SlideShare a Scribd company logo
1 of 38
Download to read offline
Hardening Your CI/CD Pipelines with
GitOps and Continuous Security
Owen Garrett, Deepfence
Matt Kryshak, Deepfence
Richard Case, Weaveworks
May, 2021
Webinar Platform - FAQs
Using Zoom
Questions?
• You are in listen only mode
• Q&A session will follow the presentation, please use the Q&A panel to
submit questions
• Hit escape to exit full screen
Technical Issues - please visit Zoom Help
https://support.zoom.us/hc/en-us/articles/206175806-Top-Questions
3
Speaker Introduction
Owen Garrett, Head of Product and Community,
Deepfence
Owen joined Deepfence in May 2021, having previously
managed the NGINX open source project and NGINX’s
microservices and Kubernetes-centric solutions. During his
time at NGINX, the NGINX open source project rose from
relative obscurity to become the most widely-deployed of any
webserver in the world.
Owen is fascinated by the application of technology,
particularly microservices and Kubernetes, and is determined to
assist developers to build safe and secure applications.
Twitter: @owengarrett
Richard Case, Tech Lead / Solution Architect,
Weaveworks
Richard is tech lead for Kubernetes on Baremetal at
Weaveworks. Previously he worked in customer success
and helped to design and build GitOps/Cloud Native
solutions for Weaveworks customers. Richard is also a
maintainer of Cluster API Provider AWS.
Twitter: @fruit_case
What is GitOps?
5
GitOps is...
An operation model
6
GitOps is...
An operation model
Derived from CS and operational knowledge
7
GitOps is...
An operation model
Derived from CS and operational knowledge
Technology agnostic (name notwithstanding)
8
GitOps is...
An operation model
Derived from CS and operational knowledge
Technology agnostic (name notwithstanding)
A set of principles (Why instead of How)
9
GitOps is...
An operation model
Derived from CS and operational knowledge
Technology agnostic (name notwithstanding)
A set of principles (Why instead of How)
Although
Weaveworks
can help
with how
11
GitOps is...
An operation model
Derived from CS and operational knowledge
Technology agnostic (name notwithstanding)
A set of principles (Why instead of How)
A way to speed up your team
The GitOps Model
12
13
GitOps ON Kubernetes
Kubectl /
Direct access
Kubernetes
Cluster
14
GitOps ON Kubernetes
15
GitOps ON Kubernetes
Image
Repository
1
The entire system is described declaratively.
16
GitOps ON Kubernetes
Image
Repository
2
The desired system state is versioned
17
GitOps ON Kubernetes
Image
Repository
3
Approved changes to the desired state are
automatically applied to the system
18
GitOps ON Kubernetes
Image
Repository
4
Software agents ensure correctness
and alert on divergence
19
GitOps ON Kubernetes
Security
Boundary
In-cluster / pull based
The entire
system is
described
declaratively
The canonical
desired system
state is
versioned in git
Approved
changes can be
automatically
applied
to the system
Software agents
ensure
correctness and
alert (diffs &
actions)
20
Principles of GitOps
Operate an agile cloud native platform with GitOps
GitOps – An Operating Model for
Cloud Native Provides Separation of
Concerns between the
Development process and
the Deployment process
Transparency and
Auditability at All Levels is
Automatic
Authentication &
Authorization Isolated
Between Concerns
Risk Reduction: Complete
Application Rollback and
Logging
21
Deployment
(clusters, apps)
Monitoring
Logging
(Observability)
Management
(operations)
Git
Build
GIT
Test
IDE
“Immutability
Firewall”
Kubernetes
GitOps
Continuous
Integration
Secured Deployment with GitOps
Typical CICD pipeline
Continuous Integration
Kubernetes
Continuous Delivery/Deployment
Container
Registry
CI
Code
Repo
Dev RW
CI creds
Git creds
RW
CR creds3
RO
RW
API creds
CR creds1
Shares credentials cross several logical security boundaries.
Boundary
RO RW
CR creds2
Kubernetes
GitOps pipeline
Container
Registry
CI
Code
Repo
Dev RO
CR creds2
CI creds
Git creds
RO
Deploy
CR creds3
RO
RO
Config repo
creds
CR creds1
Credentials are never shared across a logical security boundary.
RW RW
RW
Canonical desired
state store
Config Repo
Kubernetes
GitOps pipeline
Container
Registry
CI
Code
Repo
Dev RO
CR creds2
CI creds
Git creds
RO
Deploy
CR creds3
RO
RO
Config repo
creds
CR creds1
Credentials are never shared across a logical security boundary.
RW RW
RW
Operator RW Config Repo
Operator
Kubernetes
GitOps pipeline
Container
Registry
CI
Code
Repo
Dev RO
CR creds2
CI creds
Git creds
RO
Deploy
CR creds3
RO
RO
Config repo
creds
CR creds1
Credentials are never shared across a logical security boundary.
RW RW
RW
RW Config Repo
Process & constraints
enforcement
Operator
Kubernetes
GitOps pipeline
Container
Registry
CI
Code
Repo
Dev RO
CR creds2
CI creds
Git creds
RO
Deploy
CR creds3
RO
RW
Config repo
creds
CR creds1
Credentials are never shared across a logical security boundary.
RW RW
RW
RW Config Repo
Exceptional auditing
and attribution*
Operator
Kubernetes
GitOps pipeline
Container
Registry
CI
Code
Repo
Dev
Deploy
Various points to integrate extra security measures.
Config Repo
← Image and code scanning →
Artifact scanning
(conftest, kube-sec)
Policy
enforcement
(OPA, Kyverno)
Runtime scanning
(continuous)
Introducing Deepfence
Copyright 2021 Deepfence, Inc.
Copyright 2021 Deepfence, Inc.
The apps we build are deeply interconnected
528
open-source
components
(2020 average)
The typical commercially-developed application
uses 528 open-source components.
This includes direct and indirect dependencies.
Source: Synopsis OSSRA Report 2021
> 10%
# of open-source
components with
known
vulnerabilities
10.4% of Java components from Maven
Repository had at least one known vulnerability.
Almost 40% of npm packages rely on code known
to be vulnerable.
Source: Sonatype 2020, University of Darmstadt 2019
Equifax
Undetected Apache Struts vulnerability led
to the leak of 143m customer details.
$1.4bn – cost to remediate security.
Capital One
Misconfiguration of ModSecurity enabled
an anomalous request flow.
106m customer details leaked.
British Airways
Hack of third-party javascript led to
380,000 stolen payment card records.
$257m fine (reduced to $26m on appeal)
npm left-pad:
When an unregarded, 11-line module with
10 GH stars was removed from npm, the
blast radius was huge.
Medium Direct and Transitive Dependencies per repo
Source: GitHub State of the Octoverse 2020
Direct
Dependencies
Transitive
Dependencies
PHP 9 70
JavaScript 10 683
Python 9 19
Ruby 9 68
PHP 9 70
Copyright 2021 Deepfence, Inc.
Copyright 2021 Deepfence, Inc.
Vulnerabilities lie undetected for 4 years (average)
GitHub 2020 Octoverse Report:
On average, vulnerabilities in open-source
software lie undetected for over 4 years.
Once alerted, it takes 4.4 weeks to find a
fix and 10 weeks to publish.
Sonatype 2020 State of the Software
Supply Chain
49% of organizations remediate an OSS
dependency vulnerability within 1 week.
Source: The 2020 State of the Octoverse, GitHub, Inc.
The full lifecycle of a Vulnerability (GitHub)
Applications contain a timebomb of to-be-announced vulnerabilities,
and security teams need to be ready to move fast!
Deepfence provides a full-lifecycle
security solution.
It observes and secures your
application from development to
production.
Copyright 2021 Deepfence, Inc.
Copyright 2021 Deepfence, Inc.
Continuous
Integration
Dev Commit Build Test Push to Repo
Continuous
Delivery
Devops Review Deploy
Production
Prod 2
DR 1
Staging
Prod 1
Users
Insert Security all stages of the lifecycle
Lightweight
DF agents
Operations
Ops Monitor Logs
Deepfence
Management
Console
Let’s see Flux and Deepfence in
action..
Copyright 2021 Deepfence, Inc.
Copyright 2021 Deepfence, Inc.
Once in production, Deepfence’s security
monitoring takes over
1. Audits containers and hosts to
detect file system, process and
network related misconfigurations
2. Performs detailed inspection of
network traffic, system and
application behavior, and
correlates suspicious events
3. Supports manual triage or
automated quarantine of tainted
workloads
Runtime Threat and
Anomaly Scanning
Questions?
Thank you!

More Related Content

What's hot

SRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdfSRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
Weaveworks
 

What's hot (20)

What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
 
CD using ArgoCD(KnolX).pdf
CD using ArgoCD(KnolX).pdfCD using ArgoCD(KnolX).pdf
CD using ArgoCD(KnolX).pdf
 
GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021
GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021
GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021
 
Kubernetes Networking | Kubernetes Services, Pods & Ingress Networks | Kubern...
Kubernetes Networking | Kubernetes Services, Pods & Ingress Networks | Kubern...Kubernetes Networking | Kubernetes Services, Pods & Ingress Networks | Kubern...
Kubernetes Networking | Kubernetes Services, Pods & Ingress Networks | Kubern...
 
GitOps - Modern best practices for high velocity app dev using cloud native t...
GitOps - Modern best practices for high velocity app dev using cloud native t...GitOps - Modern best practices for high velocity app dev using cloud native t...
GitOps - Modern best practices for high velocity app dev using cloud native t...
 
GitOps with Gitkube
GitOps with GitkubeGitOps with Gitkube
GitOps with Gitkube
 
Scaling DevSecOps Culture for Enterprise
Scaling DevSecOps Culture for EnterpriseScaling DevSecOps Culture for Enterprise
Scaling DevSecOps Culture for Enterprise
 
GitOps with ArgoCD
GitOps with ArgoCDGitOps with ArgoCD
GitOps with ArgoCD
 
GitOps w/argocd
GitOps w/argocdGitOps w/argocd
GitOps w/argocd
 
What Is DevOps? | Introduction To DevOps | DevOps Tools | DevOps Tutorial | D...
What Is DevOps? | Introduction To DevOps | DevOps Tools | DevOps Tutorial | D...What Is DevOps? | Introduction To DevOps | DevOps Tools | DevOps Tutorial | D...
What Is DevOps? | Introduction To DevOps | DevOps Tools | DevOps Tutorial | D...
 
Kubernetes Deployment Tutorial | Kubernetes Tutorial For Beginners | Kubernet...
Kubernetes Deployment Tutorial | Kubernetes Tutorial For Beginners | Kubernet...Kubernetes Deployment Tutorial | Kubernetes Tutorial For Beginners | Kubernet...
Kubernetes Deployment Tutorial | Kubernetes Tutorial For Beginners | Kubernet...
 
Introduction to Kubernetes Workshop
Introduction to Kubernetes WorkshopIntroduction to Kubernetes Workshop
Introduction to Kubernetes Workshop
 
Meetup 23 - 03 - Application Delivery on K8S with GitOps
Meetup 23 - 03 - Application Delivery on K8S with GitOpsMeetup 23 - 03 - Application Delivery on K8S with GitOps
Meetup 23 - 03 - Application Delivery on K8S with GitOps
 
Introduction to Red Hat OpenShift 4
Introduction to Red Hat OpenShift 4Introduction to Red Hat OpenShift 4
Introduction to Red Hat OpenShift 4
 
Continuous Lifecycle London 2018 Event Keynote
Continuous Lifecycle London 2018 Event KeynoteContinuous Lifecycle London 2018 Event Keynote
Continuous Lifecycle London 2018 Event Keynote
 
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdfSRE and GitOps for Building Robust Kubernetes Platforms.pdf
SRE and GitOps for Building Robust Kubernetes Platforms.pdf
 
cilium-public.pdf
cilium-public.pdfcilium-public.pdf
cilium-public.pdf
 
Kubernetes for Beginners: An Introductory Guide
Kubernetes for Beginners: An Introductory GuideKubernetes for Beginners: An Introductory Guide
Kubernetes for Beginners: An Introductory Guide
 
How we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesHow we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on Kubernetes
 
Bare Metal Cluster with Kubernetes, Istio and Metallb | Nguyen Phuong An, Ngu...
Bare Metal Cluster with Kubernetes, Istio and Metallb | Nguyen Phuong An, Ngu...Bare Metal Cluster with Kubernetes, Istio and Metallb | Nguyen Phuong An, Ngu...
Bare Metal Cluster with Kubernetes, Istio and Metallb | Nguyen Phuong An, Ngu...
 

Similar to Hardening Your CI/CD Pipelines with GitOps and Continuous Security

Tekton_ArgoCD-_KCD_Taiwan-cicd-openshift
Tekton_ArgoCD-_KCD_Taiwan-cicd-openshiftTekton_ArgoCD-_KCD_Taiwan-cicd-openshift
Tekton_ArgoCD-_KCD_Taiwan-cicd-openshift
bashwen2022
 
gitopsthekubernetesway-201026090439.pdf
gitopsthekubernetesway-201026090439.pdfgitopsthekubernetesway-201026090439.pdf
gitopsthekubernetesway-201026090439.pdf
saraichiba2
 

Similar to Hardening Your CI/CD Pipelines with GitOps and Continuous Security (20)

Speeding up your team with GitOps
Speeding up your team with GitOpsSpeeding up your team with GitOps
Speeding up your team with GitOps
 
Delivering Quality at Speed with GitOps
Delivering Quality at Speed with GitOpsDelivering Quality at Speed with GitOps
Delivering Quality at Speed with GitOps
 
Continuous Security for GitOps
Continuous Security for GitOpsContinuous Security for GitOps
Continuous Security for GitOps
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and Linkerd
 
Webinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for YouWebinar: Capabilities, Confidence and Community – What Flux GA Means for You
Webinar: Capabilities, Confidence and Community – What Flux GA Means for You
 
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & WeaveworksSecure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
 
Yann Albou & Sébastien Féré - GitOps as a way to manage enterprise K8s and vi...
Yann Albou & Sébastien Féré - GitOps as a way to manage enterprise K8s and vi...Yann Albou & Sébastien Féré - GitOps as a way to manage enterprise K8s and vi...
Yann Albou & Sébastien Féré - GitOps as a way to manage enterprise K8s and vi...
 
Webinar by ZNetLive & Plesk- Winning the Game for WebOps and DevOps
Webinar by ZNetLive & Plesk- Winning the Game for WebOps and DevOps Webinar by ZNetLive & Plesk- Winning the Game for WebOps and DevOps
Webinar by ZNetLive & Plesk- Winning the Game for WebOps and DevOps
 
給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗
 
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
 Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ... Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
 
Tekton_ArgoCD-_KCD_Taiwan-cicd-openshift
Tekton_ArgoCD-_KCD_Taiwan-cicd-openshiftTekton_ArgoCD-_KCD_Taiwan-cicd-openshift
Tekton_ArgoCD-_KCD_Taiwan-cicd-openshift
 
DX, Guardrails, Golden Paths & Policy in Kubernetes
DX, Guardrails, Golden Paths & Policy in KubernetesDX, Guardrails, Golden Paths & Policy in Kubernetes
DX, Guardrails, Golden Paths & Policy in Kubernetes
 
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOps
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOpsHybrid and Multi-Cloud Strategies for Kubernetes with GitOps
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOps
 
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOps
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOpsHybrid and Multi-Cloud Strategies for Kubernetes with GitOps
Hybrid and Multi-Cloud Strategies for Kubernetes with GitOps
 
Weave GitOps - continuous delivery for any Kubernetes
Weave GitOps - continuous delivery for any KubernetesWeave GitOps - continuous delivery for any Kubernetes
Weave GitOps - continuous delivery for any Kubernetes
 
Dipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentDipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application Development
 
gitopsthekubernetesway-201026090439.pdf
gitopsthekubernetesway-201026090439.pdfgitopsthekubernetesway-201026090439.pdf
gitopsthekubernetesway-201026090439.pdf
 
Supply chain security - Develop quickly without inviting The Nefarious.pptx
Supply chain security - Develop quickly without inviting The Nefarious.pptxSupply chain security - Develop quickly without inviting The Nefarious.pptx
Supply chain security - Develop quickly without inviting The Nefarious.pptx
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
A Love Story with Kubevirt and Backstage from Cloud Native NoVA meetup Feb 2024
A Love Story with Kubevirt and Backstage from Cloud Native NoVA meetup Feb 2024A Love Story with Kubevirt and Backstage from Cloud Native NoVA meetup Feb 2024
A Love Story with Kubevirt and Backstage from Cloud Native NoVA meetup Feb 2024
 

More from Weaveworks

How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy Catastrophes
Weaveworks
 
Robust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and CiliumRobust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and Cilium
Weaveworks
 

More from Weaveworks (20)

Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)Weave AI Controllers (Weave GitOps Office Hours)
Weave AI Controllers (Weave GitOps Office Hours)
 
Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)Flamingo: Expand ArgoCD with Flux (Office Hours)
Flamingo: Expand ArgoCD with Flux (Office Hours)
 
Six Signs You Need Platform Engineering
Six Signs You Need Platform EngineeringSix Signs You Need Platform Engineering
Six Signs You Need Platform Engineering
 
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWebinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
 
Flux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCIFlux Beyond Git Harnessing the Power of OCI
Flux Beyond Git Harnessing the Power of OCI
 
Automated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes ClustersAutomated Provisioning, Management & Cost Control for Kubernetes Clusters
Automated Provisioning, Management & Cost Control for Kubernetes Clusters
 
How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy Catastrophes
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOps
 
GitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdfGitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdf
 
Implementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancyImplementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancy
 
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSAccelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
 
The Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCFThe Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCF
 
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
 
Flux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdfFlux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdf
 
Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension
 
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOpsDeploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
 
Robust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and CiliumRobust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and Cilium
 
Intro to GitOps & Flux.pdf
Intro to GitOps & Flux.pdfIntro to GitOps & Flux.pdf
Intro to GitOps & Flux.pdf
 
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdfSimplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Hardening Your CI/CD Pipelines with GitOps and Continuous Security

  • 1. Hardening Your CI/CD Pipelines with GitOps and Continuous Security Owen Garrett, Deepfence Matt Kryshak, Deepfence Richard Case, Weaveworks May, 2021
  • 2. Webinar Platform - FAQs Using Zoom Questions? • You are in listen only mode • Q&A session will follow the presentation, please use the Q&A panel to submit questions • Hit escape to exit full screen Technical Issues - please visit Zoom Help https://support.zoom.us/hc/en-us/articles/206175806-Top-Questions
  • 3. 3 Speaker Introduction Owen Garrett, Head of Product and Community, Deepfence Owen joined Deepfence in May 2021, having previously managed the NGINX open source project and NGINX’s microservices and Kubernetes-centric solutions. During his time at NGINX, the NGINX open source project rose from relative obscurity to become the most widely-deployed of any webserver in the world. Owen is fascinated by the application of technology, particularly microservices and Kubernetes, and is determined to assist developers to build safe and secure applications. Twitter: @owengarrett Richard Case, Tech Lead / Solution Architect, Weaveworks Richard is tech lead for Kubernetes on Baremetal at Weaveworks. Previously he worked in customer success and helped to design and build GitOps/Cloud Native solutions for Weaveworks customers. Richard is also a maintainer of Cluster API Provider AWS. Twitter: @fruit_case
  • 6. 6 GitOps is... An operation model Derived from CS and operational knowledge
  • 7. 7 GitOps is... An operation model Derived from CS and operational knowledge Technology agnostic (name notwithstanding)
  • 8. 8 GitOps is... An operation model Derived from CS and operational knowledge Technology agnostic (name notwithstanding) A set of principles (Why instead of How)
  • 9. 9 GitOps is... An operation model Derived from CS and operational knowledge Technology agnostic (name notwithstanding) A set of principles (Why instead of How) Although Weaveworks can help with how
  • 10.
  • 11. 11 GitOps is... An operation model Derived from CS and operational knowledge Technology agnostic (name notwithstanding) A set of principles (Why instead of How) A way to speed up your team
  • 13. 13 GitOps ON Kubernetes Kubectl / Direct access Kubernetes Cluster
  • 15. 15 GitOps ON Kubernetes Image Repository 1 The entire system is described declaratively.
  • 16. 16 GitOps ON Kubernetes Image Repository 2 The desired system state is versioned
  • 17. 17 GitOps ON Kubernetes Image Repository 3 Approved changes to the desired state are automatically applied to the system
  • 18. 18 GitOps ON Kubernetes Image Repository 4 Software agents ensure correctness and alert on divergence
  • 20. The entire system is described declaratively The canonical desired system state is versioned in git Approved changes can be automatically applied to the system Software agents ensure correctness and alert (diffs & actions) 20 Principles of GitOps Operate an agile cloud native platform with GitOps
  • 21. GitOps – An Operating Model for Cloud Native Provides Separation of Concerns between the Development process and the Deployment process Transparency and Auditability at All Levels is Automatic Authentication & Authorization Isolated Between Concerns Risk Reduction: Complete Application Rollback and Logging 21 Deployment (clusters, apps) Monitoring Logging (Observability) Management (operations) Git Build GIT Test IDE “Immutability Firewall” Kubernetes GitOps Continuous Integration
  • 23. Typical CICD pipeline Continuous Integration Kubernetes Continuous Delivery/Deployment Container Registry CI Code Repo Dev RW CI creds Git creds RW CR creds3 RO RW API creds CR creds1 Shares credentials cross several logical security boundaries. Boundary RO RW CR creds2
  • 24. Kubernetes GitOps pipeline Container Registry CI Code Repo Dev RO CR creds2 CI creds Git creds RO Deploy CR creds3 RO RO Config repo creds CR creds1 Credentials are never shared across a logical security boundary. RW RW RW Canonical desired state store Config Repo
  • 25. Kubernetes GitOps pipeline Container Registry CI Code Repo Dev RO CR creds2 CI creds Git creds RO Deploy CR creds3 RO RO Config repo creds CR creds1 Credentials are never shared across a logical security boundary. RW RW RW Operator RW Config Repo
  • 26. Operator Kubernetes GitOps pipeline Container Registry CI Code Repo Dev RO CR creds2 CI creds Git creds RO Deploy CR creds3 RO RO Config repo creds CR creds1 Credentials are never shared across a logical security boundary. RW RW RW RW Config Repo Process & constraints enforcement
  • 27. Operator Kubernetes GitOps pipeline Container Registry CI Code Repo Dev RO CR creds2 CI creds Git creds RO Deploy CR creds3 RO RW Config repo creds CR creds1 Credentials are never shared across a logical security boundary. RW RW RW RW Config Repo Exceptional auditing and attribution*
  • 28. Operator Kubernetes GitOps pipeline Container Registry CI Code Repo Dev Deploy Various points to integrate extra security measures. Config Repo ← Image and code scanning → Artifact scanning (conftest, kube-sec) Policy enforcement (OPA, Kyverno) Runtime scanning (continuous)
  • 30. Copyright 2021 Deepfence, Inc. Copyright 2021 Deepfence, Inc. The apps we build are deeply interconnected 528 open-source components (2020 average) The typical commercially-developed application uses 528 open-source components. This includes direct and indirect dependencies. Source: Synopsis OSSRA Report 2021 > 10% # of open-source components with known vulnerabilities 10.4% of Java components from Maven Repository had at least one known vulnerability. Almost 40% of npm packages rely on code known to be vulnerable. Source: Sonatype 2020, University of Darmstadt 2019 Equifax Undetected Apache Struts vulnerability led to the leak of 143m customer details. $1.4bn – cost to remediate security. Capital One Misconfiguration of ModSecurity enabled an anomalous request flow. 106m customer details leaked. British Airways Hack of third-party javascript led to 380,000 stolen payment card records. $257m fine (reduced to $26m on appeal) npm left-pad: When an unregarded, 11-line module with 10 GH stars was removed from npm, the blast radius was huge. Medium Direct and Transitive Dependencies per repo Source: GitHub State of the Octoverse 2020 Direct Dependencies Transitive Dependencies PHP 9 70 JavaScript 10 683 Python 9 19 Ruby 9 68 PHP 9 70
  • 31. Copyright 2021 Deepfence, Inc. Copyright 2021 Deepfence, Inc. Vulnerabilities lie undetected for 4 years (average) GitHub 2020 Octoverse Report: On average, vulnerabilities in open-source software lie undetected for over 4 years. Once alerted, it takes 4.4 weeks to find a fix and 10 weeks to publish. Sonatype 2020 State of the Software Supply Chain 49% of organizations remediate an OSS dependency vulnerability within 1 week. Source: The 2020 State of the Octoverse, GitHub, Inc. The full lifecycle of a Vulnerability (GitHub) Applications contain a timebomb of to-be-announced vulnerabilities, and security teams need to be ready to move fast!
  • 32. Deepfence provides a full-lifecycle security solution. It observes and secures your application from development to production.
  • 33. Copyright 2021 Deepfence, Inc. Copyright 2021 Deepfence, Inc. Continuous Integration Dev Commit Build Test Push to Repo Continuous Delivery Devops Review Deploy Production Prod 2 DR 1 Staging Prod 1 Users Insert Security all stages of the lifecycle Lightweight DF agents Operations Ops Monitor Logs Deepfence Management Console
  • 34. Let’s see Flux and Deepfence in action..
  • 35. Copyright 2021 Deepfence, Inc. Copyright 2021 Deepfence, Inc. Once in production, Deepfence’s security monitoring takes over 1. Audits containers and hosts to detect file system, process and network related misconfigurations 2. Performs detailed inspection of network traffic, system and application behavior, and correlates suspicious events 3. Supports manual triage or automated quarantine of tainted workloads