SlideShare a Scribd company logo
Platform and Security Engineering join forces to
build more secure and robust applications.
The death of #security
as we know it
Christoph Hartmann
@chri_hartmann
Hi, I am Chris. I am CTO
at Mondoo - leader in
Security Posture
Management
What is your
background?
Y
I co-created the open source
security projects DevSec Project
and InSpec, Co-Founded
Vulcano Security (acquired by
Chef Software) and was Director
of Engineering at Chef Software
@chri_hartmann
What is the
problem?
@chri_hartmann
4
Hackers used to look like this
5
Ransomware is a business
Name Name
Words words
Sales Quotas
Playbooks
Customer
Support
Affiliate
Programs
6
Average of 20% increase
of YoY CVE publication
Vulnerability Discovery
0⃣
0-Day
Exploit
💥
Vulnerability
discovered
📢
CVE
published
🏗
Patch
by vendor
📝
CVE
assigned
0⃣
Exploit
~25% of CVEs have known exploits
14% exploits published before the patches
23% exploits published in the first week after CVE
50% exploits were published in the first month after CVE
Patch Rollout
🎟
Tickets
created
🐌
Rollout
Slow
🏗
Fixed
in dev
🔎
Identify
in dev
🛑
Report
created
According to NTT Application Security
average time to fix high severity
vulnerabilities is about 246 days
9
🔥
Yearly increase of 20% of known vulnerabilities
🏎
Hackers use full automation to discover and hack targets, about 90% of exploits are
available within the first month after the CVE has been published
🐌
Rollout of fixes is way too slow
Issues outpace the fix
10
Independent survey of
1100 IT and security professionals
11
Hardening of
Infrastructure
(Cloud, Servers,
Workstation)
Patch
Management
01 02
Main Problems:
Why Hackers are so successful?
The same root causes are also corroborated in the Cyber Signals Report by
Microsoft that revealed 80% of attacks can be attributed to outdated
software and misconfiguration.
Why is it so
difficult?
@chri_hartmann
13
Software delivery
Local
Development
Source Control CI/CD Pre-Production Production
14
Use Case:
Ensure that Cloud Storage Buckets
have a uniform bucket level access
enabled
15
Ensure that Cloud Storage Buckets
have a uniform bucket level access
enabled
Security Engineers focus on attack paths
16
Ensure that Cloud Storage Buckets
have a uniform bucket level access
enabled
Platform Engineers focus on automation
17
Software delivery
Local
Development
Source Control CI/CD Pre-Production Production
18
Leads to frustration
19
Security Therapy
Interviewed and worked
with 100+ Sec/DevOps Leaders
Theme In their words…...
More organized threats Software is eating the world so hackers are having a feast
Wait days/weeks to data Coordinating over 30+ security tools to answer if we have the vulnerability and then waiting
for verification it’s been fixed
Security owns all the tools DevOps don’t have consistent access to what security uses, just their outputs aka a giant
spreadsheet
Security vendors are slow Their product roadmap is the same every year, so we hacked a solution to dump into Splunk
Unclear on the right priority for the business The trade off between shipping new features vs fixing what security wants us to fix.
Re-enforces good practices I need my teams to have a way continuous improve our posture and for management to
recognize the effort
Security is Hard
What is the
solution?
@chri_hartmann
Cloud Services
Cluster Nodes
Workloads
(Deployments / Pods)
Cluster Configuration
Application Containers
Unified
View
Tech Stack
Cloud Services
Cluster Nodes
Workloads
(Deployments / Pods)
Cluster Configuration
Application Containers
Application Delivery Pipeline
Local
Development
Source Control CI/CD
25
Ensure that Cloud Storage Buckets have a
uniform bucket level access enabled
Reach the next level:
Focus on Problem
26
Software delivery
Local
Development
Source Control CI/CD Pre-Production Production
27
What are successful
security engineers using
Access: Every
developer and
security engineer has
access to the same
tooling
Coverage: security
tooling that supports
build and runtime
Automation: security
tooling that works
hand-in-hand with
automation
Extensible: security
tooling that has open
source foundation,
not hard-coded rules
1 2
3 4
28
open source security
https://cnquery.io
Asset Inventory, search and gather
information about your
infrastructure
https://cnspec.io
Security Scanner, scan for
vulnerabilities and
misconfiguration
29
Amazon S3 buckets do not allow public read access
S3 Buckets are configured with 'Block public access'
Easily ask questions with
GraphQL-based MQL
30
Use Security as Code to
define requirements
31
Discover Security Content
Security Registry
mondoo.com/registry
Security Policies
github.com/mondoohq/cnspec-policies
Inventory and Incident Response Query Packs
github.com/mondoohq/cnquery-packs
32
We can be more secure!
Local
Development
Source Control CI/CD Pre-Production Production
We built a platform we are using
we worked at
Soo
Choi
CEO
Dominik
Richter
CPO
Christoph
Hartmann
CTO
Patrick
Münch
CISO
Christoph Hartmann
🐦 @chri_hartmann
✉ chris@mondoo.com
🏠 mondoo.com
Thank you

More Related Content

PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPTX
Finding Security a Home in a DevOps World
PPTX
Finding-Security-A-Home-In-A-DevOps-World.pptx
PDF
The What, Why, and How of DevSecOps
PPTX
Security engineering 101 when good design & security work together
PDF
Agile Relevance in the age of Continuous Everything ....
PDF
DevSecOps for Developers, How To Start (ETC 2020)
PDF
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
SCS DevSecOps Seminar - State of DevSecOps
Finding Security a Home in a DevOps World
Finding-Security-A-Home-In-A-DevOps-World.pptx
The What, Why, and How of DevSecOps
Security engineering 101 when good design & security work together
Agile Relevance in the age of Continuous Everything ....
DevSecOps for Developers, How To Start (ETC 2020)
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps

Similar to "The death of security as we know it: Platform and Security Engineering join forces to build more secure and robust applications", Christoph Hartmann (20)

PPTX
Securing a great DX - DevSecOps Days Singapore 2018
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
DevSecOps: Taking a DevOps Approach to Security
PDF
DevSecOps: The Open Source Way
PPTX
ABN AMRO DevSecOps Journey
PPTX
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
ISACA Ireland Keynote 2015
PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
PPTX
Overcoming Security Challenges in DevOps
PPTX
Secure DevOps - Evolution or Revolution?
PDF
ScotSecure 2020
PDF
Security Checkpoints in Agile SDLC
PDF
Slashing Your Cloud Risk: 3 Must-Do's
PDF
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
PDF
Building Security Into Your Cloud IT Practices
PDF
DevSecOps What Why and How
PDF
Cloud Security - Kloudlearn
PDF
System Security on Cloud
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Securing a great DX - DevSecOps Days Singapore 2018
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: The Open Source Way
ABN AMRO DevSecOps Journey
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
The End of Security as We Know It - Shannon Lietz
ISACA Ireland Keynote 2015
Building a DevSecOps Pipeline Around Your Spring Boot Application
Overcoming Security Challenges in DevOps
Secure DevOps - Evolution or Revolution?
ScotSecure 2020
Security Checkpoints in Agile SDLC
Slashing Your Cloud Risk: 3 Must-Do's
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
Building Security Into Your Cloud IT Practices
DevSecOps What Why and How
Cloud Security - Kloudlearn
System Security on Cloud
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Ad

More from Fwdays (20)

PDF
"Mastering UI Complexity: State Machines and Reactive Patterns at Grammarly",...
PDF
"Effect, Fiber & Schema: tactical and technical characteristics of Effect.ts"...
PPTX
"Computer Use Agents: From SFT to Classic RL", Maksym Shamrai
PPTX
"Як ми переписали Сільпо на Angular", Євген Русаков
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
PDF
"Validation and Observability of AI Agents", Oleksandr Denisyuk
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
PPTX
"Co-Authoring with a Machine: What I Learned from Writing a Book on Generativ...
PPTX
"Human-AI Collaboration Models for Better Decisions, Faster Workflows, and Cr...
PDF
"AI is already here. What will happen to your team (and your role) tomorrow?"...
PPTX
"Is it worth investing in AI in 2025?", Alexander Sharko
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
PDF
"Scaling in space and time with Temporal", Andriy Lupa.pdf
PDF
"Database isolation: how we deal with hundreds of direct connections to the d...
PDF
"Scaling in space and time with Temporal", Andriy Lupa .pdf
PPTX
"Provisioning via DOT-Chain: from catering to drone marketplaces", Volodymyr ...
PPTX
" Observability with Elasticsearch: Best Practices for High-Load Platform", A...
PPTX
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
PPTX
"Istio Ambient Mesh in production: our way from Sidecar to Sidecar-less",Hlib...
"Mastering UI Complexity: State Machines and Reactive Patterns at Grammarly",...
"Effect, Fiber & Schema: tactical and technical characteristics of Effect.ts"...
"Computer Use Agents: From SFT to Classic RL", Maksym Shamrai
"Як ми переписали Сільпо на Angular", Євген Русаков
"AI Transformation: Directions and Challenges", Pavlo Shaternik
"Validation and Observability of AI Agents", Oleksandr Denisyuk
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
"Co-Authoring with a Machine: What I Learned from Writing a Book on Generativ...
"Human-AI Collaboration Models for Better Decisions, Faster Workflows, and Cr...
"AI is already here. What will happen to your team (and your role) tomorrow?"...
"Is it worth investing in AI in 2025?", Alexander Sharko
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Database isolation: how we deal with hundreds of direct connections to the d...
"Scaling in space and time with Temporal", Andriy Lupa .pdf
"Provisioning via DOT-Chain: from catering to drone marketplaces", Volodymyr ...
" Observability with Elasticsearch: Best Practices for High-Load Platform", A...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"Istio Ambient Mesh in production: our way from Sidecar to Sidecar-less",Hlib...
Ad

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Assigned Numbers - 2025 - Bluetooth® Document
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks

"The death of security as we know it: Platform and Security Engineering join forces to build more secure and robust applications", Christoph Hartmann