SlideShare une entreprise Scribd logo
1  sur  48
DevSecOps
A 2-year journey of success &
failure!
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
A bit about me;
Former RBS mainframe procrastinator, turned
excited internet security bloke
Head of Security
Squad Lead
Product Owner
PCI Manager
Security Manager
SecOps Lead
“Doing
Security
things at
Skyscanner
”
Skyscanner 2017
@StuHirstinfosec
A bit about me;
1. I LIKE MEMES
2. I DON’T
REALLY
KNOW WHAT
I’M DOING
Skyscanner
@StuHirstinfosec
Who are we?
Skyscanner 2014
Skyscanner Security in 2014…
Skyscanner 2017
Skyscanner Security in 2017…
WE HAVE A LOGO
N’ EVERYTHING!
@StuHirstinfosec
Skyscanner 2017
Skyscanner Security in 2017…
@StuHirstinfosec
Some successes –
look out for the failure
klaxon!
@StuHirstinfosec
Adventures in Bug
Bounties…
@StuHirstinfosec
Skyscanner 2017
WHAT IS A
BUG BOUNTY
SCHEME?
CROWD
SOURCED
security
‘Hackers For
Hire’
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
In 2015 we trialled a
scheme
I didn’t set an effective
scope….
FAILURE
KLAXON!!!
@StuHirstinfosec
Skyscanner 2017
Skyscanner 2017
Skyscanner 2017
2 week scheme – glut!
365 scheme – needs constant
researcher rotation, refuse to pay
for crap bugs, weed out the XSS
guys!
@StuHirstinfosec
Skyscanner 2017
Ideal outcomes;
• Weed out certain types of bug in
your code altogether
• Make researchers work harder
for their cash!
• Scale the scheme &
make it more valuable
over time
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
OOPS!
DevOps & Security
DevOps & Security
@StuHirstinfosec
Data (especially PII)…
@StuHirstinfosec
Skyscanner 2017
NOW WE
TALK
ABOUT
DATA;
@StuHirstinfosec
Skyscanner 2017
WHAT DATA DO YOU
STORE OR PROCESS?
@StuHirstinfosec
HOW VALUABLE IS IT TO
YOU?
Skyscanner 2017
User data
Employee data
Financial data
Flights, hotel, car hire
data
Code
Credentials @StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
Sensitive data
(especially PII)…
@StuHirstinfosec
User Data
@StuHirstinfosec
User Data
@StuHirstinfosec
Disclaimer;
I am not a
cryptograph
y expert
Custom Crypto
@StuHirstinfosec
User Data
Data in
transmission
;
TLS not SSL
(and get rid of your old
ciphers! – run SSL Labs!)
@StuHirstinfosec
User Data
Data at rest;
AES256
Don’t accept any
substitutes!
@StuHirstinfosec
User Data
Q: When you encrypt
data – can you tell me
where you put the
decryption keys?
@StuHirstinfosec
User Data
A: SOMEWHERE
BLOODY
ELSE!
@StuHirstinfosec
Passwords…
@StuHirstinfosec
Skyscanner 2017
Passwords in Plain Text?!
Dude, it’s 2017.
@StuHirstinfosec
Skyscanner 2017
Password Hashing:
@StuHirstinfosec
“I DID NOT
HAVE MD5
RELATIONS
WITH THAT
PASSWORD”
Skyscanner 2017
Password Hashing:
@StuHirstinfosec
THESE ARE
GOOD
ARGON2 IS
BETTER!
Skyscanner 2017
Complexity Vs Entropy
@StuHirstinfosec
J8^*uhg54$3.
ILikeToGoToTheShopForCoffee
Skyscanner 2017
@StuHirstinfosec
• Get rid of credentials in code; GitHub/GitLab etc
• Credstash
• Git Secrets
• GitLeaks (have fun!)
Q. What’s the best way to protect
credentials in code?
A. Don’t have any
Two-factor/Passwords
Password solutions
@StuHirstinfosec
Awareness & Training…
@StuHirstinfosec
What we do…
What we do: Security Champions
@StuHirstinfosec
FAILURE
KLAXON!!!
@StuHirstinfosec
What didn’t go so well?
What didn’t go so well?
Secure Coding
Online Training
“I’m too busy!!”
What we do…
What we do: Crypto & Bug Challenges
@StuHirstinfosec
Hosted in AWS –
cheap, easy to
build!
What we do…
What we do: Crypto & Bug Challenges
@StuHirstinfosec
Security Swag -
everyone loves t-
shirts & stickers!
What we do…
What we do: Security Meet Up
@stuhirstinfosec
Employees
Employee behaviour….blog post
thank you
@stuhirstinfosec

Contenu connexe

Tendances

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspectivekumar641
 
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...Amazon Web Services
 
Building a Highly Secure S3 Bucket
Building a Highly Secure S3 BucketBuilding a Highly Secure S3 Bucket
Building a Highly Secure S3 BucketJohn Varghese
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning CrowdStrike
 
See Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the EndpointSee Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the EndpointProtectWise
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For MoneyShubham Gupta
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudProtectWise
 
5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Programbugcrowd
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Hack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsHack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsSaumil Shah
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of SecuritySaumil Shah
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
Redefining Defense - HITB2017AMS Keynote
Redefining Defense - HITB2017AMS KeynoteRedefining Defense - HITB2017AMS Keynote
Redefining Defense - HITB2017AMS KeynoteSaumil Shah
 
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent TrackingG. S. McNamara
 
An Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakCrowdStrike
 
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
 

Tendances (20)

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspective
 
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...
A CISO’s Journey at Vonage: Achieving Unified Security at Scale - SID210 - re...
 
Building a Highly Secure S3 Bucket
Building a Highly Secure S3 BucketBuilding a Highly Secure S3 Bucket
Building a Highly Secure S3 Bucket
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning
 
See Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the EndpointSee Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the Endpoint
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
 
5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program
 
Anwar Ibrahim Sokong LGBT
Anwar Ibrahim Sokong LGBTAnwar Ibrahim Sokong LGBT
Anwar Ibrahim Sokong LGBT
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Hack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsHack.LU - The Infosec Crossroads
Hack.LU - The Infosec Crossroads
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
Redefining Defense - HITB2017AMS Keynote
Redefining Defense - HITB2017AMS KeynoteRedefining Defense - HITB2017AMS Keynote
Redefining Defense - HITB2017AMS Keynote
 
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
 
An Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware Outbreak
 
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
 

Similaire à DevSecOps - a 2 year journey of success & failure!

Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyScott Cressman
 
The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageJan Schaumann
 
Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)Jan Schaumann
 
Hi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouHi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouStu Hirst
 
Instagram Stories" Snapchat Killer or Storyteller's Dream?
Instagram Stories" Snapchat Killer or Storyteller's Dream?Instagram Stories" Snapchat Killer or Storyteller's Dream?
Instagram Stories" Snapchat Killer or Storyteller's Dream?FLBlogCon
 
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...OWASP Kyiv
 
Stu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst
 
Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst
 
Hidden empires of malware
Hidden empires of malwareHidden empires of malware
Hidden empires of malwareRyan Kovar
 
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...AWS Chicago
 

Similaire à DevSecOps - a 2 year journey of success & failure! (13)

Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
 
Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)
 
Hi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouHi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love You
 
Instagram Stories" Snapchat Killer or Storyteller's Dream?
Instagram Stories" Snapchat Killer or Storyteller's Dream?Instagram Stories" Snapchat Killer or Storyteller's Dream?
Instagram Stories" Snapchat Killer or Storyteller's Dream?
 
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
 
Ungagged UK Talk - Google in a Post Update and Mobile First World.
Ungagged UK Talk - Google in a Post Update and Mobile First World.Ungagged UK Talk - Google in a Post Update and Mobile First World.
Ungagged UK Talk - Google in a Post Update and Mobile First World.
 
Stu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To Ciso
 
Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019
 
Hidden empires of malware
Hidden empires of malwareHidden empires of malware
Hidden empires of malware
 
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...
Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Mea...
 
Owasp austin
Owasp austinOwasp austin
Owasp austin
 

Plus de Stu Hirst

Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst
 
AWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptxAWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptxStu Hirst
 
Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecStu Hirst
 
War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!Stu Hirst
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecStu Hirst
 
Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Stu Hirst
 

Plus de Stu Hirst (7)

Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
 
AWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptxAWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptx
 
Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

DevSecOps - a 2 year journey of success & failure!

Notes de l'éditeur

  1. I like memes – here is my obligatory Ive Just Had A Baby meme. (like I’m the only guy who has ever had a baby!) I don’t really know what I’m doing. I don’t say that flippantly or because I have a bad dose of imposter syndrome, but rather I work at a company which does things a bit differently, and I include Security in that. There aren’t too many companies I can look to, to understand the right thing to do.
  2. Major global travel brand – meta search engine for flights, hotels and car hire, inc mobile app.
  3. Security shouldn’t exist merely to clean up the unicorn sh*t from DevOps engineers
  4. I deal with enough of that at home at the moment!
  5. Today I’m going to talk a little bit about DATA I made this meme especially and I’m particularly proud of it, which probably doesn’t say much for my current social life.
  6. We all work for companies that are essentially data driven The two main questions you should concern yourself with, are: What data do you store? How valuable is it to you? By valuable, I mean, how does it define your business, but also from a security point of view, what would be the implications of it not being available, or it being breached in some way?
  7. We’re obviously very data driven at Skyscanner All manner of data (this isn’t an exhaustive list) User Employee Financial Flights, hotel, car data And then code and credentials, which is just data, right?
  8. We use data for all manner of reasons – including metrics across the business
  9. One of the drivers for tightening up on data security and Skyscanner is no different, is GDPR. Now I know it’s a pretty dry subject and you’ll have heard lots already, but the consequences of breaches are about to increase massively and a lot of businesses are simply unprepared. So perhaps I can help with a few ideas today
  10. 2nd disclaimer; I will talk about some cryptographic principles. But I am not a cryptography expert! Mr Buchanan is! Most engineers are not cryptography experts either, so when I hear people talk about creating ‘custom crypto’…..
  11. …..custom crypto…. Please don’t. We have some wonderful, well established cryptographic protocols in the industry today, we don’t really need individuals creating their own. So let’s have a look at two of the simple ones, but widely not yet fully explored; This will be old news to many of you, but sadly not all!
  12. You really should be designing systems to use TLS and not SSL. I’ve seen companies implement TLS but then not get rid of their old ciphers – you can check using SSLLabs for websites. Google now flag websites which either don’t use HTTPS as standard, or have weak ciphers.
  13. Data At Rest There’s only really one standard – AES256 – that’s the recognised industry standard for encryption at rest
  14. SOMEWHERE ELSE! And rotate keys; 90 days is good practice