SlideShare une entreprise Scribd logo
1  sur  107
Télécharger pour lire hors ligne
The Rugged Way in the
 Cloud–Building Reliability
and Security Into Software
        James Wickett
     james.wickett@owasp.org

                               1
2
@wickett
• Operations and Security for software
  delivered on the cloud
• National Instruments, R&D
• Certs: CISSP, GSEC, GCFW, CCSK
• Tags: OWASP, Cloud, DevOps, Ruby
• Blogger at theagileadmin.com
• I do stuff for LASCON (http://lascon.org)
• Twitter: @wickett
                                              3
Cloud @ NI
We built a DevOps team to rapidly deliver
new SaaS products and product functionality
using cloud hosting and services (IaaS, PaaS,
SaaS) as the platform and operations, using
model driven automation, as a key
differentiating element.
With this approach we have delivered
multiple major products to market quickly
with a very small staffing and financial outlay.

                                                 4
National Instruments
•   30 years old; 5000+ employees
    around the world, half in Austin,
    mostly engineers; $873M in
    2010

•   Hardware and software for data
    acquisition, embedded design,
    instrument control, and test

•   LabVIEW is our graphical
    dataflow programming language
    used by scientists and engineers
    in many fields
                                        5
From toys to black holes




                           6
NI’s Cloud Products

• LabVIEW Web UI Builder
• FPGA Compile Cloud
• more to come...


                           7
ni.com/uibuilder
                   8
9
10
FPGA Compile Cloud
• LabVIEW FPGA compiles take hours and
  consume extensive system resources;
  compilers are getting larger and more
  complex
• Implemented on Amazon - EC2,
   Java/Linux,C#/.NET/Windows,
   and LabVIEW FPGA
• Also an on premise product,
  the “Compile Farm”

                                          11
Using the FPGA
Compile Cloud




                 12
Building
Rugged
In

           13
Am I healthy?
                14
Am I healthy?

• Latest and greatest research
• Justification to insurance companies
• Measurement and testing as available
• Point in time snapshot

                                         15
Am I secure?




               16
Am I secure?

• Latest and greatest vulnerabilities
• Justification of budget for tools
• Measurement and testing as available
• Point in time snapshot

                                         17
People, Process, Tech



                        18
It’s not our problem anymore




                           19
If you want to build a ship, don't
drum up people together to collect
wood and don't assign them tasks
and work, but rather teach them to
long for the endless immensity of
the sea
- Antoine Jean-Baptiste Marie Roger de Saint Exupéry




                                                       20
Twitter Survey

What is one word that you
would use to describe ‘IT
Security’ people?


                            21
unicorns
                paranoid                   prepared
                               Tenacious
 HAWT!
                   smart          masochistic


demented   jaded       smart
                                            sisyphean

                                  omnium-gatherum
           facebored
   passionate
                                                 weird
                 drunk           compassionate


                                                         22
Us vs. Them

• Security professionals often degrade
  developers
• Developers don’t get security people
• There is interest across the isle, but often
  ruined by negative language



                                                 23
Why do you see the speck that is in your
brotherʼs eye, but do not notice the log that is in
your own eye?
                                           - Jesus
                                                      24
Adverse conditions
need Rugged solutions


                        25
Adversity fueled
        innovation

• NASA in Space
• Military hard drives
• ATMs in Europe


                         26
Chip and PIN ATM




                   27
The Internets is Mean

• Latency
• Distribution
• Anonymity
• Varied protocols
• People

                        28
Systems are complex

• “How Complex Systems Fail”
• Failure at multiple layers
• Synonyms in other industries
• Defense in Depth

                                 29
Software needs to
 meet adversity


                    30
Intro to Rugged
   by analogy


                  31
Current Software

               32
Rugged Software




              33
Current Software




                   34
Rugged Software

                  35
Current Software




                   36
Rugged Software
                  37
Current Software




                   38
Rugged Software

                  39
Current Software




                   40
Rugged Software




                  41
Current Software
                   42
Rugged Software




                  43
44
Rugged Software
   Manifesto


                  45
I am rugged... and more importantly,
my code is rugged.




                                       46
I recognize that software has become
a foundation of our modern world.




                                       47
I recognize the awesome
responsibility that comes with this
foundational role.




                                      48
I recognize that my code will be used
in ways I cannot anticipate, in ways it
was not designed, and for longer
than it was ever intended.




                                          49
I recognize that my code will be
attacked by talented and persistent
adversaries who threaten our
physical, economic, and national
security.




                                      50
I recognize these things - and I
choose to be rugged.




                                   51
I am rugged because I refuse to be a
source of vulnerability or weakness.




                                       52
I am rugged because I assure my
code will support its mission.




                                  53
I am rugged because my code can
face these challenges and persist in
spite of them.




                                       54
I am rugged, not because it is easy,
but because it is necessary... and I
am up for the challenge.




                                       55
Rugged-ities
 • Availability
 • Survivability
 • Defensibility
 • Security
 • Longevity
 • Portability
                   56
Security vs. Rugged
• Absence of   • Verification of
  Events         quality
• Cost         • Benefit
• Negative     • Positive
• FUD          • Known values
• Toxic        • Affirming
                                  57
Rugged Survival Guide
 • Defensible Infrastructure
 • Operational Discipline
 • Situational Awareness
 • Countermeasures

On YouTube: “PCI Zombies”
                               58
Security as a Feature

• SaaF is possible, but hard for most products
• Tough to measure
• Hiding among other features


                                                 59
Rugged as a Feature

• RaaF addresses to customer felt needs
• Values that people covet
• Buyers want it


                                          60
Qualities of Rugged
       Software
• Availability - Speed and performance
• Longevity, Long-standing, persistent - Time
• Scalable, Portable
• Maintainable and Defensible - Topology Map
• Resilient in the face of failures
• Reliable - Time, Load
                                                61
Measuring Ruggedness

• Physical: Heat, Cold, Friction, Time, Quantity
  of use, Type of use
• Software: Concurrency, Transactions, Speed,
  Serial Load, Input handling, Entropy, Lines of
  Code




                                                   62
Measuring Frameworks
• Measured by lack of incidents and
  quantifying risk and vulns
• OWASP / CVE tracking
• Common Vuln Scoring System (CVSS)
• Mitre Common Weakness Enumeration
  (CWE)
• Common Weakness Scoring System
  (CWSS)
                                      63
Supply and ______



                    64
Marketing Possibilities

• Positive: Rugged Rating System
 • 3rd party verification of Ruggedness
 • Self Attestation
• Negative: warning signs
• Buyers Bill of Rights

                                         65
Measuring Rugged

                   66
3rd Party Warnings
                     67
Self Attestation
                   68
Implicit vs. Explicit



                        69
Explicit Requirements

• Customers Demand
• 20% Use Cases
• Most Vocal
• Failure results in loss of customers but not
  all customers



                                                 70
Implicit Requirements

• Customers Assume
• 80% of use cases
• Unsaid and Unspoken
• Most basic and expected features
• Failure results in a loss of most customers

                                                71
Is Security Explicit
    or Implicit?




                       72
Is Rugged Explicit
    or Implicit?
                     73
74
Rugged
Implementations




              75
build a
rugged
team
          76
People and Process

• Sit near the developers... DevOpsSec
• Track security flaws or bugs in the same bug
  tracking system
• Train to automate
• Involve team with vendors
• Measurement over time and clear communication
                                                  77
OPSEC Framework
• Know your system and people
• Make security better in small steps
• Add layers of security without
  overcompensating
• Use a weekly, iteration-based approach to
  security


                                              78
79
Programmable
Infrastructure
Environment


             80
Configuration
        Management
• Infrastructure as Code (IaC)
• Model driven deployment
• Version control everything
• PIE (Programmable Infrastructure
  Enviroment)
• Know Your Environment if you want to
  make it defensible


                                         81
What is PIE?
•   a a framework to define, provision,
    monitor, and control cloud-based systems

•   written in Java, uses SSH as transport,
    currently supports Amazon AWS (Linux
    and Windows)

•   takes an XML-based model from source
    control and creates a full running system

•   to define, provision, monitor, and control
    cloud-based systems


                                                 82
PIE ingredients
•   model driven automation

•   infrastructure as code

•   DevOps

•   dynamic scaling

•   agility

•   security in the model



                              83
84
The Model
•   XML descriptions of the system as ‘specs’

•   system (top level)

•   environment (instance of a system)

•   role (“tier” within a system)

•   image (specific base box config)

•   service (specific software or application)

•   commands (for various levels)

•   templates (files to be parsed)
                                                85
86
87
The Registry
•   uses Apache Zookeeper
    (part of Hadoop project)

•   the registry contains information
    about the running system

•   specific addressing scheme:

•   /fcc/test1/external-services/2/tomcat

•   [/<system>/<environment>/<role>/<instance>/<service>]
       pie registry.register /fcc/test1/external-services/2
       pie registry.bind /fcc/test1
       pie registry.list /fcc/test1



                                                              88
Control
        • create, terminate, start, stop instances using
            the AWS API
        • enforce scaling policy
        • execute remote commands
pie control.create /fcc/test1/external-services/2
pie control.stop /fcc/test1/external-services/2
pie control.enforce /fcc/test1
pie control.remote.service.restart /fcc/test1/external-services/2/external-tomcat
pie control.remote.execute /fcc/test1/external-services/2 –i exe[0]=“ls –l /etc/
init.d”



                                                                                    89
Provisioning
         • deploy services and apps
         • two-phase for fast deploys
         • update config files and parse templates
pie provision.deploy.stage /fcc/test1/external-services/2 –i pack[0]=lvdotcom-auth
pie provision.deploy.run /fcc/test1/external-services/2 –i pack[0]=lvdotcom-auth
pie provision.remote.updateConfig /fcc/test1




                                                                                 90
Monitoring

• integrated with third party SaaS monitoring
  provider Cloudkick
• systems register with Cloudkick as they
  come online and immediately have
  appropriate monitors applied based on tags
  set from the model



                                                91
92
Logging

• logging in the cloud using splunk
• logging agents are deployed in the model
  and they are given the config from registry
  and the model as they come online




                                               93
Rugged Results
• repeatable – no manual errors
• reviewable – model in source control
• rapid – bring up, install, configure, and test
  dozens of systems in a morning
• resilient – automated reconfiguration to
  swap servers (throw away infrastructure)
• rugged by design
                                                  94
build
the new
DMZ


          95
What’s a DMZ?

• Demilitarized Zone
• Physical and logical divisions between assets
• Military history
• Control what goes in and what goes out

                                                  96
Control your
        environment
• Make every service a DMZ
• Cloud environment
• 3-tier web architecture
• Allow automated provisioning

                                 97
Traditional 3-Tier Web Architecture
                 Firewall


                 Web
                  Web
                   Web
                                          DMZ 1

                 Firewall


   Middle Tier              Middle Tier
                                          DMZ 2

                 Firewall


      DB                      LDAP
                                          DMZ 3


                                                  98
Rugged Architecture
firewall                 firewall                 firewall

 Web                     Web                     Web         DMZ x3



           firewall                 firewall

          Middle Tier             Middle Tier
                                                          DMZ x2


           firewall                 firewall

             DB                     LDAP
                                                          DMZ x3


                                                                      99
firewall                 firewall                 firewall

 Web                     Web                     Web
                                                                Repeatable
           firewall                 firewall
                                                                 Verifiable
          Middle Tier             Middle Tier             Prod/Dev/Test Matching
           firewall                 firewall
                                                                Controlled
             DB                     LDAP                       Automated


firewall                 firewall                 firewall     firewall                 firewall                 firewall

 Web                     Web                     Web         Web                     Web                     Web




           firewall                 firewall                             firewall                 firewall

          Middle Tier             Middle Tier                         Middle Tier             Middle Tier



           firewall                 firewall                             firewall                 firewall

             DB                     LDAP                                 DB                     LDAP




                                                                                                                      100
firewall               firewall               firewall   firewall               firewall               firewall   firewall               firewall               firewall
 Web                   Web                    Web      Web                   Web                    Web      Web                   Web                    Web



            firewall               firewall                         firewall               firewall                         firewall               firewall
          Middle Tier           Middle Tier                     Middle Tier           Middle Tier                     Middle Tier           Middle Tier


            firewall               firewall                         firewall               firewall                         firewall               firewall
             DB                   LDAP                             DB                   LDAP                             DB                   LDAP



firewall               firewall               firewall   firewall               firewall               firewall   firewall               firewall               firewall
 Web                   Web                    Web      Web                   Web                    Web      Web                   Web                    Web



            firewall               firewall                         firewall               firewall                         firewall               firewall
          Middle Tier           Middle Tier                     Middle Tier           Middle Tier                     Middle Tier           Middle Tier


            firewall               firewall                         firewall               firewall                         firewall               firewall
             DB                   LDAP                             DB                   LDAP                             DB                   LDAP




firewall               firewall               firewall   firewall               firewall               firewall   firewall               firewall               firewall
 Web                   Web                    Web      Web                   Web                    Web      Web                   Web                    Web



            firewall               firewall                         firewall               firewall                         firewall               firewall
          Middle Tier           Middle Tier                     Middle Tier           Middle Tier                     Middle Tier           Middle Tier


            firewall               firewall                         firewall               firewall                         firewall               firewall
             DB                   LDAP                             DB                   LDAP                             DB                   LDAP



                                                                                                                                                                  101
Rugged 3-Tier
 Architecture Benefits
• Control
• Config Management
• Reproducible and Automated
• Data can’t traverse environments
  accidentally
• Dev and Test Tier accurate
                                     102
OWASP Secure Coding
    Quick Reference Guide

• Checklist format that can be added to into
  your sprints
• Helps development team find common
  security flaws
• Topics include: Input Validation, Output
  Encoding, Auth, Session Management,
  Memory Management, ...
• http://bit.ly/OWASPQuickRef
                                               103
Rugged Next Steps

• Use Rugged language
• Know your systems
• Automate, track results, repeat
• Begin weekly OPSEC in your org
• Attend LASCON (http://lascon.org)
                                      104
Rugged Resources



                   105
h"ps://groups.google.com/a/owasp.org/group/rugged-­‐so4ware




                                                              106
Recommended Reading




                      107

Contenu connexe

Tendances

QCon New York - Migrating to Cloud Native with Microservices
QCon New York - Migrating to Cloud Native with MicroservicesQCon New York - Migrating to Cloud Native with Microservices
QCon New York - Migrating to Cloud Native with MicroservicesAdrian Cockcroft
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 
Monitoring Challenges - Monitorama 2016 - Monitoringless
Monitoring Challenges - Monitorama 2016 - MonitoringlessMonitoring Challenges - Monitorama 2016 - Monitoringless
Monitoring Challenges - Monitorama 2016 - MonitoringlessAdrian Cockcroft
 
Fast Delivery DevOps Israel
Fast Delivery DevOps IsraelFast Delivery DevOps Israel
Fast Delivery DevOps IsraelAdrian Cockcroft
 
Disrupting the Storage Industry talk at SNIA Data Storage Innovation Conference
Disrupting the Storage Industry talk at SNIA Data Storage Innovation ConferenceDisrupting the Storage Industry talk at SNIA Data Storage Innovation Conference
Disrupting the Storage Industry talk at SNIA Data Storage Innovation ConferenceAdrian Cockcroft
 
Leveraging the Cloud: Getting the more bang for your buck
Leveraging the Cloud: Getting the more bang for your buckLeveraging the Cloud: Getting the more bang for your buck
Leveraging the Cloud: Getting the more bang for your buckDesk
 
Here Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldHere Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldC4Media
 
DevOps in a Cloud Native World
DevOps in a Cloud Native WorldDevOps in a Cloud Native World
DevOps in a Cloud Native WorldMichael Ducy
 
Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelinesVandana Verma
 
Containerizing your Security Operations Center
Containerizing your Security Operations CenterContainerizing your Security Operations Center
Containerizing your Security Operations CenterJimmy Mesta
 
Serverless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsServerless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsJames Wickett
 
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012Matt Tesauro
 
What's Missing? Microservices Meetup at Cisco
What's Missing? Microservices Meetup at CiscoWhat's Missing? Microservices Meetup at Cisco
What's Missing? Microservices Meetup at CiscoAdrian Cockcroft
 
From Monoliths to Microservices at Realestate.com.au
From Monoliths to Microservices at Realestate.com.auFrom Monoliths to Microservices at Realestate.com.au
From Monoliths to Microservices at Realestate.com.auevanbottcher
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSAChris Downey
 
Adventures in a Microservice world at REA Group
Adventures in a Microservice world at REA GroupAdventures in a Microservice world at REA Group
Adventures in a Microservice world at REA Groupevanbottcher
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azurekloia
 

Tendances (20)

QCon New York - Migrating to Cloud Native with Microservices
QCon New York - Migrating to Cloud Native with MicroservicesQCon New York - Migrating to Cloud Native with Microservices
QCon New York - Migrating to Cloud Native with Microservices
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 
Monitoring Challenges - Monitorama 2016 - Monitoringless
Monitoring Challenges - Monitorama 2016 - MonitoringlessMonitoring Challenges - Monitorama 2016 - Monitoringless
Monitoring Challenges - Monitorama 2016 - Monitoringless
 
Fast Delivery DevOps Israel
Fast Delivery DevOps IsraelFast Delivery DevOps Israel
Fast Delivery DevOps Israel
 
Disrupting the Storage Industry talk at SNIA Data Storage Innovation Conference
Disrupting the Storage Industry talk at SNIA Data Storage Innovation ConferenceDisrupting the Storage Industry talk at SNIA Data Storage Innovation Conference
Disrupting the Storage Industry talk at SNIA Data Storage Innovation Conference
 
Leveraging the Cloud: Getting the more bang for your buck
Leveraging the Cloud: Getting the more bang for your buckLeveraging the Cloud: Getting the more bang for your buck
Leveraging the Cloud: Getting the more bang for your buck
 
Here Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldHere Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New World
 
DevOps in a Cloud Native World
DevOps in a Cloud Native WorldDevOps in a Cloud Native World
DevOps in a Cloud Native World
 
Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelines
 
Containerizing your Security Operations Center
Containerizing your Security Operations CenterContainerizing your Security Operations Center
Containerizing your Security Operations Center
 
Serverless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 millisecondsServerless Security: Doing Security in 100 milliseconds
Serverless Security: Doing Security in 100 milliseconds
 
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012
DevOps, CI, APIs, Oh My! - Texas Linux Fest 2012
 
What's Missing? Microservices Meetup at Cisco
What's Missing? Microservices Meetup at CiscoWhat's Missing? Microservices Meetup at Cisco
What's Missing? Microservices Meetup at Cisco
 
From Monoliths to Microservices at Realestate.com.au
From Monoliths to Microservices at Realestate.com.auFrom Monoliths to Microservices at Realestate.com.au
From Monoliths to Microservices at Realestate.com.au
 
Hybrid Cloud Networking
Hybrid Cloud NetworkingHybrid Cloud Networking
Hybrid Cloud Networking
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
Adventures in a Microservice world at REA Group
Adventures in a Microservice world at REA GroupAdventures in a Microservice world at REA Group
Adventures in a Microservice world at REA Group
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 

Similaire à The Rugged Way in the Cloud--Building Reliability and Security into Software

Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldDenim Group
 
What is Reactive programming?
What is Reactive programming?What is Reactive programming?
What is Reactive programming?Kevin Webber
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and SecureDenim Group
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Executing for Every Screen: Build, launch and sustain products for your custo...
Executing for Every Screen: Build, launch and sustain products for your custo...Executing for Every Screen: Build, launch and sustain products for your custo...
Executing for Every Screen: Build, launch and sustain products for your custo...Steven Hoober
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devicesNikhil Mittal
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic SecurityDenim Group
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementTim Mackey
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementBlack Duck by Synopsys
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 201244CON
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSADenim Group
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...ouahibakellou
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsGabriel Schuyler
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 

Similaire à The Rugged Way in the Cloud--Building Reliability and Security into Software (20)

Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
What is Reactive programming?
What is Reactive programming?What is Reactive programming?
What is Reactive programming?
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and Secure
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Executing for Every Screen: Build, launch and sustain products for your custo...
Executing for Every Screen: Build, launch and sustain products for your custo...Executing for Every Screen: Build, launch and sustain products for your custo...
Executing for Every Screen: Build, launch and sustain products for your custo...
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devices
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSA
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native Workloads
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 

Plus de James Wickett

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREJames Wickett
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREJames Wickett
 
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldThe Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldJames Wickett
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline SecurityJames Wickett
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessJames Wickett
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleJames Wickett
 
The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019James Wickett
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsJames Wickett
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsJames Wickett
 
DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneJames Wickett
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpJames Wickett
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS LaneJames Wickett
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018James Wickett
 

Plus de James Wickett (20)

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SRE
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
 
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldThe Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the World
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and People
 
The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
 
DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS Lane
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS Lane
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

The Rugged Way in the Cloud--Building Reliability and Security into Software

  • 1. The Rugged Way in the Cloud–Building Reliability and Security Into Software James Wickett james.wickett@owasp.org 1
  • 2. 2
  • 3. @wickett • Operations and Security for software delivered on the cloud • National Instruments, R&D • Certs: CISSP, GSEC, GCFW, CCSK • Tags: OWASP, Cloud, DevOps, Ruby • Blogger at theagileadmin.com • I do stuff for LASCON (http://lascon.org) • Twitter: @wickett 3
  • 4. Cloud @ NI We built a DevOps team to rapidly deliver new SaaS products and product functionality using cloud hosting and services (IaaS, PaaS, SaaS) as the platform and operations, using model driven automation, as a key differentiating element. With this approach we have delivered multiple major products to market quickly with a very small staffing and financial outlay. 4
  • 5. National Instruments • 30 years old; 5000+ employees around the world, half in Austin, mostly engineers; $873M in 2010 • Hardware and software for data acquisition, embedded design, instrument control, and test • LabVIEW is our graphical dataflow programming language used by scientists and engineers in many fields 5
  • 6. From toys to black holes 6
  • 7. NI’s Cloud Products • LabVIEW Web UI Builder • FPGA Compile Cloud • more to come... 7
  • 9. 9
  • 10. 10
  • 11. FPGA Compile Cloud • LabVIEW FPGA compiles take hours and consume extensive system resources; compilers are getting larger and more complex • Implemented on Amazon - EC2, Java/Linux,C#/.NET/Windows, and LabVIEW FPGA • Also an on premise product, the “Compile Farm” 11
  • 15. Am I healthy? • Latest and greatest research • Justification to insurance companies • Measurement and testing as available • Point in time snapshot 15
  • 17. Am I secure? • Latest and greatest vulnerabilities • Justification of budget for tools • Measurement and testing as available • Point in time snapshot 17
  • 19. It’s not our problem anymore 19
  • 20. If you want to build a ship, don't drum up people together to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea - Antoine Jean-Baptiste Marie Roger de Saint Exupéry 20
  • 21. Twitter Survey What is one word that you would use to describe ‘IT Security’ people? 21
  • 22. unicorns paranoid prepared Tenacious HAWT! smart masochistic demented jaded smart sisyphean omnium-gatherum facebored passionate weird drunk compassionate 22
  • 23. Us vs. Them • Security professionals often degrade developers • Developers don’t get security people • There is interest across the isle, but often ruined by negative language 23
  • 24. Why do you see the speck that is in your brotherʼs eye, but do not notice the log that is in your own eye? - Jesus 24
  • 26. Adversity fueled innovation • NASA in Space • Military hard drives • ATMs in Europe 26
  • 27. Chip and PIN ATM 27
  • 28. The Internets is Mean • Latency • Distribution • Anonymity • Varied protocols • People 28
  • 29. Systems are complex • “How Complex Systems Fail” • Failure at multiple layers • Synonyms in other industries • Defense in Depth 29
  • 30. Software needs to meet adversity 30
  • 31. Intro to Rugged by analogy 31
  • 44. 44
  • 45. Rugged Software Manifesto 45
  • 46. I am rugged... and more importantly, my code is rugged. 46
  • 47. I recognize that software has become a foundation of our modern world. 47
  • 48. I recognize the awesome responsibility that comes with this foundational role. 48
  • 49. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended. 49
  • 50. I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic, and national security. 50
  • 51. I recognize these things - and I choose to be rugged. 51
  • 52. I am rugged because I refuse to be a source of vulnerability or weakness. 52
  • 53. I am rugged because I assure my code will support its mission. 53
  • 54. I am rugged because my code can face these challenges and persist in spite of them. 54
  • 55. I am rugged, not because it is easy, but because it is necessary... and I am up for the challenge. 55
  • 56. Rugged-ities • Availability • Survivability • Defensibility • Security • Longevity • Portability 56
  • 57. Security vs. Rugged • Absence of • Verification of Events quality • Cost • Benefit • Negative • Positive • FUD • Known values • Toxic • Affirming 57
  • 58. Rugged Survival Guide • Defensible Infrastructure • Operational Discipline • Situational Awareness • Countermeasures On YouTube: “PCI Zombies” 58
  • 59. Security as a Feature • SaaF is possible, but hard for most products • Tough to measure • Hiding among other features 59
  • 60. Rugged as a Feature • RaaF addresses to customer felt needs • Values that people covet • Buyers want it 60
  • 61. Qualities of Rugged Software • Availability - Speed and performance • Longevity, Long-standing, persistent - Time • Scalable, Portable • Maintainable and Defensible - Topology Map • Resilient in the face of failures • Reliable - Time, Load 61
  • 62. Measuring Ruggedness • Physical: Heat, Cold, Friction, Time, Quantity of use, Type of use • Software: Concurrency, Transactions, Speed, Serial Load, Input handling, Entropy, Lines of Code 62
  • 63. Measuring Frameworks • Measured by lack of incidents and quantifying risk and vulns • OWASP / CVE tracking • Common Vuln Scoring System (CVSS) • Mitre Common Weakness Enumeration (CWE) • Common Weakness Scoring System (CWSS) 63
  • 65. Marketing Possibilities • Positive: Rugged Rating System • 3rd party verification of Ruggedness • Self Attestation • Negative: warning signs • Buyers Bill of Rights 65
  • 70. Explicit Requirements • Customers Demand • 20% Use Cases • Most Vocal • Failure results in loss of customers but not all customers 70
  • 71. Implicit Requirements • Customers Assume • 80% of use cases • Unsaid and Unspoken • Most basic and expected features • Failure results in a loss of most customers 71
  • 72. Is Security Explicit or Implicit? 72
  • 73. Is Rugged Explicit or Implicit? 73
  • 74. 74
  • 77. People and Process • Sit near the developers... DevOpsSec • Track security flaws or bugs in the same bug tracking system • Train to automate • Involve team with vendors • Measurement over time and clear communication 77
  • 78. OPSEC Framework • Know your system and people • Make security better in small steps • Add layers of security without overcompensating • Use a weekly, iteration-based approach to security 78
  • 79. 79
  • 81. Configuration Management • Infrastructure as Code (IaC) • Model driven deployment • Version control everything • PIE (Programmable Infrastructure Enviroment) • Know Your Environment if you want to make it defensible 81
  • 82. What is PIE? • a a framework to define, provision, monitor, and control cloud-based systems • written in Java, uses SSH as transport, currently supports Amazon AWS (Linux and Windows) • takes an XML-based model from source control and creates a full running system • to define, provision, monitor, and control cloud-based systems 82
  • 83. PIE ingredients • model driven automation • infrastructure as code • DevOps • dynamic scaling • agility • security in the model 83
  • 84. 84
  • 85. The Model • XML descriptions of the system as ‘specs’ • system (top level) • environment (instance of a system) • role (“tier” within a system) • image (specific base box config) • service (specific software or application) • commands (for various levels) • templates (files to be parsed) 85
  • 86. 86
  • 87. 87
  • 88. The Registry • uses Apache Zookeeper (part of Hadoop project) • the registry contains information about the running system • specific addressing scheme: • /fcc/test1/external-services/2/tomcat • [/<system>/<environment>/<role>/<instance>/<service>] pie registry.register /fcc/test1/external-services/2 pie registry.bind /fcc/test1 pie registry.list /fcc/test1 88
  • 89. Control • create, terminate, start, stop instances using the AWS API • enforce scaling policy • execute remote commands pie control.create /fcc/test1/external-services/2 pie control.stop /fcc/test1/external-services/2 pie control.enforce /fcc/test1 pie control.remote.service.restart /fcc/test1/external-services/2/external-tomcat pie control.remote.execute /fcc/test1/external-services/2 –i exe[0]=“ls –l /etc/ init.d” 89
  • 90. Provisioning • deploy services and apps • two-phase for fast deploys • update config files and parse templates pie provision.deploy.stage /fcc/test1/external-services/2 –i pack[0]=lvdotcom-auth pie provision.deploy.run /fcc/test1/external-services/2 –i pack[0]=lvdotcom-auth pie provision.remote.updateConfig /fcc/test1 90
  • 91. Monitoring • integrated with third party SaaS monitoring provider Cloudkick • systems register with Cloudkick as they come online and immediately have appropriate monitors applied based on tags set from the model 91
  • 92. 92
  • 93. Logging • logging in the cloud using splunk • logging agents are deployed in the model and they are given the config from registry and the model as they come online 93
  • 94. Rugged Results • repeatable – no manual errors • reviewable – model in source control • rapid – bring up, install, configure, and test dozens of systems in a morning • resilient – automated reconfiguration to swap servers (throw away infrastructure) • rugged by design 94
  • 96. What’s a DMZ? • Demilitarized Zone • Physical and logical divisions between assets • Military history • Control what goes in and what goes out 96
  • 97. Control your environment • Make every service a DMZ • Cloud environment • 3-tier web architecture • Allow automated provisioning 97
  • 98. Traditional 3-Tier Web Architecture Firewall Web Web Web DMZ 1 Firewall Middle Tier Middle Tier DMZ 2 Firewall DB LDAP DMZ 3 98
  • 99. Rugged Architecture firewall firewall firewall Web Web Web DMZ x3 firewall firewall Middle Tier Middle Tier DMZ x2 firewall firewall DB LDAP DMZ x3 99
  • 100. firewall firewall firewall Web Web Web Repeatable firewall firewall Verifiable Middle Tier Middle Tier Prod/Dev/Test Matching firewall firewall Controlled DB LDAP Automated firewall firewall firewall firewall firewall firewall Web Web Web Web Web Web firewall firewall firewall firewall Middle Tier Middle Tier Middle Tier Middle Tier firewall firewall firewall firewall DB LDAP DB LDAP 100
  • 101. firewall firewall firewall firewall firewall firewall firewall firewall firewall Web Web Web Web Web Web Web Web Web firewall firewall firewall firewall firewall firewall Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier firewall firewall firewall firewall firewall firewall DB LDAP DB LDAP DB LDAP firewall firewall firewall firewall firewall firewall firewall firewall firewall Web Web Web Web Web Web Web Web Web firewall firewall firewall firewall firewall firewall Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier firewall firewall firewall firewall firewall firewall DB LDAP DB LDAP DB LDAP firewall firewall firewall firewall firewall firewall firewall firewall firewall Web Web Web Web Web Web Web Web Web firewall firewall firewall firewall firewall firewall Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier Middle Tier firewall firewall firewall firewall firewall firewall DB LDAP DB LDAP DB LDAP 101
  • 102. Rugged 3-Tier Architecture Benefits • Control • Config Management • Reproducible and Automated • Data can’t traverse environments accidentally • Dev and Test Tier accurate 102
  • 103. OWASP Secure Coding Quick Reference Guide • Checklist format that can be added to into your sprints • Helps development team find common security flaws • Topics include: Input Validation, Output Encoding, Auth, Session Management, Memory Management, ... • http://bit.ly/OWASPQuickRef 103
  • 104. Rugged Next Steps • Use Rugged language • Know your systems • Automate, track results, repeat • Begin weekly OPSEC in your org • Attend LASCON (http://lascon.org) 104