicker way to spot an attack?
  • 40. Surface security visibility for everyone, not just the security team (if the security team even exists)
  • 43. Three keys to modern feedback loops: 1.  Combination of bug bounty + pentests 2.  Bounty is not a replacement for pentest, it augments pentest 3.  Bounty gives general but more real time feedback, pentest shifts to giving more directed but less frequent feedback
  • 44. Three keys to modern feedback loops: 1.  Combination of bug bounty + pentests 2.  Bounty is not a replacement for pentest, it augments pentest 3.  Bounty gives general but more real time feedback, pentest shifts to giving more directed but less frequent feedback
  • 45. Three keys to modern feedback loops: 1.  Combination of bug bounty + pentests 2.  Bounty is not a replacement for pentest, it augments pentest 3.  Bounty gives general but more real time feedback, pentest shifts to giving more directed but less frequent feedback
  • 46. Visibility + Feedback success story: “I discovered the vulnerability late Friday afternoon and wasn't quite ready to email it to them … [Etsy] had detected my requests and pushed a patch Saturday morning before I could email them. This was by far the fastest response time by any company I've reported to.” - Source: https://www.reddit.com/r/netsec/comments/vbrzg/ etsy_has_been_one_of_the_best_companies_ive
  • 47. Embrace DevOps, Cloud, and other means of increasing velocity. But do safely by obtaining: Visibility + Feedback
  • 49. Strategies on How to Overcome Security Challenges Unique to Cloud- Native Apps Zane Lackey @ZaneLackey Kamala Dasika @DasikaKN