SlideShare une entreprise Scribd logo
1  sur  61
DevOps Will Save The World!
Public Safety, Public Policy, and DevOps
in ContextJoshua Corman, Sonatype CTO
Oct 23, 2014 DevOps Enterprise Summit
#DOES14
2 10/23/2013 @joshcorman
~ Marc Marc Andreessen 2011
3 10/23/2013 @joshcorman
4 10/23/2013 @joshcorman
Trade Offs
Costs & Benefits
5 10/23/2013 @joshcorman
INDUSTRIAL EVOLUTION
THE REAL IMPLICATIONS OF HEARTBLEED
BEYOND HEARTBLEED: OPENSSL IN 2014
(17 IN NIST’S NVD THRU JULY 25)
8 11/14/2014
CVE-2014-3470 6/5/2014 CVSS Severity: 4.3 MEDIUM  SEIMENS *
CVE-2014-0224 6/5/2014 CVSS Severity: 6.8 MEDIUM  SEIMENS *
CVE-2014-0221 6/5/2014 CVSS Severity: 4.3 MEDIUM
CVE-2014-0195 6/5/2014 CVSS Severity: 6.8 MEDIUM
CVE-2014-0198 5/6/2014 CVSS Severity: 4.3 MEDIUM  SEIMENS *
CVE-2013-7373 4/29/2014 CVSS Severity: 7.5 HIGH
CVE-2014-2734 4/24/2014 CVSS Severity: 5.8 MEDIUM ** DISPUTED **
CVE-2014-0139 4/15/2014 CVSS Severity: 5.8 MEDIUM
CVE-2010-5298 4/14/2014 CVSS Severity: 4.0 MEDIUM
CVE-2014-0160 4/7/2014 CVSS Severity: 5.0 MEDIUM  HeartBleed
CVE-2014-0076 3/25/2014 CVSS Severity: 4.3 MEDIUM
CVE-2014-0016 3/24/2014 CVSS Severity: 4.3 MEDIUM
CVE-2014-0017 3/14/2014 CVSS Severity: 1.9 LOW
CVE-2014-2234 3/5/2014 CVSS Severity: 6.4 MEDIUM
CVE-2013-7295 1/17/2014 CVSS Severity: 4.0 MEDIUM
CVE-2013-4353 1/8/2014 CVSS Severity: 4.3 MEDIUM
CVE-2013-6450 1/1/2014 CVSS Severity: 5.8 MEDIUM
As of today, internet scans
by MassScan reveal
300,000 of original
600,000 remain
unpatched or unpatchable
HEARTBLEED + (UNPATCHABLE) INTERNET OF THINGS == ___ ?
In Our Bodies In Our Homes
In Our InfrastructureIn Our Cars
•The
The Cavalry isn’t coming… It falls to us
Problem Statement
Our society is adopting connected
technology faster than we are able to
secure it.
Mission Statement
To ensure connected technologies with
the potential to impact public safety
and human life are worthy of our trust.
Collecting existing research, researchers, and resources
Connecting researchers with each other, industry, media, policy, and legal
Collaborating across a broad range of backgrounds, interests, and skillsets
Catalyzing positive action sooner than it would have happened on its own
Why Trust, public safety, human life
How Education, outreach, research
Who Infosec research community
Who Global, grass roots initiative
WhatLong-term vision for cyber safety
Medical Automotive
Connected
Home
Public
Infrastructure
I Am The Cavalry
Connections and Ongoing Collaborations
5-Star Capabilities
 Safety by Design – Anticipate failure and plan mitigation
 Third-Party Collaboration – Engage willing allies
 Evidence Capture – Observe and learn from failure
 Security Updates – Respond quickly to issues discovered
 Segmentation & Isolation – Prevent cascading failure
Addressing Automotive Cyber Systems
Automotive
Engineers
Security
Researchers
Policy
Makers
Insurance
Analysts
Accident
Investigators
Standards
Organizations
https://www.iamthecavalry.org/auto/5star/
5-Star Framework
Sign and share the petition
http://bit.ly/5starauto
SW SUPPLY CHAIN IN CONTEXT OF
CYBERSECURITY BIG PICTURE
KEY QUESTIONS
Where are Attackers most focused?
Where are Defenders most focused?
Which Activities have the most security impact?
-2014 Verizon Data Breach Investigations Report
MOST ATTACKED: WEAK SOFTWARE IS #1 ATTACK VECTOR
spending
19 11/14/2014 Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary
Software Security gets LEAST $ but MOST attacker focus
Host Security ~$10B
Data Security ~$5B
People Security ~$4B
Network Security ~$20B
Software
Security
~$0.5B
LEAST SPENDING/PRIORITY: WEAK SOFTWARE
spending
20 11/14/2014
attack risk
Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary
Host Security ~$10B
Data Security ~$5B
People Security ~$4B
Network Security ~$20B
Software
Security
~$0.5B
Assembled 3rd Party &
OpenSource
Components
~90% of most
applications
Almost No Spending
Written Code Scanning
Software Security gets LEAST $ but MOST attacker focus
LEAST SPENDING/PRIORITY: WEAK SW
Worse, within Software, existing dollars go to the 10% written
Defensible Infrastructure
10%
Written
Operational Excellence
Situational Awareness
Counter-
measures
The software & hardware we
build, buy, and deploy. 90% of
software is assembled from 3rd
party & Open Source
MOST IMPACT: BUY/BUILD DEFENSIBLE SOFTWARE
IS IT OPEN SEASON ON OPEN SOURCE?
23 11/14/2014
Now that software is
ASSEMBLED…
Our shared value becomes
our shared attack surface
THINK LIKE AN ATTACKER
One risky component,
now affects thousands of victims
ONE EASY
TARGET
24 11/14/2014
THINK LIKE AN ATTACKER
-
1,000
2,000
3,000
4,000
5,000
6,000
7,000
8,000
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
RequestsinMillions
13 Billion
Requests in 2013
Growth Drivers
Mobile Cloud
Web Apps Big Data
Component Usage Has Exploded
25
OPEN SOURCE USAGE IS EXPLODING
Global Bank
Software
Provider
Software
Provider’s Customer
State University
Three-Letter
Agency
Large Financial
Exchange
Hundreds of Other
Sites
STRUTS
W/MANY EYEBALLS, ALL BUGS ARE SHALLOW? STRUTS
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
10.0
9.0
8.0
7.0
6.0
5.0
4.0
3.0
2.0
1.0
CVE-2005-3745
CVE-2006-1546
CVE-2006-1547
CVE-2006-1548 CVE-2008-6504
CVE-2008-6505
CVE-2008-2025
CVE-2007-6726
CVE-2008-6682
CVE-2010-1870
CVE-2011-2087
CVE-2011-1772
CVE-2011-2088
CVE-2011-5057
CVE-2012-0392
CVE-2012-0391
CVE-2012-0393
CVE-2012-0394
CVE-2012-1006
CVE-2012-1007
CVE-2012-0838
CVE-2012-4386
CVE-2012-4387
CVE-2013-1966
CVE-2013-2115
CVE-2013-1965
CVE-2013-2134
CVE-2013-2135
CVE-2013-2248
CVE-2013-2251
CVE-2013-4316
CVE-2013-4310
CVE-2013-6348
CVE-2014-0094
CVSS
Latent 7-11 yrs
In 2013, 4,000
organizations downloaded
a version of Bouncy Castle
with a level 10 vulnerability
20,000 TIMES …
Into XXX,XXX Applications…
SEVEN YEARS
after the vulnerability was fixed
NATIONAL CYBER
AWARENESS SYSTEM
Original Notification Date:
03/30/2009
CVE-2007-6721
Bouncy Castle Java Cryptography API
CVSS v2 Base Score: 10.0 HIGH
Impact Subscore: 10.0
Exploitability Subscore: 10.0
BOUNCY CASTLE
In December 2013,
6,916 DIFFERENT
organizations downloaded
a version of httpclient with broken
ssl validation (cve-2012-5783)
66,824 TIMES …
More than ONE YEAR
AFTER THE ALERT
NATIONAL CYBER
AWARENESS SYSTEM
Original Release Date:
11/04/2012
CVE-2012-5783
Apache Commons HttpClient 3.x
CVSS v2 Base Score: 5.8 MEDIUM
Impact Subscore: 4.9
Exploitability Subscore: 8.6
HTTPCLIENT 3.X
IS IT TIME FOR A SOFTWARE SUPPLY CHAIN?
ELEGANT PROCUREMENT TRIO
31 11/14/2014
1) Ingredients:
Anything sold to $PROCURING_ENTITY must provide a Bill of Materials
of 3rd Party and Open Source Components (along with their Versions)
2) Hygiene & Avoidable Risk:
…and cannot use known vulnerable components for which a less
vulnerable component is available (without a written and compelling
justification accepted by $PROCURING_ENTITY)
3) Remediation:
…and must be patchable/updateable – as new vulnerabilities will
inevitably be revealed
In 2013, 4,000
organizations downloaded
a version of Bouncy Castle
with a level 10 vulnerability
20,000 TIMES …
Into XXX,XXX Applications…
SEVEN YEARS
after the vulnerability was fixed
NATIONAL CYBER
AWARENESS SYSTEM
Original Notification Date:
03/30/2009
CVE-2007-6721
Bouncy Castle Java Cryptography API
CVSS v2 Base Score: 10.0 HIGH
Impact Subscore: 10.0
Exploitability Subscore: 10.0
PROCUREMENT TRIO + BOUNCY CASTLE
APPLICATION
PLATFORMS &
TOOLS
COMPONENT
VERSION
COMPONENTSPROJECTS
DELIVERYINTEGRATIONSELECTIONSUPPLYSUPPLIER
OPTIMIZATION
(MONITORING)
Supply Chain Management
INDUSTRIAL EVOLUTION
35 10/23/2013 @joshcorman
Toyota’s Transformation of the Automobile Industry: v4L
36
• Comparing the XXXX and Prius
• $39,900 versus $24,200
• 1,788 units versus 23,294
• Plant suppliers: 125 versus 800
• Firm-wide suppliers: 224 versus 5,500
• In-house production: 27% versus 54%
Toyota’s Transformation of the Automobile Industry: v4L
37
• Variety of products offered
• Velocity of product flow
• Variability of outcomes against forecast
• Visibility of processes to enable learning
Toyota’s Transformation of the Automobile Industry: v4L
38
• Variety of software produced
• Velocity of software delivery
• Variability of outcomes against forecast
• Visibility of processes to enable learning
The ‘L’ in v4L
39
Create Awareness (transparency)
“Unless problems are seen, they will not be solved. Systems need to be in place to report
ideas, problems, deviations, and potential issues with no delay.”
Establish capability (empower)
“Unless someone is capable of solving a problem that might arise within the boundaries set
for him or her, that person will be unable to contribute to the problem solving process.”
Make action protocols (govern)
“Actions have to be taken within a set of constraints, and they must
conform to certain standards.”
Generate system-level awareness (monitor)
“As experience with solving problems is obtained, greater awareness of
other areas that might be affected needs to be created.”
Core Principles
Create Awareness
40
Empower
Govern
Monitor
41 11/14/2014
Compound Project Consumer“Part”
Discovery Repair Discovery Repair Aware Recovery
Airbag
Airbag
Airbag
Car X
Airbag
Airbag
Alex’s Jaguar
42 11/14/2014
Compound Project Consumer“Part”
Airbag
Airbag
Airbag
Car X
Airbag
Airbag
Alex’s Jaguar
Struts
Airbag
Airbag
Bank of X…
Airbag
Airbag
Sally Bank Customer
Struts
Airbag
Airbag
IBM WebSphere
Airbag
Airbag
Bank of X…
Bouncy Castle
Airbag
Airbag
20,000 Applications
Airbag
Airbag
x ??? Users
Discovery Repair Discovery Repair Aware Recovery
TRUE COSTS & LEAST COST AVOIDERS: DOWNSTREAM
ACME
Enterprise
Bank
Retail
Manufacturing
BioPharma
Education
High Tech
Enterprise
Bank
Retail
Manufacturing
BioPharma
Education
High Tech
Enterprise
Bank
Retail
Manufacturing
BioPharma
Education
High Tech
44 11/14/2014
Compound Parts ProductPart (Bolt) End Consumer
Discovery Repair Discovery Repair Aware Recovery Aware Recovery
Foo_0
IBM WebSphere
Bank of X.com
Foo_1
Foo_2
Foo_3
Foo_4
Foo_5
Foo_6
Foo_7
Foo_8
Foo_9
Foo_ 10
Foo_11
Foo_0
Foo_1
Foo_2
Foo_3
Foo_4
Foo_5
Foo_6
Foo_7
Foo_8
Foo_9
Foo_ 10
Foo_11
Foo_0
Foo_1
Foo_2
Foo_3
Foo_4
Foo_5
Foo_6
Foo_7
Foo_8
Foo_9
Foo_ 10
Foo_11
Struts 2
45 11/14/2014
X Axis: Time (Days) following initial HeartBleed disclosure and patch availability
Y Axis: Number of products included in the vendor vulnerability disclosure
Z Axis (circle size): Exposure as measured by the CVE CVSS score
COMMERCIAL RESPONSES TO OPENSSL
How can we choose the best components
FROM THE START?
Shift Upstream = ZTTR (Zero Time to Remediation)
Analyze all components
from within your IDE
License, Security and Architecture data for each
component, evaluated against your policy
@joshcorman@451wendy
MANUAL POLICIES CAN’T WORK AT
DEVOPS SPEED OR ENTERPRISE SCALE
4711/14/2014
If you’re not using secure
COMPONENTS
you’re not building secure
APPLICATIONS
Component
Selection
DEVELOPMENT BUILD AND DEPLOY PRODUCTION
COMPONENT
SELECTION
Component
Selection
DEVELOPMENT BUILD AND DEPLOY PRODUCTION
COMPONENT
SELECTION
Today’s approaches
AREN’T
WORKING
46m
vulnerable
components
downloaded
!
71%
of apps
have 1+
critical or
severe
vulnerability
!
90%
of
repositories
have 1+
critical
vulnerability
!
RUGGED DEVOPS AND GENE’S “THREE WAYS”
1) Systems Thinking
2) Amplify Feedback Loops
3) Culture of Continuous Experimentation
& Learning
ADOPT A "DEVSECOPS" MINDSET
Policies, Models, Templates
IT Operations Intelligence
and Security Intelligence
Requirements
Prevent
Issues
Detect
Issues
Remediate/
Change
Build
Assemble
Test
Deploy
Predict
Issues
Monitoring
and
Analytics
Source: Neil MacDonald Gartner
52 10/23/2013 @joshcorman
Defensible Infrastructure
Operational Excellence
Situational Awareness
Counter-
measures
DevOps
DevOps
DevOps
FURTHER RESOURCES
1. AS OPEN SOURCE USAGE EXPANDS, SO DO THE RISKS
2. SECURITY BUDGETS ARE OUT OF SYNC WITH RISK AND REALITY
3. PARETO PRINCIPLE 2.0? (THE “90/10” RULE): LOW EFFORT AND BIG GAINS
4. YOU USE A SOFTWARE SUPPLY CHAIN. HOW WELL DO YOU MANAGE IT?
5. EMPOWER YOUR DEVELOPERS. THEY’RE YOUR FRONT LINE DEFENSE
6. MANUAL POLICIES JUST DON’T WORK IN A SECURE DEVELOPMENT
LIFECYCLE
7. AGILE DEVELOPMENT REQUIRES AGILE SECURITY
54
“Sonatype presents a rare
opportunity to do something
concrete in the application
security space. One of the 1st tools
that comes close to remediation
not just scan results and
recommendations.”
-- Wendy Nather
https://www.usenix.org/system/files/login/articles/15_geer_0.pdf
For the 41%
390 days (median 265
days). CVSS 10s 224 days.
• Summary: The number of components
analyzed, including security issues and
licenses used
• Bill of Materials: A complete list of the
components used in your application
• Security Analysis: Known security threats by
vulnerability and severity level
• Quality Analysis: Details component age,
fingerprint verification & adherence to policies
• License Analysis: License descriptors for
every component & license implication for your
application
SAMPLE OPEN SOURCE VISIBILITY REPORT:
A FINAL THOUGHT…
60
THANK YOU
@JOSHCORMAN
@SONATYPE
6111/14/2014

Contenu connexe

Tendances

A Reference Architecture to Enable Visibility and Traceability across the Ent...
A Reference Architecture to Enable Visibility and Traceability across the Ent...A Reference Architecture to Enable Visibility and Traceability across the Ent...
A Reference Architecture to Enable Visibility and Traceability across the Ent...
CollabNet
 

Tendances (20)

DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
CI/CD (DevOps) 101
CI/CD (DevOps) 101CI/CD (DevOps) 101
CI/CD (DevOps) 101
 
DevOps Pragmatic Overview
DevOps Pragmatic OverviewDevOps Pragmatic Overview
DevOps Pragmatic Overview
 
DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017
 
Intro to DevOps 4 undergraduates
Intro to DevOps 4 undergraduates Intro to DevOps 4 undergraduates
Intro to DevOps 4 undergraduates
 
Software development in the modern age
Software development in the modern ageSoftware development in the modern age
Software development in the modern age
 
DevOps@Morpho for ParisDevOps - 2nd of December 2014
DevOps@Morpho for ParisDevOps - 2nd of December 2014DevOps@Morpho for ParisDevOps - 2nd of December 2014
DevOps@Morpho for ParisDevOps - 2nd of December 2014
 
Diving Deeper into DevOps Deployments
Diving Deeper into DevOps DeploymentsDiving Deeper into DevOps Deployments
Diving Deeper into DevOps Deployments
 
Jenkins - From Continuous Integration to Continuous Delivery
Jenkins - From Continuous Integration to Continuous DeliveryJenkins - From Continuous Integration to Continuous Delivery
Jenkins - From Continuous Integration to Continuous Delivery
 
Provisioning Toolchain Introduction for Velocity Online Conference (March 2010)
Provisioning Toolchain Introduction for Velocity Online Conference (March 2010)Provisioning Toolchain Introduction for Velocity Online Conference (March 2010)
Provisioning Toolchain Introduction for Velocity Online Conference (March 2010)
 
DevOpsDays Openstack Toolchains
DevOpsDays Openstack ToolchainsDevOpsDays Openstack Toolchains
DevOpsDays Openstack Toolchains
 
A Reference Architecture to Enable Visibility and Traceability across the Ent...
A Reference Architecture to Enable Visibility and Traceability across the Ent...A Reference Architecture to Enable Visibility and Traceability across the Ent...
A Reference Architecture to Enable Visibility and Traceability across the Ent...
 
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
 
Achieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the EnterpriseAchieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the Enterprise
 
Introduction to CICD
Introduction to CICDIntroduction to CICD
Introduction to CICD
 
Next Level DevOps Implementation with GitOps
Next Level DevOps Implementation with GitOpsNext Level DevOps Implementation with GitOps
Next Level DevOps Implementation with GitOps
 
Transform Digital Business with DevOps
Transform Digital Business with DevOpsTransform Digital Business with DevOps
Transform Digital Business with DevOps
 
Transforming Organizations with CI/CD
Transforming Organizations with CI/CDTransforming Organizations with CI/CD
Transforming Organizations with CI/CD
 
Who Is A DevOps Engineer? | DevOps Skills You Must Master | DevOps Engineer M...
Who Is A DevOps Engineer? | DevOps Skills You Must Master | DevOps Engineer M...Who Is A DevOps Engineer? | DevOps Skills You Must Master | DevOps Engineer M...
Who Is A DevOps Engineer? | DevOps Skills You Must Master | DevOps Engineer M...
 
DevOps Interview Questions and Answers 2019 | DevOps Tutorial | Edureka
DevOps Interview Questions and Answers 2019 | DevOps Tutorial | EdurekaDevOps Interview Questions and Answers 2019 | DevOps Tutorial | Edureka
DevOps Interview Questions and Answers 2019 | DevOps Tutorial | Edureka
 

En vedette

Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4
Aswin Kumar
 
atSistemas - Presentación Integración Continua AUG Barcelona enero13
atSistemas - Presentación Integración Continua AUG Barcelona enero13atSistemas - Presentación Integración Continua AUG Barcelona enero13
atSistemas - Presentación Integración Continua AUG Barcelona enero13
atSistemas
 

En vedette (18)

Building a Service Delivery Platform - JCICPH 2014
Building a Service Delivery Platform - JCICPH 2014Building a Service Delivery Platform - JCICPH 2014
Building a Service Delivery Platform - JCICPH 2014
 
Rundeck + Nexus (from Nexus Live on June 5, 2014)
Rundeck + Nexus (from Nexus Live on June 5, 2014)Rundeck + Nexus (from Nexus Live on June 5, 2014)
Rundeck + Nexus (from Nexus Live on June 5, 2014)
 
JavaCro'14 - Continuous delivery of Java EE applications with Jenkins and Doc...
JavaCro'14 - Continuous delivery of Java EE applications with Jenkins and Doc...JavaCro'14 - Continuous delivery of Java EE applications with Jenkins and Doc...
JavaCro'14 - Continuous delivery of Java EE applications with Jenkins and Doc...
 
Docker Enables DevOps
Docker Enables DevOpsDocker Enables DevOps
Docker Enables DevOps
 
Continuous Delivery with Jenkins and Wildfly (2014)
Continuous Delivery with Jenkins and Wildfly (2014)Continuous Delivery with Jenkins and Wildfly (2014)
Continuous Delivery with Jenkins and Wildfly (2014)
 
Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4
 
Continuous Delivery and Infrastructure as Code
Continuous Delivery and Infrastructure as CodeContinuous Delivery and Infrastructure as Code
Continuous Delivery and Infrastructure as Code
 
atSistemas - Presentación Integración Continua AUG Barcelona enero13
atSistemas - Presentación Integración Continua AUG Barcelona enero13atSistemas - Presentación Integración Continua AUG Barcelona enero13
atSistemas - Presentación Integración Continua AUG Barcelona enero13
 
Devops in Networking
Devops in NetworkingDevops in Networking
Devops in Networking
 
Using CI for continuous delivery Part 3
Using CI for continuous delivery Part 3Using CI for continuous delivery Part 3
Using CI for continuous delivery Part 3
 
Using CI for continuous delivery Part 4
Using CI for continuous delivery Part 4Using CI for continuous delivery Part 4
Using CI for continuous delivery Part 4
 
Using CI for continuous delivery Part 2
Using CI for continuous delivery Part 2Using CI for continuous delivery Part 2
Using CI for continuous delivery Part 2
 
Using CI for continuous delivery Part 1
Using CI for continuous delivery Part 1Using CI for continuous delivery Part 1
Using CI for continuous delivery Part 1
 
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
 
Infrastructure as Code
Infrastructure as CodeInfrastructure as Code
Infrastructure as Code
 
20111018 1st lt_kom
20111018 1st lt_kom20111018 1st lt_kom
20111018 1st lt_kom
 
Continuous delivery-with-maven
Continuous delivery-with-mavenContinuous delivery-with-maven
Continuous delivery-with-maven
 
(ARC307) Infrastructure as Code
(ARC307) Infrastructure as Code(ARC307) Infrastructure as Code
(ARC307) Infrastructure as Code
 

Similaire à DOES14 - Joshua Corman - Sonatype

Production-Ready_Microservices_excerpt.pdf
Production-Ready_Microservices_excerpt.pdfProduction-Ready_Microservices_excerpt.pdf
Production-Ready_Microservices_excerpt.pdf
ajcob123
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
Andrew White
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
Ashlie Steele
 

Similaire à DOES14 - Joshua Corman - Sonatype (20)

DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
Why Hybrid Cloud Demands Consistency
Why Hybrid Cloud Demands ConsistencyWhy Hybrid Cloud Demands Consistency
Why Hybrid Cloud Demands Consistency
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Building cloud-ready Microservices
Building cloud-ready MicroservicesBuilding cloud-ready Microservices
Building cloud-ready Microservices
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!
 
Production-Ready_Microservices_excerpt.pdf
Production-Ready_Microservices_excerpt.pdfProduction-Ready_Microservices_excerpt.pdf
Production-Ready_Microservices_excerpt.pdf
 
Pragmatic Devops
Pragmatic DevopsPragmatic Devops
Pragmatic Devops
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Virtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase QualityVirtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase Quality
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshop
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 

Plus de Gene Kim

DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
Gene Kim
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
Gene Kim
 
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at ScaleDOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
Gene Kim
 
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge ScaleDOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
Gene Kim
 
DOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBsDOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBs
Gene Kim
 

Plus de Gene Kim (20)

DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
 
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOpsDOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
 
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the EnterpriseDOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
 
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at ScaleDOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
 
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
 
DOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to OpenDOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to Open
 
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, InitiativeDOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
 
DOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream MappingDOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream Mapping
 
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding EdgeDOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
 
DOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital OneDOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital One
 
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
 
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge ScaleDOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
 
DOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBsDOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBs
 
DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet? DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet?
 
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the EnterpriseDOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
 
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
 
DOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime DirectiveDOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
 
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
 
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
 

Dernier

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 

Dernier (20)

%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 

DOES14 - Joshua Corman - Sonatype

  • 1. DevOps Will Save The World! Public Safety, Public Policy, and DevOps in ContextJoshua Corman, Sonatype CTO Oct 23, 2014 DevOps Enterprise Summit #DOES14
  • 2. 2 10/23/2013 @joshcorman ~ Marc Marc Andreessen 2011
  • 4. 4 10/23/2013 @joshcorman Trade Offs Costs & Benefits
  • 7. THE REAL IMPLICATIONS OF HEARTBLEED
  • 8. BEYOND HEARTBLEED: OPENSSL IN 2014 (17 IN NIST’S NVD THRU JULY 25) 8 11/14/2014 CVE-2014-3470 6/5/2014 CVSS Severity: 4.3 MEDIUM  SEIMENS * CVE-2014-0224 6/5/2014 CVSS Severity: 6.8 MEDIUM  SEIMENS * CVE-2014-0221 6/5/2014 CVSS Severity: 4.3 MEDIUM CVE-2014-0195 6/5/2014 CVSS Severity: 6.8 MEDIUM CVE-2014-0198 5/6/2014 CVSS Severity: 4.3 MEDIUM  SEIMENS * CVE-2013-7373 4/29/2014 CVSS Severity: 7.5 HIGH CVE-2014-2734 4/24/2014 CVSS Severity: 5.8 MEDIUM ** DISPUTED ** CVE-2014-0139 4/15/2014 CVSS Severity: 5.8 MEDIUM CVE-2010-5298 4/14/2014 CVSS Severity: 4.0 MEDIUM CVE-2014-0160 4/7/2014 CVSS Severity: 5.0 MEDIUM  HeartBleed CVE-2014-0076 3/25/2014 CVSS Severity: 4.3 MEDIUM CVE-2014-0016 3/24/2014 CVSS Severity: 4.3 MEDIUM CVE-2014-0017 3/14/2014 CVSS Severity: 1.9 LOW CVE-2014-2234 3/5/2014 CVSS Severity: 6.4 MEDIUM CVE-2013-7295 1/17/2014 CVSS Severity: 4.0 MEDIUM CVE-2013-4353 1/8/2014 CVSS Severity: 4.3 MEDIUM CVE-2013-6450 1/1/2014 CVSS Severity: 5.8 MEDIUM As of today, internet scans by MassScan reveal 300,000 of original 600,000 remain unpatched or unpatchable
  • 9. HEARTBLEED + (UNPATCHABLE) INTERNET OF THINGS == ___ ? In Our Bodies In Our Homes In Our InfrastructureIn Our Cars
  • 10.
  • 11.
  • 12. •The The Cavalry isn’t coming… It falls to us Problem Statement Our society is adopting connected technology faster than we are able to secure it. Mission Statement To ensure connected technologies with the potential to impact public safety and human life are worthy of our trust. Collecting existing research, researchers, and resources Connecting researchers with each other, industry, media, policy, and legal Collaborating across a broad range of backgrounds, interests, and skillsets Catalyzing positive action sooner than it would have happened on its own Why Trust, public safety, human life How Education, outreach, research Who Infosec research community Who Global, grass roots initiative WhatLong-term vision for cyber safety Medical Automotive Connected Home Public Infrastructure I Am The Cavalry
  • 13. Connections and Ongoing Collaborations 5-Star Capabilities  Safety by Design – Anticipate failure and plan mitigation  Third-Party Collaboration – Engage willing allies  Evidence Capture – Observe and learn from failure  Security Updates – Respond quickly to issues discovered  Segmentation & Isolation – Prevent cascading failure Addressing Automotive Cyber Systems Automotive Engineers Security Researchers Policy Makers Insurance Analysts Accident Investigators Standards Organizations https://www.iamthecavalry.org/auto/5star/ 5-Star Framework
  • 14. Sign and share the petition http://bit.ly/5starauto
  • 15.
  • 16. SW SUPPLY CHAIN IN CONTEXT OF CYBERSECURITY BIG PICTURE
  • 17. KEY QUESTIONS Where are Attackers most focused? Where are Defenders most focused? Which Activities have the most security impact?
  • 18. -2014 Verizon Data Breach Investigations Report MOST ATTACKED: WEAK SOFTWARE IS #1 ATTACK VECTOR
  • 19. spending 19 11/14/2014 Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary Software Security gets LEAST $ but MOST attacker focus Host Security ~$10B Data Security ~$5B People Security ~$4B Network Security ~$20B Software Security ~$0.5B LEAST SPENDING/PRIORITY: WEAK SOFTWARE
  • 20. spending 20 11/14/2014 attack risk Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary Host Security ~$10B Data Security ~$5B People Security ~$4B Network Security ~$20B Software Security ~$0.5B Assembled 3rd Party & OpenSource Components ~90% of most applications Almost No Spending Written Code Scanning Software Security gets LEAST $ but MOST attacker focus LEAST SPENDING/PRIORITY: WEAK SW Worse, within Software, existing dollars go to the 10% written
  • 21. Defensible Infrastructure 10% Written Operational Excellence Situational Awareness Counter- measures The software & hardware we build, buy, and deploy. 90% of software is assembled from 3rd party & Open Source MOST IMPACT: BUY/BUILD DEFENSIBLE SOFTWARE
  • 22. IS IT OPEN SEASON ON OPEN SOURCE?
  • 23. 23 11/14/2014 Now that software is ASSEMBLED… Our shared value becomes our shared attack surface THINK LIKE AN ATTACKER
  • 24. One risky component, now affects thousands of victims ONE EASY TARGET 24 11/14/2014 THINK LIKE AN ATTACKER
  • 25. - 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 RequestsinMillions 13 Billion Requests in 2013 Growth Drivers Mobile Cloud Web Apps Big Data Component Usage Has Exploded 25 OPEN SOURCE USAGE IS EXPLODING
  • 26. Global Bank Software Provider Software Provider’s Customer State University Three-Letter Agency Large Financial Exchange Hundreds of Other Sites STRUTS
  • 27. W/MANY EYEBALLS, ALL BUGS ARE SHALLOW? STRUTS 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 10.0 9.0 8.0 7.0 6.0 5.0 4.0 3.0 2.0 1.0 CVE-2005-3745 CVE-2006-1546 CVE-2006-1547 CVE-2006-1548 CVE-2008-6504 CVE-2008-6505 CVE-2008-2025 CVE-2007-6726 CVE-2008-6682 CVE-2010-1870 CVE-2011-2087 CVE-2011-1772 CVE-2011-2088 CVE-2011-5057 CVE-2012-0392 CVE-2012-0391 CVE-2012-0393 CVE-2012-0394 CVE-2012-1006 CVE-2012-1007 CVE-2012-0838 CVE-2012-4386 CVE-2012-4387 CVE-2013-1966 CVE-2013-2115 CVE-2013-1965 CVE-2013-2134 CVE-2013-2135 CVE-2013-2248 CVE-2013-2251 CVE-2013-4316 CVE-2013-4310 CVE-2013-6348 CVE-2014-0094 CVSS Latent 7-11 yrs
  • 28. In 2013, 4,000 organizations downloaded a version of Bouncy Castle with a level 10 vulnerability 20,000 TIMES … Into XXX,XXX Applications… SEVEN YEARS after the vulnerability was fixed NATIONAL CYBER AWARENESS SYSTEM Original Notification Date: 03/30/2009 CVE-2007-6721 Bouncy Castle Java Cryptography API CVSS v2 Base Score: 10.0 HIGH Impact Subscore: 10.0 Exploitability Subscore: 10.0 BOUNCY CASTLE
  • 29. In December 2013, 6,916 DIFFERENT organizations downloaded a version of httpclient with broken ssl validation (cve-2012-5783) 66,824 TIMES … More than ONE YEAR AFTER THE ALERT NATIONAL CYBER AWARENESS SYSTEM Original Release Date: 11/04/2012 CVE-2012-5783 Apache Commons HttpClient 3.x CVSS v2 Base Score: 5.8 MEDIUM Impact Subscore: 4.9 Exploitability Subscore: 8.6 HTTPCLIENT 3.X
  • 30. IS IT TIME FOR A SOFTWARE SUPPLY CHAIN?
  • 31. ELEGANT PROCUREMENT TRIO 31 11/14/2014 1) Ingredients: Anything sold to $PROCURING_ENTITY must provide a Bill of Materials of 3rd Party and Open Source Components (along with their Versions) 2) Hygiene & Avoidable Risk: …and cannot use known vulnerable components for which a less vulnerable component is available (without a written and compelling justification accepted by $PROCURING_ENTITY) 3) Remediation: …and must be patchable/updateable – as new vulnerabilities will inevitably be revealed
  • 32. In 2013, 4,000 organizations downloaded a version of Bouncy Castle with a level 10 vulnerability 20,000 TIMES … Into XXX,XXX Applications… SEVEN YEARS after the vulnerability was fixed NATIONAL CYBER AWARENESS SYSTEM Original Notification Date: 03/30/2009 CVE-2007-6721 Bouncy Castle Java Cryptography API CVSS v2 Base Score: 10.0 HIGH Impact Subscore: 10.0 Exploitability Subscore: 10.0 PROCUREMENT TRIO + BOUNCY CASTLE
  • 36. Toyota’s Transformation of the Automobile Industry: v4L 36 • Comparing the XXXX and Prius • $39,900 versus $24,200 • 1,788 units versus 23,294 • Plant suppliers: 125 versus 800 • Firm-wide suppliers: 224 versus 5,500 • In-house production: 27% versus 54%
  • 37. Toyota’s Transformation of the Automobile Industry: v4L 37 • Variety of products offered • Velocity of product flow • Variability of outcomes against forecast • Visibility of processes to enable learning
  • 38. Toyota’s Transformation of the Automobile Industry: v4L 38 • Variety of software produced • Velocity of software delivery • Variability of outcomes against forecast • Visibility of processes to enable learning
  • 39. The ‘L’ in v4L 39 Create Awareness (transparency) “Unless problems are seen, they will not be solved. Systems need to be in place to report ideas, problems, deviations, and potential issues with no delay.” Establish capability (empower) “Unless someone is capable of solving a problem that might arise within the boundaries set for him or her, that person will be unable to contribute to the problem solving process.” Make action protocols (govern) “Actions have to be taken within a set of constraints, and they must conform to certain standards.” Generate system-level awareness (monitor) “As experience with solving problems is obtained, greater awareness of other areas that might be affected needs to be created.”
  • 41. 41 11/14/2014 Compound Project Consumer“Part” Discovery Repair Discovery Repair Aware Recovery Airbag Airbag Airbag Car X Airbag Airbag Alex’s Jaguar
  • 42. 42 11/14/2014 Compound Project Consumer“Part” Airbag Airbag Airbag Car X Airbag Airbag Alex’s Jaguar Struts Airbag Airbag Bank of X… Airbag Airbag Sally Bank Customer Struts Airbag Airbag IBM WebSphere Airbag Airbag Bank of X… Bouncy Castle Airbag Airbag 20,000 Applications Airbag Airbag x ??? Users Discovery Repair Discovery Repair Aware Recovery
  • 43. TRUE COSTS & LEAST COST AVOIDERS: DOWNSTREAM ACME Enterprise Bank Retail Manufacturing BioPharma Education High Tech Enterprise Bank Retail Manufacturing BioPharma Education High Tech Enterprise Bank Retail Manufacturing BioPharma Education High Tech
  • 44. 44 11/14/2014 Compound Parts ProductPart (Bolt) End Consumer Discovery Repair Discovery Repair Aware Recovery Aware Recovery Foo_0 IBM WebSphere Bank of X.com Foo_1 Foo_2 Foo_3 Foo_4 Foo_5 Foo_6 Foo_7 Foo_8 Foo_9 Foo_ 10 Foo_11 Foo_0 Foo_1 Foo_2 Foo_3 Foo_4 Foo_5 Foo_6 Foo_7 Foo_8 Foo_9 Foo_ 10 Foo_11 Foo_0 Foo_1 Foo_2 Foo_3 Foo_4 Foo_5 Foo_6 Foo_7 Foo_8 Foo_9 Foo_ 10 Foo_11 Struts 2
  • 45. 45 11/14/2014 X Axis: Time (Days) following initial HeartBleed disclosure and patch availability Y Axis: Number of products included in the vendor vulnerability disclosure Z Axis (circle size): Exposure as measured by the CVE CVSS score COMMERCIAL RESPONSES TO OPENSSL
  • 46. How can we choose the best components FROM THE START? Shift Upstream = ZTTR (Zero Time to Remediation) Analyze all components from within your IDE License, Security and Architecture data for each component, evaluated against your policy @joshcorman@451wendy
  • 47. MANUAL POLICIES CAN’T WORK AT DEVOPS SPEED OR ENTERPRISE SCALE 4711/14/2014
  • 48. If you’re not using secure COMPONENTS you’re not building secure APPLICATIONS Component Selection DEVELOPMENT BUILD AND DEPLOY PRODUCTION COMPONENT SELECTION
  • 49. Component Selection DEVELOPMENT BUILD AND DEPLOY PRODUCTION COMPONENT SELECTION Today’s approaches AREN’T WORKING 46m vulnerable components downloaded ! 71% of apps have 1+ critical or severe vulnerability ! 90% of repositories have 1+ critical vulnerability !
  • 50. RUGGED DEVOPS AND GENE’S “THREE WAYS” 1) Systems Thinking 2) Amplify Feedback Loops 3) Culture of Continuous Experimentation & Learning
  • 51. ADOPT A "DEVSECOPS" MINDSET Policies, Models, Templates IT Operations Intelligence and Security Intelligence Requirements Prevent Issues Detect Issues Remediate/ Change Build Assemble Test Deploy Predict Issues Monitoring and Analytics Source: Neil MacDonald Gartner
  • 52. 52 10/23/2013 @joshcorman Defensible Infrastructure Operational Excellence Situational Awareness Counter- measures DevOps DevOps DevOps
  • 54. 1. AS OPEN SOURCE USAGE EXPANDS, SO DO THE RISKS 2. SECURITY BUDGETS ARE OUT OF SYNC WITH RISK AND REALITY 3. PARETO PRINCIPLE 2.0? (THE “90/10” RULE): LOW EFFORT AND BIG GAINS 4. YOU USE A SOFTWARE SUPPLY CHAIN. HOW WELL DO YOU MANAGE IT? 5. EMPOWER YOUR DEVELOPERS. THEY’RE YOUR FRONT LINE DEFENSE 6. MANUAL POLICIES JUST DON’T WORK IN A SECURE DEVELOPMENT LIFECYCLE 7. AGILE DEVELOPMENT REQUIRES AGILE SECURITY 54
  • 55. “Sonatype presents a rare opportunity to do something concrete in the application security space. One of the 1st tools that comes close to remediation not just scan results and recommendations.” -- Wendy Nather
  • 57. • Summary: The number of components analyzed, including security issues and licenses used • Bill of Materials: A complete list of the components used in your application • Security Analysis: Known security threats by vulnerability and severity level • Quality Analysis: Details component age, fingerprint verification & adherence to policies • License Analysis: License descriptors for every component & license implication for your application SAMPLE OPEN SOURCE VISIBILITY REPORT:
  • 58.
  • 60. 60

Notes de l'éditeur

  1. http://www.caida.org/research/security/code-red/coderedv2_analysis.xml#animations
  2. The gist of this slide is to inform the audience that this isn’t really a new problem. It’s just new to our industry. We can take consolation in the fact that we aren’t alone and that we can learn from those that have come before us. For example tracking auto parts to consumers for recall purposes.
  3. NIST’s NVD (National Vulnerability Database_ http://web.nvd.nist.gov/view/vuln/search-results?query=OpenSSL&search_type=all&cves=on  SEIMENS was affected by 4 OpenSSL flaws beyond HeartBleed. One from 2010 http://www.scmagazine.com/siemens-industrial-products-impacted-by-four-openssl-vulnerabilities/article/361997/ “Several Siemens products used for process and network control and monitoring in critical infrastructure sectors are affected by four vulnerabilities in the company's OpenSSL cryptographic software library. The vulnerabilities – CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470 – can be exploited remotely, and fairly easily, to hijack a session as part of a man-in-the-middle attack or to crash the web server of the product, according to a Thursday ICS-CERT post. Siemens has already issued updates for APE versions prior to version 2.0.2 and WinCC OA (PVSS), but has only issued temporary mitigations for CP1543-1, ROX 1, ROX 2, and S7-1500. The products are typically used in the chemical, critical manufacturing, energy, food and agriculture, and water and wastewater systems sectors, according to the post.”
  4. See also @iamthecavalry grass roots effort to drive public safety in these four areas of technology dependence. www.iamthecavalry.org
  5. www.ruggedsoftware.org https://www.ruggedsoftware.org/documents/
  6. www.ruggedsoftware.org https://www.ruggedsoftware.org/documents/ “I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic, and national security“
  7. We see many signs adversaries have notices the ease and leverage of attacking widely depended upon OpenSource porjects (like Struts, Spring, Guice, OpenSSL [Heartbleed])
  8. Verizon Data Breach – Figure 16 Web app is the top attack surface – NOTE: This is BEST CASE, since JUST Web Apps – other categories also count as Application/Software Weaknesses This column of figure 16 is the % of attacks leading to breached records (other tables/columns show attack patterns not directly tied to breached records)
  9. Not finished, but attempts to show… LEAST Spend: Application Security gets 1/80th of the spending of security dollars (about $0.5B of about $40B) MOST Attacked: Contrast this with applications are the most attacked vector at this point in the threat landscape. E.g.The 2013 numbers from Verizon Business Data show Web Application attacks by far were the #1 vector leading to data disclosure And within AppSec, nearly all focus is on the 10% of code that’s written in modern applications – not the assembled 3rd party and OpenSource Components – like the devastating Struts vulnerability in 2013.
  10. Not finished, but attempts to show… LEAST Spend: Application Security gets 1/80th of the spending of security dollars (about $0.5B of about $40B) MOST Attacked: Contrast this with applications are the most attacked vector at this point in the threat landscape. E.g.The 2013 numbers from Verizon Business Data show Web Application attacks by far were the #1 vector leading to data disclosure And within AppSec, nearly all focus is on the 10% of code that’s written in modern applications – not the assembled 3rd party and OpenSource Components – like the devastating Struts vulnerability in 2013.
  11. “Defensible Infrastructure” (relatively Stronger/Weaker software and infrastrcuture) is THE MOST IMPORTANT factor for the security of any environment… i.e. would you want to fight the zombie hordes in a broken down wooden barn or in a brick school building But/and increasingly… 90% of that is OpenSource code of unknown [origin, quality, security]
  12. We see many signs adversaries have notices the ease and leverage of attacking widely depended upon OpenSource porjects (like Struts, Spring, Guice, OpenSSL [Heartbleed])
  13. From an attacker eye view… it used to require finding a flaw in Bank XYZ and then exploiting that bankand only than bank… but now….
  14. …if an attacker finds a flaw in Struts… it can attack EVERY bank who uses it – which is most of them. Same reason Heartblled was so far reaching… shared depenedance == shared risk/attack surface POINT: INCREASE in attacker interest/value – aka Blood is in the water…
  15. POINT: Increase in Dependence – including .gov and financial service where they had resisted prior to 2008/2009 Increase in attacker focus + increase in dependence == ______ 2007: 500M 2008: 1B 2009: 2B 2010: 4B 2011: 6B 2012: 8B 2013:13B
  16. Before the highly publicized OpenSSL Heartbleed Last summer/fall… a worst case CVSS 10 flaw in the hugely popular Apache Struts Project was used to compromise most of the banks and other serious targets above. This bug had been there for YEARS unnoticed. Many had to be told by the FBI that they were compromised This triggered the FS-ISAC to issue guidance on 3rd Party and OpenSource Supply Chain risk… out of necessity The 3 letter agency SHOCKED me… but alas is true The green is a Chinese attack tool out almost immediately after the CVE was announced.
  17. I looked deeper into the Apache Struts Project. A pattern I’ve recognized is that there is more vulnerability/attacker interest in the most depended upon OpenSource Projects. Struts is one of the most depended upon – especially so in the Financial Services industries… As previously stated, one of the CVSS lvl 10 (of 10) struts vulnerabilities wreaked havoc on POINT: There are more vulnerabilities – and more serious ones…. in the recent year to two. I may ask this gets dynamically autogenerated per-project by my teams. NOTE: Many of these flaws were dormant a VERY long time – despite the “many eyeballs” false belief. NOTE: I personally think this more speaks to attacker/aversary interest.
  18. Here are just a few examples so you can see that this risk is real… Bouncy Castle is a popular open source component… and even after critical security alerts were issued in 2009, 4000 companies still downloaded it 20,000 times. And that was five years after a better, safer replacement was issued. This is a level 10 critical security risk. Imagine the exposed applications out there… maybe some of them store your personal credit card data or other personal information.
  19. This example is even worse… a version of httpclient with a broken SSL validation downloaded by 6,916 organizations 66,824 times more than a year after the alert. It wasn’t hard for us to find these examples… this just skims the surface. Some of you may have heard about the FBI Warning last year about Struts… a vulnerable – and old – version of this framework was used to hack into a handful of large organizations.It mde a lot of news. But people are still using it today.
  20. Here are just a few examples so you can see that this risk is real… Bouncy Castle is a popular open source component… and even after critical security alerts were issued in 2009, 4000 companies still downloaded it 20,000 times. And that was five years after a better, safer replacement was issued. This is a level 10 critical security risk. Imagine the exposed applications out there… maybe some of them store your personal credit card data or other personal information.
  21. This isn’t new – it’s new to us…it’s a maturity of the industry and components are new to the s/w industry Not sure the supplier is something worth shaking down…there aren’t big guys but more little guys…more like the kickstarter movement. Supplier means nothing b/c the Supplier is equivalent Can get data on how people use it but can’t necessarily get info on the people who make up the project or getting them to self-certify… Project level info we can get from the users Apache, Eclipse or JBOSS can work but over time that is becoming less important in the overall component landscape. Key is “what is everyone doing” – what are the behaviors that are good indicators of the quality of work that is produced in any project. # of people in project and # of commits is “braindead” what OHLO does…more elegant way is possible (MH)
  22. The gist of this slide is to inform the audience that this isn’t really a new problem. It’s just new to our industry. We can take consolation in the fact that we aren’t alone and that we can learn from those that have come before us. For example tracking auto parts to consumers for recall purposes.
  23. Comparing Toyota and General Motors
  24. 41% 1st level dependencies get fixed – EVER Of those, they take 390 days MTTR Filtering just for CVSS 10s – the MTTR is 224 days. Since this can be n tiered – it is actually a lot worse.
  25. Qualitative takeaways:   Virtually all major (and not so major) software vendors are building on a stack of open source (including security vendors). The breadth of use across some vendors, IBM most notably is remarkably high (open source is not just in a few rogue products). New discoveries are getting more serious over time. New discoveries are getting less vendor attention (fewer vendor disclosures) despite their being more serious. Vendors are responding to new discoveries at a somewhat slower pace. The significant increase in product disclosures after the later OpenSSL disclosures, which affect all versions of OpenSSL not just versions 1.0.1 or later, implies that many vendors and products were using old libraries (version 0.9.8 was first released in July, 2005).   Total disclosures: 227   Total product instances affected by disclosures: 2,513   Mean time to repair: 35.8   Median time to repair: 22.0  
  26. Click onto pane and zoom in and zoom out Guide your eyes to the RIGHT…. This is a normal Developer IDE called Eclipse… Sonatype made a PLUGIN within it to show a developer the component BEFORE before they choose or commit to ELECTIVE/AVOIDABLE Risk/AttackSurface/Complexity/LegalIssues … The RED chain (e.g.) is every version of Strut2-core…. And if you move RIGHT far enough…. It will lack KNOW CRITICAL vulnerabilities. The Green bar charts are the download popularity… which doesn’t speak at all to SECURITY… but may give people more comfort that it is stable and being used. License rsik is based on self-defined policy – we track if the use of this license can cause your whole website to now be FREE common opensource – like GPL… which might be very bad for you… and a DIFFERENT type of risk…
  27. You have at risk components flowing into your organization. It is an absolute fact. And we’re not just talking about security issues… you also have some quality issues and software licensing issues that make it illegal to use a component for a commercial use. It’s like building a car with parts manufactured by unknown vendors… and no criteria to be met.
  28. Despite some efforts to manage component usage, it just isnt working… We know this because we know how many vulnerable components are downloaded… We know how many, on average, end up in your Nexus repository manager And we know how many, on average, end up in your applications When Sonatype looks at our downloads from our curated “Central Repository” The free Parts Warehouse on the internet (there were 46M downloads of vulnerable binaries) In our free/pay for Nexus local On Premise cached copies at development companies… 90% still contain one or more of the MOST SEVER vulnerabilities – so not well cleansed When our free and paid Application Health Checks look at APPLICATIONS built from these local repositories… 71% of those applications STILL have Worst case vulnerabilities. The Industry is not cleansing the supply chain (yet) – primary reason, they don’t know/look at/evaluate the quality of the “supply in the supply chain” – too manually/hard to look at NIST NVD (e.g.)
  29. A longer term implication of AWS is one of speed and agility for the provisioning and deprovisioning of IT services, including security. Security policy enforcement devices such as firewalls have traditionally been set manually via a console. Within AWS and other cloud services, this mindset will switch to setting policies programmatically using APIs to configure security policy enforcement points based on policy. This will be achieved typically using scripts or automation tools such as Chef, Puppet and others where the security policies are embedded and configured within scripts/blueprints/recipes that drive the configuration without requiring human intervention. This "need for speed" and shift in organizational thinking is captured within a movement referred to as "DevOps" — cultural/mindset change that tears down the traditional walls within IT (development on the left side of this slide, operations and security on the right side) to deliver faster IT-enabled capabilities for the business. Whether you call this "DevOps" or simply the need for spped and IT agility, the result is the same. IT needs to be able to provision/deprovision workloads more quickly and to do this, people, tools and processes must change. Security needs to be an integral part of this transformation — thus the term "DevSecOps," bringing security into the center of this shift.
  30. We see many signs adversaries have notices the ease and leverage of attacking widely depended upon OpenSource porjects (like Struts, Spring, Guice, OpenSSL [Heartbleed])
  31. Sonatype presents a rare opportunity to do something concrete in the application security space. One of the 1st tools that comes close to remediation not just scan results and recommendation
  32. Sonatype presents a rare opportunity to do something concrete in the application security space. One of the 1st tools that comes close to remediation not just scan results and recommendation
  33. English
  34. English English ·         Install and run CLM Server ·         Setup organization, a test app, and a policy ·         Added configuration options for FoD to point to CLM instance, user/pass, and id of the test application ·         Created task in FoD task service to generate Sonatype report ·         Created FoD beta flag for Sonatype, which allows per tenant enable/disable ·         Added logic to the static payload uploader to trigger Sonatype report generation after upload completes ·         This triggers task service to run the CLM scanner on the payload ·         After the scanner completes its work, task service reads the resulting scan id ·         Task service makes REST call to CLM to get resulting PDF using scan id to identify ·         Task service creates report entry pointing to the newly downloaded PDF
  35. We see many signs adversaries have notices the ease and leverage of attacking widely depended upon OpenSource porjects (like Struts, Spring, Guice, OpenSSL [Heartbleed])