Development. Architecture QA. Operations

Similar documents
Automating Security Practices for the DevOps Revolution

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES

Microsoft Security Management

DevSecOps Why Aren t You Doing It? Brian Liceaga, CISSP 1

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

SYMANTEC DATA CENTER SECURITY

Closing the Hybrid Cloud Security Gap with Cavirin

AWS Reference Design Document

Securing Your Cloud Introduction Presentation

CLOUD WORKLOAD SECURITY

Government IT Modernization and the Adoption of Hybrid Cloud

The threat landscape is constantly

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Unify DevOps and SecOps: Security Without Friction

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

McAfee Public Cloud Server Security Suite

Securing the Modern Data Center with Trend Micro Deep Security

Going cloud-native with Kubernetes and Pivotal

Elizabeth Lawler CEO & Co-Founder Conjur,

How to succeed with data centre migration

The IBM Platform Computing HPC Cloud Service. Solution Overview

SUSE s vision for agile software development and deployment in the Software Defined Datacenter

Governance for the Public Sector Cloud

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Network Virtualization Business Case

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Qualys Cloud Platform

locuz.com SOC Services

The Why, What, and How of Cisco Tetration

SIEMLESS THREAT DETECTION FOR AWS

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

10 FOCUS AREAS FOR BREACH PREVENTION

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Watson Developer Cloud Security Overview

Reinvent Your 2013 Security Management Strategy

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

On-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Best Practices in Securing a Multicloud World

Security-as-a-Service: The Future of Security Management

CCISO Blueprint v1. EC-Council

Suman Sourav Director DevSecOps, Vantage Point Security. OWASP Indonesia Day 2017

HP Fortify Software Security Center

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

security mindfulness dwayne.

Cloud Customer Architecture for Securing Workloads on Cloud Services

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

HARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Cloud Computing: Making the Right Choice for Your Organization

Datacenter Security: Protection Beyond OS LifeCycle

VMware Hybrid Cloud Solution

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Cisco CloudCenter Use Case Summary

CHAPTER 4 Operating a VMware vcloud

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

SIEMLESS THREAT MANAGEMENT

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

COMPLIANCE AUTOMATION BRIDGING THE GAP BETWEEN DEVELOPMENT AND INFORMATION SECURITY

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need

No Limits Cloud Introducing the HPE Helion Cloud Suite July 28, Copyright 2016 Vivit Worldwide

STRATEGIC PLAN

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

CyberPosture Intelligence for Your Hybrid Infrastructure

2018 Report The State of Securing Cloud Workloads

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

MODERNIZE INFRASTRUCTURE

Annexure 08 (Profile of the Project Team)

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

1V0-642.exam.30q.

Understanding As-a-service: Teradata IntelliCloud

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Rethinking Product Security: Cloud Demands a New Way

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

DEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper

Supporting the Cloud Transformation of Agencies across the Public Sector

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date

2018 Cisco and/or its affiliates. All rights reserved.

NETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers

Enabling Innovation in the Digital Economy

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Murray Goldschmidt. Chief Operating Officer Sense of Security Pty Ltd. Micro Services, Containers and Serverless PaaS Web Apps? How safe are you?

5 Steps to Government IT Modernization

Put Security Into Your DevOps NOW. Or Prepare for the Flood Matthew Fisher Solution Architect, Fortify Federal 08MAR2018

Enterprise & Cloud Security

A DEVOPS STATE OF MIND. Chris Van Tuin Chief Technologist, West

DevSecOps Shift Left Security. Prioritizing Incident Response using Security Posture Assessment and Attack Surface Analysis

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Transcription:

Development Architecture QA Operations

Lack of business agility Slow to onboard new customers Hard to practice true DevOps Outpaced by disruptors Rogue dev projects Lack of SecOps agility Slow threat assessments Can t patch fast enough Reactive security posture

DevOps is the combination of cultural philosophies, practices, and tools that increases an organization s ability to deliver applications and services at high velocity

DevOps is not a process change, nor a tool, it s a culture change

1 Cloud Birth 2 Cloud Chaos 3 Hybrid Groove Security Decision Making Security & Compliance Posture Operational Cost

Dev User interface design Code development Help file construction Staffing Architecture review Standards Resource consumption conformance metrics Walkthroughs Budget PII Footprinting System test compliance Code validation Design SDLC Documentation review Mobile Unit test readiness Scalability Test case development Skills development Function/component test Performance Installation guidelines verification Buffer overflow risk assessment Load and stress test Webreadiness Ops Run stuff Break stuff Lock out users How Development Sees Operations

How developers click Job 1 is Deploying code Quickly use new technologies Ability to deploy regardless of platform Freedom!

Ops Dev Write code Test some Organizational design Patching Network bandwidth forecasting Cloud migration strategy Legacy environment support Skills Virtual machine Budget and funding development management Containers Fallback/roll forward Intrusion prevention/detection ITIL Compliance Service Level Change Review Board Backup/recovery Agreements Power Equipment upgrade/retirement strategy consumption Acquisition and Site security IT Service Desk procurement Vendor Metrics Space planning certification Network COBIT configuration Web security Alignment BYOD Security ITIL Compliance Identity and Access Management High availability Cost recovery/chargeback Third-party risk management Business Continuity Storage Planning consumption How Operations Sees Development

What makes security teams sleep Reduce Surprises Standards and control everywhere Controlled changes Less regulatory pressure

It s even getting more interesting

Hybrid Datacenter is here Public Cloud Containers Serverless One Year of Container Usage 67% 53% Virtual Desktops 31% Evaluating 42% Evaluating Physical Servers Virtual Servers 22% Using 2016 25% Using 2017

VMware Cloud on AWS Runs on AWS Bare metal Infrastructure Move on-premise Workloads to AWS Integrated with Vmware APIs (NSX,vSphere) Maintain the Existing Skills Retain Existing Architecture and Investment

Wouldn t be nice if we can use one tool for security?

Let s use DevOps for Security

Identify your crown jewel and protect first Security built-in not bolt-on Focus on building continuous, automated and agile security architecture Over-invested in preventive measure vs proactive detection-response Where do we start?

Source: Gartner (June 2018) Privileged account management Active antiphishing Micro segmentation and flow visibility Cloud security posture management Cloud access security broker CARTA-inspired vulnerability management Application control on server workloads Detection and response Automated security scanning Software-defined perimeter Gartner Top 10 Security Projects for 2018

Security Events in Monitoring: Influencing Design Automatic Remediation Automatic Isolation Heal configuration Drift Automated Auditing

Securing Code and using Code Secure Coding Practices Proactive controls enforce by code Using code to build infrastructure

Build Checking Scan for Vulnerabilities or Malware Enable Secrets Management Configuration Scrubbing

Deployment Security Continuous Vulnerability Scanning Automated deployment of Approved Images Just in time server access

Example: Securing Docker Images

Challenge: How can you verify that containers deployed in production do not contain any known malware or vulnerabilities?

Jenkins

Completed Build

Failed Build.. But why?

Malware Found in the APIs

Check Smart Check

Check Scans

Scan Details

Vulnerable Package Installed Find where Vulnerability was introduced

Malware Copied Find where malware was introduced

Vulnerable Package Installed Malware Copied Easily Reference in Dockerfile

Example: Virtual Patching

Challenge: Average Patching time for customers is 176 Days, How would you protect your containers when zero day strikes

Apache Struts Vulnerability CVE-2018-11776

Unprotected Struts Website

Protected Protected Struts Website

Runs on Docker Rules Applied Virtual Patching applied

Event Summary Multiple Events

Event View Attack type and CVE

Details of the Attack Attack String

Alerts on Slack

Visibility regardless of Server Location

Continue to leverage current investments

Container virtual patching

Key Takeaways Start Small Plan Ahead Security team has to code Look for Open Security APIs Don t be afraid ~ integrate

Nothing is Permanent and Nothing is Perfect

THANK YOU Paul Hidalgo Trend Micro linkedin.com/in/peeweeh/ Feedback: paul_hidalgo@trendmicro.com