SlideShare une entreprise Scribd logo
1  sur  96
SECURITY IS DEAD.
                                      LONG LIVE RUGGED DEVOPS:
      SEPTEMBER 12 – 14, 2012
                                      IT AT LUDICROUS SPEED…
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
Gene Kim: Two Truths and a Lie

  Please fill out the table below with two statements that are true and one lie
  about yourself. I will put the information into the polling system to go live
  before your presentation.




   Statement                                                 Truth or lie?
   I didn't know that Purdue University was in Indiana,      Truth
   otherwise I wouldn't have gone there
   I still carry around a J. R. R. Tolkien book in my        Lie
   briefcase everywhere I go
   I have an outrageous man-crush on my co-presenter,        Truth
   Josh Corman
About Joshua Corman
     •   Director of Security Intelligence for Akamai Technologies
           -   Former Research Director, Enterprise Security [The 451 Group]
           -   Former Principal Security Strategist [IBM ISS]


     •   Industry:
           -   Expert Faculty: The Institute for Applied Network Security (IANS)
           -   2009 NetworkWorld Top 10 Tech People to Know
           -   Co-Founder of “Rugged Software” www.ruggedsoftware.org
           -   BLOG: www.cognitivedissidents.com


     •   Things I’ve been researching:
           -   Compliance vs Security
           -   Disruptive Security for Disruptive Innovations
           -   Chaotic Actors
           -   Espionage
           -   Security Metrics


3
Josh Corman: Two Truths and a Lie

  Please fill out the table below with two statements that are true and one lie
  about yourself. I will put the information into the polling system to go live
  before your presentation.




   Statement                                                 Truth or lie?
   My philosophy thesis was entitled "Schizophrenic          Truth
   Alienated Tennis Pros in Love"
   I'm the president of my local zombie survivalist          Lie
   chapter
   I have a life sized statue of Spider-Man in my foyer      Truth
About Gene Kim
     • Researcher, Author


     • Industry:
          - Invented and founded Tripwire, CTO (1997-2010)
          - Co-author: “Visible Ops Handbook”(2006), “Visible Ops Security” (2008)
          - Co-author: “When IT Fails: The Novel,” “The DevOps Cookbook” (Coming May 2012)



     • Things I’ve been researching:
          - Benchmarked 1300+ IT organizations to test effectiveness of IT controls vs. IT
            performance
          - DevOps, Rugged DevOps
          - Scoping PCI Cardholder Data Environment



5
PART 1: THE PROBLEM
      SEPTEMBER 12 – 14, 2012
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
Consequences: Value & Replaceability




    http://blog.cognitivedissidents.com/2011/10/24/a-replaceability-continuum/




8
You Don’t Need To Be Faster Than the Bear…




                      9
How will we rise?
DEPENDENCE

SEPTEMBER 12 – 14, 2012
Grand Hyatt, San Francisco   Organized by
SOFTWARE
                              AS
VULNERABILITY
 SEPTEMBER 12 – 14, 2012
 Grand Hyatt, San Francisco        Organized by
CONNECTED
                             AS
           EXPOSED
SEPTEMBER 12 – 14, 2012
Grand Hyatt, San Francisco        Organized by
OUR CHALLENGES ARE NOT
      TECHNICAL,

              BUT CULTURAL


   SEPTEMBER 12 – 14, 2012
   Grand Hyatt, San Francisco   Organized by
WE CAN DO
                  BETTER

SEPTEMBER 12 – 14, 2012
Grand Hyatt, San Francisco   Organized by
PART 2: DEVOPS
      SEPTEMBER 12 – 14, 2012
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
Source: John Allspaw
Source: John Allspaw
Source: John Allspaw
Source: John Allspaw
Source: Theo Schlossnagle
Source: Theo Schlossnagle
Source: Theo Schlossnagle
Source: John Jenkins, Amazon.com
Ludicrous Speed?




31
Ludicrous Speed




32
Ludicrous Speed!




34
PART 3: RUGGED
      SEPTEMBER 12 – 14, 2012
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
WHAT IS RUGGED?

            SEPTEMBER 12 – 14, 2012
            GRAND HYATT, SAN FRANCISCO




36                            Organized by
WHAT IS RUGGED?

            SEPTEMBER 12 – 14, 2012
            GRAND HYATT, SAN FRANCISCO




37                            Organized by
SEPTEMBER 12 – 14, 2012
       GRAND HYATT, SAN FRANCISCO




           TRUTH, LIES
       AND DECISIONS
       Moving Forward in an Insecure World


RUGGED SOFTWARE DEVELOPMENT
Joshua Corman, David Rice, Jeff Williams

2010
                                             Organized by
RUGGED SOFTWARE
…so software not only needs to be…
FAST
AGILE
Are You Rugged?
HARSH
UNFRIENDLY
THE MANIFESTO
      SEPTEMBER 12 – 14, 2012
      GRAND HYATT, SAN FRANCISCO




                        Organized by
I recognize that my code will be used in ways I
cannot anticipate, in ways it was not designed,
   and for longer than it was ever intended.
www.ruggedsoftware.org

https://www.ruggedsoftware.org/documents/
CrossTalk
http://www.crosstalkonline.org/issues/marchapril-2011.html
From the Rugged Handbook StrawMan
WHAT IS RUGGED DEVOPS?

                SEPTEMBER 12 – 14, 2012
                GRAND HYATT, SAN FRANCISCO




55                                Organized by
Source: James Wickett
http://www.youtube.com/watch?v=JQEBYxp_vKs
Survival Guide/Pyramid




          www.ruggedsoftware.org

         Defensible Infrastructure
Survival Guide/Pyramid




           Operational Discipline

         Defensible Infrastructure
Survival Guide/Pyramid




           Situational Awareness

           Operational Discipline

         Defensible Infrastructure
Survival Guide/Pyramid

             Countermeasures

           Situational Awareness

           Operational Discipline

         Defensible Infrastructure
Source: James Wickett
PART 4: ROCKING INFOSEC WITH
      SEPTEMBER 12 – 14, 2012
                                      RUGGED DEVOPS
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
The First Way:
Systems Thinking
The First Way:
Systems Thinking



(Business)         (Customer)
The First Way:
Systems Thinking (Left To Right)

 Understand the flow of work

 Always seek to increase flow

 Never unconsciously pass defects downstream

 Never allow local optimization to cause global degradation

 Achieve profound understanding of the system
Create One Step Environment Creation Process


 Make environments available early in the Development
  process

 Make sure Dev builds the code and environment at the same
  time

 Create a common Dev, QA and Production environment
  creation process
Embed Into Automated Infrastructure Team


 Get educated on open source tools like puppet and chef

 Provide them your hardening guidance

 Add your monitoring tools
Break Things Early And Often


 “Do painful things more frequently, so you can make it less
  painful… We don’t get pushback from Dev, because they
  know it makes rollouts smoother.”


  -- Adrian Cockcroft, Architect, Netflix
Break Things Early And Often


 Enforce consistency in code, environments and configurations
  across the environments

 Add your ASSERTs to find misconfigurations, enforce https,
  etc.

 Add static code analysis to automated continuous integration
  and testing process
The First Way:
Systems Thinking: Infosec Insurgency

 Have someone attend the daily Agile standups
   • Gain awareness of what the team is working on

 Define what changes/deploys cannot be made without
  triggering full retest
Definition: Kanban Board


 Signaling tool to reduce WIP and increase flow




73
The First Way:
Outcomes

 Determinism in the release process
 Creating single repository for code and environments
 Consistent Dev, QA, Int, and Staging environments, all
  properly built before deployment begins
 Decreased cycle time
   • Reduce deployment times from 6 hours to 45 minutes
   • Refactor deployment process that had 1300+ steps spanning 4 weeks

 Faster release cadence
The Second Way:
Amplify Feedback Loops
The Second Way:
Amplify Feedback Loops (Right to Left)

 Understand and respond to the needs of all customers,
  internal and external

 Shorten and amplify all feedback loops: stop the line when
  necessary

 Create quality at the source

 Create and embed knowledge where we need it
“We found that when we woke up developers at 2am, defects
got fixed faster than ever”



               -Patrick Lightbody,
               CEO, BrowserMob
Phase 2: Extend Release Process And Create Right ->
Left Feedback Loops

 Invite Dev to post-mortems/root cause analysis meeting

 Have Dev and Infosec cross-train IT Operations

 Ensure application monitoring/metrics to aid in Ops and
  Infosec work (e.g., incident/problem management)
The Second Way:
Amplify Feedback Loops: Infosec Insurgency

 Give production feedback to developers: being attacked is a gift
    • Capture all instances of “UNION ALL” in user input and graph it, show it to
       developers
    • Show all instances of segfaults

 Create reusable Infosec use and abuse stories that can be added to every
   project
    • “Handle peak traffic of 4MM users and constant 4-6 Gb/sec Anonymous DDoS
       attacks”

 Pre-enable, shield streamline successful audits
    • Document separation of duty and compensating controls
    • Don’t let them disrupt the work
The Second Way:
Outcomes

 Defects and security issues getting fixed faster than ever

 Reusable Ops and Infosec user stories now part of the Agile
  process

 All groups communicating and coordinating better

 Everybody is getting more work done
The Third Way:
Culture Of Continual Experimentation And Learning
The Third Way:
Culture Of Continual Experimentation And Learning

 Foster a culture that rewards:
   • Experimentation (taking risks) and learning from failure

   • Repetition is the prerequisite to mastery

 Why?
   • You need a culture that keeps pushing into the danger zone

   • And have the habits that enable you to survive in the danger zone
“The best way to avoid failure is to fail constantly”
An Innovation Culture



“By installing a rampant innovation culture, they now do 165
experiments in the three months of tax season.


Our business result? Conversion rate of the website is up 50 percent.
Employee result? Everyone loves it, because now their ideas can make
it to market.”


--Scott Cook, Intuit Founder


85
You Don’t Choose Chaos Monkey…
Chaos Monkey Chooses You
Help Product Management…




 Lesson: Allocate 20% of Dev cycles to paying down technical
                            debt
Phase 3: Organize Dev and Ops To Achieve
Organizational Goals

 Allocate 20% of Dev cycles to non-functional requirements

 Integrate fault injection and resilience into design,
  development and production (e.g., Chaos Monkey)
The Third Way:
Culture Of Continual Experimentation And Learning:
Infosec
 Infosec remediation projects in the Agile backlog
   • Make technical debt visible
   • Help prioritize work against features and other non-functional
      requirements

 Release your Chaos Monkey
   • Evil/Fuzzy/Chaotic Monkey
   • Eridicate SQLi and XSS defects in our lifetime

 Find processes that waste everyone’s time
 Eliminate needless complexity
The Third Way:
Outcomes

 Technical debt is being paid off

 Exploitable attack surface area decreases

 Continual reduction of unplanned work

 More cycles for planned work

 More resilient code and environments

 Balancing nimbleness and practiced repetition

 Enabling wider range of risk/reward balance
PART 5: WHY?
      SEPTEMBER 12 – 14, 2012
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by
When IT Fails: The Novel and The DevOps Cookbook


                Coming in July 2012



                “In the tradition of the best MBA case studies, this
                  book should be mandatory reading for business and
                  IT graduates alike.” -Paul Muller, VP Software
                  Marketing, Hewlett-Packard


                “The greatest IT management book of our
                  generation.” –Branden Williams, CTO Marketing, RSA
When IT Fails: The Novel and The DevOps Cookbook


                  If you would like these slides, the “Top 10
                   Things You Need To Know About DevOps,”
                   Rugged DevOps resources, and updates on
                   the book:


                   Sign up at http://itrevolution.com
                   Email genek@realgenekim.me
                   Give me your business card
END
      SEPTEMBER 12 – 14, 2012
GRAND HYATT, SAN FRANCISCO
                                      Joshua Corman
    TRUTH, LIES                       Gene Kim
AND DECISIONS
Moving Forward in an Insecure World   September 2012




                                                       Organized by

Contenu connexe

En vedette

Quino siempre genial
Quino siempre genialQuino siempre genial
Quino siempre genialbaneik
 
101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conferenceHidde Benedictus
 
El coralet. Treball de 2n Primària
El coralet. Treball de 2n PrimàriaEl coralet. Treball de 2n Primària
El coralet. Treball de 2n PrimàriaCeip La Draga
 
Android Programming - Input
Android Programming - InputAndroid Programming - Input
Android Programming - InputJake Yoon
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
Bailey advertisement
Bailey advertisementBailey advertisement
Bailey advertisementbbkett
 
How fashion stores act on Facebook
How fashion stores act on FacebookHow fashion stores act on Facebook
How fashion stores act on FacebookPaul Dumitru
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene KimGene Kim
 
GpsLatitude Technology
GpsLatitude TechnologyGpsLatitude Technology
GpsLatitude TechnologyHarvey Kaye
 
國立高雄大學新生入學典禮交通安全宣導
國立高雄大學新生入學典禮交通安全宣導國立高雄大學新生入學典禮交通安全宣導
國立高雄大學新生入學典禮交通安全宣導Tzongyeu Lu
 
Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Jake Yoon
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochuresharmuys
 
마케팅커뮤니케이션
마케팅커뮤니케이션마케팅커뮤니케이션
마케팅커뮤니케이션Chaenam, Jun
 
Reference is Neither Here Nor There: Connecting Through SMS
Reference is Neither Here Nor There: Connecting Through SMSReference is Neither Here Nor There: Connecting Through SMS
Reference is Neither Here Nor There: Connecting Through SMSMargie Ruppel
 
2012년 소셜미디어의 현황과 전망
2012년 소셜미디어의 현황과 전망2012년 소셜미디어의 현황과 전망
2012년 소셜미디어의 현황과 전망Chaenam, Jun
 
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14) The archived Canadian US Patent Competitive Intelligence Database (2014/10/14)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14) Muchiu (Henry) Chang, PhD. Cantab
 

En vedette (20)

Quino siempre genial
Quino siempre genialQuino siempre genial
Quino siempre genial
 
101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference
 
El coralet. Treball de 2n Primària
El coralet. Treball de 2n PrimàriaEl coralet. Treball de 2n Primària
El coralet. Treball de 2n Primària
 
Android Programming - Input
Android Programming - InputAndroid Programming - Input
Android Programming - Input
 
Imc정의
Imc정의Imc정의
Imc정의
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
Bailey advertisement
Bailey advertisementBailey advertisement
Bailey advertisement
 
How fashion stores act on Facebook
How fashion stores act on FacebookHow fashion stores act on Facebook
How fashion stores act on Facebook
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim
 
GpsLatitude Technology
GpsLatitude TechnologyGpsLatitude Technology
GpsLatitude Technology
 
國立高雄大學新生入學典禮交通安全宣導
國立高雄大學新生入學典禮交通安全宣導國立高雄大學新生入學典禮交通安全宣導
國立高雄大學新生入學典禮交通安全宣導
 
passU
passUpassU
passU
 
Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현Android virtualization을 통한 IoT구현
Android virtualization을 통한 IoT구현
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochure
 
El arte
El arteEl arte
El arte
 
마케팅커뮤니케이션
마케팅커뮤니케이션마케팅커뮤니케이션
마케팅커뮤니케이션
 
Reference is Neither Here Nor There: Connecting Through SMS
Reference is Neither Here Nor There: Connecting Through SMSReference is Neither Here Nor There: Connecting Through SMS
Reference is Neither Here Nor There: Connecting Through SMS
 
아이애드
아이애드아이애드
아이애드
 
2012년 소셜미디어의 현황과 전망
2012년 소셜미디어의 현황과 전망2012년 소셜미디어의 현황과 전망
2012년 소셜미디어의 현황과 전망
 
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14) The archived Canadian US Patent Competitive Intelligence Database (2014/10/14)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/14)
 

Similaire à Rugged DevOps: Security at Ludicrous Speed

DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecSonatype
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Data-Driven Postmortems - SRV208 - Toronto AWS Summit
Data-Driven Postmortems - SRV208 - Toronto AWS SummitData-Driven Postmortems - SRV208 - Toronto AWS Summit
Data-Driven Postmortems - SRV208 - Toronto AWS SummitAmazon Web Services
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile TribeDan Keldsen
 
The Future Of Advertising and How To Make It Work For You Today
The Future Of Advertising and How To Make It Work For You TodayThe Future Of Advertising and How To Make It Work For You Today
The Future Of Advertising and How To Make It Work For You TodayAdNerds
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxSaraJayneTerp
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly CampusDave Olsen
 
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...Dana Gardner
 
It's Not Your Fault - Blameless Post-mortems
It's Not Your Fault - Blameless Post-mortemsIt's Not Your Fault - Blameless Post-mortems
It's Not Your Fault - Blameless Post-mortemsJason Hand
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSOAlexander Hutton
 
Continuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain ApproachContinuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain ApproachSonatype
 
Winning at Safety vpp16
Winning at Safety vpp16Winning at Safety vpp16
Winning at Safety vpp16The RAD Group
 
Strata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionStrata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionTaewook Eom
 
The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019Inês Almeida
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 

Similaire à Rugged DevOps: Security at Ludicrous Speed (20)

DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Data-Driven Postmortems - SRV208 - Toronto AWS Summit
Data-Driven Postmortems - SRV208 - Toronto AWS SummitData-Driven Postmortems - SRV208 - Toronto AWS Summit
Data-Driven Postmortems - SRV208 - Toronto AWS Summit
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile Tribe
 
The Future Of Advertising and How To Make It Work For You Today
The Future Of Advertising and How To Make It Work For You TodayThe Future Of Advertising and How To Make It Work For You Today
The Future Of Advertising and How To Make It Work For You Today
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptx
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly Campus
 
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...
Heartland Payment Systems CSO Instills Culture That Promotes Proactive and Op...
 
It's Not Your Fault - Blameless Post-mortems
It's Not Your Fault - Blameless Post-mortemsIt's Not Your Fault - Blameless Post-mortems
It's Not Your Fault - Blameless Post-mortems
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
Continuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain ApproachContinuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain Approach
 
Winning at Safety vpp16
Winning at Safety vpp16Winning at Safety vpp16
Winning at Safety vpp16
 
Strata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionStrata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full Version
 
The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019
 
Creating a Technology Disaster Plan
Creating a Technology Disaster PlanCreating a Technology Disaster Plan
Creating a Technology Disaster Plan
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 

Plus de Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementGene Kim
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 

Plus de Gene Kim (20)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 

Dernier

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Rugged DevOps: Security at Ludicrous Speed

  • 1. SECURITY IS DEAD. LONG LIVE RUGGED DEVOPS: SEPTEMBER 12 – 14, 2012 IT AT LUDICROUS SPEED… GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 2. Gene Kim: Two Truths and a Lie Please fill out the table below with two statements that are true and one lie about yourself. I will put the information into the polling system to go live before your presentation. Statement Truth or lie? I didn't know that Purdue University was in Indiana, Truth otherwise I wouldn't have gone there I still carry around a J. R. R. Tolkien book in my Lie briefcase everywhere I go I have an outrageous man-crush on my co-presenter, Truth Josh Corman
  • 3. About Joshua Corman • Director of Security Intelligence for Akamai Technologies - Former Research Director, Enterprise Security [The 451 Group] - Former Principal Security Strategist [IBM ISS] • Industry: - Expert Faculty: The Institute for Applied Network Security (IANS) - 2009 NetworkWorld Top 10 Tech People to Know - Co-Founder of “Rugged Software” www.ruggedsoftware.org - BLOG: www.cognitivedissidents.com • Things I’ve been researching: - Compliance vs Security - Disruptive Security for Disruptive Innovations - Chaotic Actors - Espionage - Security Metrics 3
  • 4. Josh Corman: Two Truths and a Lie Please fill out the table below with two statements that are true and one lie about yourself. I will put the information into the polling system to go live before your presentation. Statement Truth or lie? My philosophy thesis was entitled "Schizophrenic Truth Alienated Tennis Pros in Love" I'm the president of my local zombie survivalist Lie chapter I have a life sized statue of Spider-Man in my foyer Truth
  • 5. About Gene Kim • Researcher, Author • Industry: - Invented and founded Tripwire, CTO (1997-2010) - Co-author: “Visible Ops Handbook”(2006), “Visible Ops Security” (2008) - Co-author: “When IT Fails: The Novel,” “The DevOps Cookbook” (Coming May 2012) • Things I’ve been researching: - Benchmarked 1300+ IT organizations to test effectiveness of IT controls vs. IT performance - DevOps, Rugged DevOps - Scoping PCI Cardholder Data Environment 5
  • 6. PART 1: THE PROBLEM SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 7.
  • 8. Consequences: Value & Replaceability http://blog.cognitivedissidents.com/2011/10/24/a-replaceability-continuum/ 8
  • 9. You Don’t Need To Be Faster Than the Bear… 9
  • 10. How will we rise?
  • 11.
  • 12. DEPENDENCE SEPTEMBER 12 – 14, 2012 Grand Hyatt, San Francisco Organized by
  • 13.
  • 14.
  • 15.
  • 16. SOFTWARE AS VULNERABILITY SEPTEMBER 12 – 14, 2012 Grand Hyatt, San Francisco Organized by
  • 17. CONNECTED AS EXPOSED SEPTEMBER 12 – 14, 2012 Grand Hyatt, San Francisco Organized by
  • 18. OUR CHALLENGES ARE NOT TECHNICAL, BUT CULTURAL SEPTEMBER 12 – 14, 2012 Grand Hyatt, San Francisco Organized by
  • 19. WE CAN DO BETTER SEPTEMBER 12 – 14, 2012 Grand Hyatt, San Francisco Organized by
  • 20. PART 2: DEVOPS SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 23.
  • 24.
  • 30. Source: John Jenkins, Amazon.com
  • 33.
  • 35. PART 3: RUGGED SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 36. WHAT IS RUGGED? SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO 36 Organized by
  • 37. WHAT IS RUGGED? SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO 37 Organized by
  • 38. SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO TRUTH, LIES AND DECISIONS Moving Forward in an Insecure World RUGGED SOFTWARE DEVELOPMENT Joshua Corman, David Rice, Jeff Williams 2010 Organized by
  • 39.
  • 40.
  • 42. …so software not only needs to be…
  • 43. FAST
  • 44. AGILE
  • 46. HARSH
  • 48. THE MANIFESTO SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Organized by
  • 49.
  • 50. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended.
  • 51.
  • 53.
  • 54. From the Rugged Handbook StrawMan
  • 55. WHAT IS RUGGED DEVOPS? SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO 55 Organized by
  • 58.
  • 59. Survival Guide/Pyramid www.ruggedsoftware.org Defensible Infrastructure
  • 60. Survival Guide/Pyramid Operational Discipline Defensible Infrastructure
  • 61. Survival Guide/Pyramid Situational Awareness Operational Discipline Defensible Infrastructure
  • 62. Survival Guide/Pyramid Countermeasures Situational Awareness Operational Discipline Defensible Infrastructure
  • 64. PART 4: ROCKING INFOSEC WITH SEPTEMBER 12 – 14, 2012 RUGGED DEVOPS GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 66. The First Way: Systems Thinking (Business) (Customer)
  • 67. The First Way: Systems Thinking (Left To Right)  Understand the flow of work  Always seek to increase flow  Never unconsciously pass defects downstream  Never allow local optimization to cause global degradation  Achieve profound understanding of the system
  • 68. Create One Step Environment Creation Process  Make environments available early in the Development process  Make sure Dev builds the code and environment at the same time  Create a common Dev, QA and Production environment creation process
  • 69. Embed Into Automated Infrastructure Team  Get educated on open source tools like puppet and chef  Provide them your hardening guidance  Add your monitoring tools
  • 70. Break Things Early And Often  “Do painful things more frequently, so you can make it less painful… We don’t get pushback from Dev, because they know it makes rollouts smoother.” -- Adrian Cockcroft, Architect, Netflix
  • 71. Break Things Early And Often  Enforce consistency in code, environments and configurations across the environments  Add your ASSERTs to find misconfigurations, enforce https, etc.  Add static code analysis to automated continuous integration and testing process
  • 72. The First Way: Systems Thinking: Infosec Insurgency  Have someone attend the daily Agile standups • Gain awareness of what the team is working on  Define what changes/deploys cannot be made without triggering full retest
  • 73. Definition: Kanban Board  Signaling tool to reduce WIP and increase flow 73
  • 74. The First Way: Outcomes  Determinism in the release process  Creating single repository for code and environments  Consistent Dev, QA, Int, and Staging environments, all properly built before deployment begins  Decreased cycle time • Reduce deployment times from 6 hours to 45 minutes • Refactor deployment process that had 1300+ steps spanning 4 weeks  Faster release cadence
  • 75. The Second Way: Amplify Feedback Loops
  • 76. The Second Way: Amplify Feedback Loops (Right to Left)  Understand and respond to the needs of all customers, internal and external  Shorten and amplify all feedback loops: stop the line when necessary  Create quality at the source  Create and embed knowledge where we need it
  • 77. “We found that when we woke up developers at 2am, defects got fixed faster than ever” -Patrick Lightbody, CEO, BrowserMob
  • 78. Phase 2: Extend Release Process And Create Right -> Left Feedback Loops  Invite Dev to post-mortems/root cause analysis meeting  Have Dev and Infosec cross-train IT Operations  Ensure application monitoring/metrics to aid in Ops and Infosec work (e.g., incident/problem management)
  • 79. The Second Way: Amplify Feedback Loops: Infosec Insurgency  Give production feedback to developers: being attacked is a gift • Capture all instances of “UNION ALL” in user input and graph it, show it to developers • Show all instances of segfaults  Create reusable Infosec use and abuse stories that can be added to every project • “Handle peak traffic of 4MM users and constant 4-6 Gb/sec Anonymous DDoS attacks”  Pre-enable, shield streamline successful audits • Document separation of duty and compensating controls • Don’t let them disrupt the work
  • 80. The Second Way: Outcomes  Defects and security issues getting fixed faster than ever  Reusable Ops and Infosec user stories now part of the Agile process  All groups communicating and coordinating better  Everybody is getting more work done
  • 81. The Third Way: Culture Of Continual Experimentation And Learning
  • 82. The Third Way: Culture Of Continual Experimentation And Learning  Foster a culture that rewards: • Experimentation (taking risks) and learning from failure • Repetition is the prerequisite to mastery  Why? • You need a culture that keeps pushing into the danger zone • And have the habits that enable you to survive in the danger zone
  • 83. “The best way to avoid failure is to fail constantly”
  • 84. An Innovation Culture “By installing a rampant innovation culture, they now do 165 experiments in the three months of tax season. Our business result? Conversion rate of the website is up 50 percent. Employee result? Everyone loves it, because now their ideas can make it to market.” --Scott Cook, Intuit Founder 85
  • 85. You Don’t Choose Chaos Monkey… Chaos Monkey Chooses You
  • 86. Help Product Management… Lesson: Allocate 20% of Dev cycles to paying down technical debt
  • 87. Phase 3: Organize Dev and Ops To Achieve Organizational Goals  Allocate 20% of Dev cycles to non-functional requirements  Integrate fault injection and resilience into design, development and production (e.g., Chaos Monkey)
  • 88. The Third Way: Culture Of Continual Experimentation And Learning: Infosec  Infosec remediation projects in the Agile backlog • Make technical debt visible • Help prioritize work against features and other non-functional requirements  Release your Chaos Monkey • Evil/Fuzzy/Chaotic Monkey • Eridicate SQLi and XSS defects in our lifetime  Find processes that waste everyone’s time  Eliminate needless complexity
  • 89. The Third Way: Outcomes  Technical debt is being paid off  Exploitable attack surface area decreases  Continual reduction of unplanned work  More cycles for planned work  More resilient code and environments  Balancing nimbleness and practiced repetition  Enabling wider range of risk/reward balance
  • 90. PART 5: WHY? SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by
  • 91.
  • 92.
  • 93.
  • 94. When IT Fails: The Novel and The DevOps Cookbook  Coming in July 2012  “In the tradition of the best MBA case studies, this book should be mandatory reading for business and IT graduates alike.” -Paul Muller, VP Software Marketing, Hewlett-Packard  “The greatest IT management book of our generation.” –Branden Williams, CTO Marketing, RSA
  • 95. When IT Fails: The Novel and The DevOps Cookbook  If you would like these slides, the “Top 10 Things You Need To Know About DevOps,” Rugged DevOps resources, and updates on the book: Sign up at http://itrevolution.com Email genek@realgenekim.me Give me your business card
  • 96. END SEPTEMBER 12 – 14, 2012 GRAND HYATT, SAN FRANCISCO Joshua Corman TRUTH, LIES Gene Kim AND DECISIONS Moving Forward in an Insecure World September 2012 Organized by

Notes de l'éditeur

  1. There are many ways to react to this: like, fear, horror, trying to become invisible… All understandable, given the circumstances…Because infosec can no longer take 4 weeks to turn around a security review for application code, or take 6 weeks to turnaround a firewall change. But, on the other hand, I think it’s will be the best thing to ever happen to infosec in the past 20 years. We’re calling this Rugged DevOps, because it’s a way for infosec to integrate into the DevOps process, and be welcomed. And not be viewed as the shrill hysterical folks who slow the business down.
  2. Tell story of Amazon, Netflix: they care about, availability, securityIt’s not a push, it’s a pull – they’re looking for our help (#1 concern: fear of disintermediation and being marginalized)
  3. At RSA 2009, Josh Corman, Jeff Williams, and David Rice were chatting at the Greylock cocktail party.
  4. So software not only need
  5. …fast, and…
  6. …agile, but it also needs to be…
  7. …rugged. Capable of withstanding…
  8. …the harshest conditions…
  9. …and most unfriendly environments…
  10. From Rugged Handbook: https://www.ruggedsoftware.org/documents/
  11. From Rugged Handbook: https://www.ruggedsoftware.org/documents/
  12. This story is about how Bill, the thoughtful and methodical VP IT Operations, who saves some of the largest problems of the company. It’s a story about a Visible Ops and DevOps style transformation. It’s how Bill saves the company, helping it achieves their project goals, operational goals, security and compliance goals.And Steve the CEO realizes that Bill, the lowly VP of IT Operations, is the person who saved the company.
  13. This story is about how Bill, the thoughtful and methodical VP IT Operations, who saves some of the largest problems of the company. It’s a story about a Visible Ops and DevOps style transformation. It’s how Bill saves the company, helping it achieves their project goals, operational goals, security and compliance goals.And Steve the CEO realizes that Bill, the lowly VP of IT Operations, is the person who saved the company.
  14. This story is about how Bill, the thoughtful and methodical VP IT Operations, who saves some of the largest problems of the company. It’s a story about a Visible Ops and DevOps style transformation. It’s how Bill saves the company, helping it achieves their project goals, operational goals, security and compliance goals.And Steve the CEO realizes that Bill, the lowly VP of IT Operations, is the person who saved the company.