SlideShare a Scribd company logo
DevOps.com and CloudPassage
Continuous Infrastructure Compliance
W. Jenks Gibbons | November 2, 2017
Is security a
roadblock for
continuous delivery?
© 2017 CloudPassage2
© 2017 CloudPassage3
Traditional security tools
Plan Code Build Test Release Deploy Operate
security gate
© 2017 CloudPassage4
Re-align security to modern IT delivery
security guardrails
Plan Code Build Test Release Deploy Operate
© 2017 CloudPassage5
Continuous Security - DevSecOps
PLAN
• Map out types of systems
• Design security policies
• Define policy groups
PEOPLE
CREATE
• Insert agent via CI build
scripts, Gold Master
images, etc.
AUTOMATION
PRE-PROD
• Tag production
artifacts with proper
policy groups
AUTOMATION
CONFIGURE
• Apply runtime policies
• SVA, CSM, SAM
• Firewall, authentication
• FIM, LIDS
AUTOMATION
MONITOR
• Monitor production
• Security events to SIEM
• Audit data to GRC
• Metrics to reporting
• Visualize traffic and connections
• Scope new vulnerabilities
AUTOMATION & PEOPLE
VERIFY
• Verify security of builds
• SVA, CSM, SAM
• Generate FIM baselines
AUTOMATION
Case Study
Acme Incorporated: Current State
• Development and Operations: understand the needs of the business units
• Development and Operations: work together on their area of responsibility
independently of other teams
• Continuous Integration / Continuous Delivery (CICD)
• Deliver features multiple times a day
• Delivery does not require external approval
• Deployment requires Security Operations approval
© 2017 CloudPassage Confidential6
Case Study
Acme Incorporated: Current Problem
• Individual teams are unable to deploy at the at the speed of the business units
• Security is blocking deployment
• Examples:
• Security must confirm there are no vulnerabilities in the image (5 day SLA)
• Security must confirm the image is configured to meet compliance requirements (5 day SLA)
• Security must create an image baseline for file integrity monitoring (5 day SLA)
• Firewall changes for new workloads (5 day SLA)
© 2017 CloudPassage Confidential7
Case Study
Acme Incorporated: Current Problem
• Delivery: many times a day
• Delivery team: autonomous
• Deployment team: autonomous
• Deployment approval: multiple teams
• Deployment approval: more than 5x the time to deliver and deploy
© 2017 CloudPassage Confidential8
© 2017 CloudPassage9
DevOps delivery pipeline – before security automation
PEOPLE Code Done
AUTOMATION TOOL CHAIN
© 2017 CloudPassage10
DevOps delivery pipeline – before security automation
Hours
Case Study
Acme Incorporated: Solution
• Add a Security Operations team member to the Development and Operations
feature teams
• Add security to the pipeline
© 2017 CloudPassage Confidential11
Case Study
Acme Incorporated: Solution - Plan
• Development, Operations and Security Operations are now working together in
autonomous feature teams
• OS image – the teams will work together to design and create a known “golden”
image for each platform
• Workloads (e.g. VMs, hosts, servers) are are grouped together:
• Jenkins Master
• Jenkins Slaves
• Git
• Web
• DB
• PCI complaint
• HIPAA compliant
© 2017 CloudPassage Confidential12
Case Study
Acme Incorporated: Solution - Plan
• Groups are assigned security policies:
• Software Vulnerability Assessment (SVA)
• Configuration Security Monitoring (CSM)
• File Integrity Monitoring (FIM)
• Microsegmentation
• Log-based Intrusion Detection (LIDS)
© 2017 CloudPassage Confidential13
Case Study
Acme Incorporated: Solution - Create
• Enable automated workload security by integrating it into the pipeline
• Install a small security agent on the workload.
• Ansible
• Chef
• PowerShell
• Puppet
• “bake” into image
• Ensure the agent works
• in any environment
• at any scale
• on demand
• and offers a broad range of controls
© 2017 CloudPassage Confidential14
Case Study
Acme Incorporated: Solution - Pre-Production
• When workloads boot
• Tag the workload with the proper group
• Security policies applied automatically
• Security simply goes along for the ride
© 2017 CloudPassage Confidential15
Case Study
Acme Incorporated: Solution – Verify
• Security verification is built into the CICD Pipeline
• During CI
• Code analysis
• Unit, smoke, functional … tests
• Workload security tests
• SVA scan
• CSM scan
• Success and failures are based on critical failures
• Check results into Git – audit trail
© 2017 CloudPassage Confidential16
Case Study
Acme Incorporated: Solution – Verify
• Workload security tests (cont.)
• On fail
• Kill instance
• Fix issues
• Check-in to kick-off CI - shorten feedback loop
• On pass – deploy
• take FIM baseline
• move from a Pre-Production to a Production security group
© 2017 CloudPassage Confidential17
Case Study
Acme Incorporated: Solution – Monitor
• Separate CI build job
• At specified intervals
• SVA scan
• CSM scan
• FIM scan
• Any critical issues to Slack, JIRA, ServiceNow …
© 2017 CloudPassage Confidential18
© 2017 CloudPassage19
DevOps delivery pipeline – after security automation
Minutes
© 2017 CloudPassage20
DevOps delivery pipeline - after security automation
PEOPLE Code Notify Done
Source control Commit
CI/CD master Trigger
CI/CD slave Build Test Pass?
CloudPassage Halo Scan Baseline Monitor
Artifact registry Store
Infrastructure Update
Y
N
© 2017 CloudPassage21
Practical Example
• Git
• Jenkins
• Slack
• Chef
© 2017 CloudPassage22
Check-In
Developer makes a change to code, or to infrastructure (e.g.
golden image)
© 2017 CloudPassage23
Jenkins
A web-hook is then configured
to kick off a build in Jenkins.
This could be a code change
or an infrastructure change.
© 2017 CloudPassage24
Slack
Jenkins sends notifications to Slack – shorten the feedback loop.
© 2017 CloudPassage25
Jenkins, Chef, Test Kitchen, Security Tools
• EC2 Test Kitchen – launch golden image
• Chef – install lightweight security agent
• Python – API calls to security tools
python /home/jenkins/workload_security_analysis.py
python /home/jenkins/deploy.py
© 2017 CloudPassage confidential26
Git – Audit Trail
If the build succeeds or fails
an audit report can be
created and checked into Git.
© 2017 CloudPassage27
Patch – “Golden Image”
Using the results of the workload security analysis from the audit
report the golden image can be patched.
© 2017 CloudPassage28
Create New Golden Image and Check in as Code
© 2017 CloudPassage29
Notification, Audit Trail
W. Jenks Gibbons
jgibbons@cloudpassage.com

More Related Content

What's hot (17)

PDF
Full Spectrum Engineering – The New Full-stack
Deborah Schalm
 
PDF
Monitoring Your AWS EKS Environment with Datadog
DevOps.com
 
PPTX
Securing your Cloud Environment v2
ShapeBlue
 
PDF
NGINX DevSecOps Workshop
NGINX, Inc.
 
PDF
ThoughtWorks Technology Radar Roadshow - Sydney
Thoughtworks
 
PDF
ThoughtWorks Technology Radar Roadshow - Perth
Thoughtworks
 
PPTX
Migrating from BIG-IP Deployment to NGINX ADC
NGINX, Inc.
 
PDF
Resilient Microservices with Spring Cloud
VMware Tanzu
 
PPTX
NGINX Lunch and Learn Event: Kubernetes and the NGINX Plus Ingress controller
Katherine Bagood
 
PDF
Embacing service-level-objectives of your microservices in your Cl/CD
Nebulaworks
 
PPTX
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Olivia LaMar
 
PDF
Relevez les défis Kubernetes avec NGINX
NGINX, Inc.
 
PDF
淺談WAF在AWS的架構
4ndersonLin
 
PPTX
Microservices and Container Management with NGINX Plus and Mesosphere DC/OS
NGINX, Inc.
 
PPTX
Real World Example of Orchestrating Docker, Node JS, NFV on OpenStack
Nati Shalom
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PPTX
NGINX: Back to Basics – APCJ
NGINX, Inc.
 
Full Spectrum Engineering – The New Full-stack
Deborah Schalm
 
Monitoring Your AWS EKS Environment with Datadog
DevOps.com
 
Securing your Cloud Environment v2
ShapeBlue
 
NGINX DevSecOps Workshop
NGINX, Inc.
 
ThoughtWorks Technology Radar Roadshow - Sydney
Thoughtworks
 
ThoughtWorks Technology Radar Roadshow - Perth
Thoughtworks
 
Migrating from BIG-IP Deployment to NGINX ADC
NGINX, Inc.
 
Resilient Microservices with Spring Cloud
VMware Tanzu
 
NGINX Lunch and Learn Event: Kubernetes and the NGINX Plus Ingress controller
Katherine Bagood
 
Embacing service-level-objectives of your microservices in your Cl/CD
Nebulaworks
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Olivia LaMar
 
Relevez les défis Kubernetes avec NGINX
NGINX, Inc.
 
淺談WAF在AWS的架構
4ndersonLin
 
Microservices and Container Management with NGINX Plus and Mesosphere DC/OS
NGINX, Inc.
 
Real World Example of Orchestrating Docker, Node JS, NFV on OpenStack
Nati Shalom
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
NGINX: Back to Basics – APCJ
NGINX, Inc.
 

Similar to A Discussion of Automated Infrastructure Security with a Practical Example (20)

PPTX
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
PPTX
SecDevOps: The New Black of IT
CloudPassage
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PPTX
Are your DevOps and Security teams friends or foes?
Reuven Harrison
 
PPTX
Integrating Security into DevOps
CloudPassage
 
PPTX
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC
 
PDF
Pragmatic Pipeline Security
James Wickett
 
PDF
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
DevOps.com
 
PDF
Divine and felonios cyber security devopsdays austin 2018
John Willis
 
PPTX
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
PPTX
Security as Code
Ed Bellis
 
PDF
San Francisco Jenkins Area Meetup October 2016: Self-service secure test and ...
Andrey Falko
 
PPTX
Self-Service Secure Test and Release Pipelines
Salesforce Engineering
 
PPTX
Secure DevOPS Implementation Guidance
Tej Luthra
 
PDF
Securing deployment pipeline
Len Bass
 
PDF
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
PDF
Data Driven Decisions in DevOps
Leon Stigter
 
PDF
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
John Willis
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
SecDevOps: The New Black of IT
CloudPassage
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Are your DevOps and Security teams friends or foes?
Reuven Harrison
 
Integrating Security into DevOps
CloudPassage
 
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC
 
Pragmatic Pipeline Security
James Wickett
 
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
DevOps.com
 
Divine and felonios cyber security devopsdays austin 2018
John Willis
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
Security as Code
Ed Bellis
 
San Francisco Jenkins Area Meetup October 2016: Self-service secure test and ...
Andrey Falko
 
Self-Service Secure Test and Release Pipelines
Salesforce Engineering
 
Secure DevOPS Implementation Guidance
Tej Luthra
 
Securing deployment pipeline
Len Bass
 
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Data Driven Decisions in DevOps
Leon Stigter
 
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
John Willis
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Ad

More from Deborah Schalm (20)

PDF
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
PDF
Discovering Dark Debt in your Culture
Deborah Schalm
 
PDF
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
PDF
Putting the Ops in DevOps
Deborah Schalm
 
PDF
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
PDF
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
PDF
30 Minutes to a Private Cloud
Deborah Schalm
 
PDF
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
PDF
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
PPTX
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
PDF
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
PDF
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
PDF
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
PDF
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
PDF
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
PDF
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
PDF
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
PDF
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
PDF
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
PDF
Monitoring First - Instrumenting Your Entire Stack for the Ultimate in Observ...
Deborah Schalm
 
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
Discovering Dark Debt in your Culture
Deborah Schalm
 
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
Putting the Ops in DevOps
Deborah Schalm
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
30 Minutes to a Private Cloud
Deborah Schalm
 
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Monitoring First - Instrumenting Your Entire Stack for the Ultimate in Observ...
Deborah Schalm
 
Ad

Recently uploaded (20)

PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
PPTX
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PPTX
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PDF
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PPTX
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PDF
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PPTX
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PDF
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
Tally software_Introduction_Presentation
AditiBansal54083
 
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 

A Discussion of Automated Infrastructure Security with a Practical Example

  • 1. DevOps.com and CloudPassage Continuous Infrastructure Compliance W. Jenks Gibbons | November 2, 2017
  • 2. Is security a roadblock for continuous delivery? © 2017 CloudPassage2
  • 3. © 2017 CloudPassage3 Traditional security tools Plan Code Build Test Release Deploy Operate security gate
  • 4. © 2017 CloudPassage4 Re-align security to modern IT delivery security guardrails Plan Code Build Test Release Deploy Operate
  • 5. © 2017 CloudPassage5 Continuous Security - DevSecOps PLAN • Map out types of systems • Design security policies • Define policy groups PEOPLE CREATE • Insert agent via CI build scripts, Gold Master images, etc. AUTOMATION PRE-PROD • Tag production artifacts with proper policy groups AUTOMATION CONFIGURE • Apply runtime policies • SVA, CSM, SAM • Firewall, authentication • FIM, LIDS AUTOMATION MONITOR • Monitor production • Security events to SIEM • Audit data to GRC • Metrics to reporting • Visualize traffic and connections • Scope new vulnerabilities AUTOMATION & PEOPLE VERIFY • Verify security of builds • SVA, CSM, SAM • Generate FIM baselines AUTOMATION
  • 6. Case Study Acme Incorporated: Current State • Development and Operations: understand the needs of the business units • Development and Operations: work together on their area of responsibility independently of other teams • Continuous Integration / Continuous Delivery (CICD) • Deliver features multiple times a day • Delivery does not require external approval • Deployment requires Security Operations approval © 2017 CloudPassage Confidential6
  • 7. Case Study Acme Incorporated: Current Problem • Individual teams are unable to deploy at the at the speed of the business units • Security is blocking deployment • Examples: • Security must confirm there are no vulnerabilities in the image (5 day SLA) • Security must confirm the image is configured to meet compliance requirements (5 day SLA) • Security must create an image baseline for file integrity monitoring (5 day SLA) • Firewall changes for new workloads (5 day SLA) © 2017 CloudPassage Confidential7
  • 8. Case Study Acme Incorporated: Current Problem • Delivery: many times a day • Delivery team: autonomous • Deployment team: autonomous • Deployment approval: multiple teams • Deployment approval: more than 5x the time to deliver and deploy © 2017 CloudPassage Confidential8
  • 9. © 2017 CloudPassage9 DevOps delivery pipeline – before security automation PEOPLE Code Done AUTOMATION TOOL CHAIN
  • 10. © 2017 CloudPassage10 DevOps delivery pipeline – before security automation Hours
  • 11. Case Study Acme Incorporated: Solution • Add a Security Operations team member to the Development and Operations feature teams • Add security to the pipeline © 2017 CloudPassage Confidential11
  • 12. Case Study Acme Incorporated: Solution - Plan • Development, Operations and Security Operations are now working together in autonomous feature teams • OS image – the teams will work together to design and create a known “golden” image for each platform • Workloads (e.g. VMs, hosts, servers) are are grouped together: • Jenkins Master • Jenkins Slaves • Git • Web • DB • PCI complaint • HIPAA compliant © 2017 CloudPassage Confidential12
  • 13. Case Study Acme Incorporated: Solution - Plan • Groups are assigned security policies: • Software Vulnerability Assessment (SVA) • Configuration Security Monitoring (CSM) • File Integrity Monitoring (FIM) • Microsegmentation • Log-based Intrusion Detection (LIDS) © 2017 CloudPassage Confidential13
  • 14. Case Study Acme Incorporated: Solution - Create • Enable automated workload security by integrating it into the pipeline • Install a small security agent on the workload. • Ansible • Chef • PowerShell • Puppet • “bake” into image • Ensure the agent works • in any environment • at any scale • on demand • and offers a broad range of controls © 2017 CloudPassage Confidential14
  • 15. Case Study Acme Incorporated: Solution - Pre-Production • When workloads boot • Tag the workload with the proper group • Security policies applied automatically • Security simply goes along for the ride © 2017 CloudPassage Confidential15
  • 16. Case Study Acme Incorporated: Solution – Verify • Security verification is built into the CICD Pipeline • During CI • Code analysis • Unit, smoke, functional … tests • Workload security tests • SVA scan • CSM scan • Success and failures are based on critical failures • Check results into Git – audit trail © 2017 CloudPassage Confidential16
  • 17. Case Study Acme Incorporated: Solution – Verify • Workload security tests (cont.) • On fail • Kill instance • Fix issues • Check-in to kick-off CI - shorten feedback loop • On pass – deploy • take FIM baseline • move from a Pre-Production to a Production security group © 2017 CloudPassage Confidential17
  • 18. Case Study Acme Incorporated: Solution – Monitor • Separate CI build job • At specified intervals • SVA scan • CSM scan • FIM scan • Any critical issues to Slack, JIRA, ServiceNow … © 2017 CloudPassage Confidential18
  • 19. © 2017 CloudPassage19 DevOps delivery pipeline – after security automation Minutes
  • 20. © 2017 CloudPassage20 DevOps delivery pipeline - after security automation PEOPLE Code Notify Done Source control Commit CI/CD master Trigger CI/CD slave Build Test Pass? CloudPassage Halo Scan Baseline Monitor Artifact registry Store Infrastructure Update Y N
  • 21. © 2017 CloudPassage21 Practical Example • Git • Jenkins • Slack • Chef
  • 22. © 2017 CloudPassage22 Check-In Developer makes a change to code, or to infrastructure (e.g. golden image)
  • 23. © 2017 CloudPassage23 Jenkins A web-hook is then configured to kick off a build in Jenkins. This could be a code change or an infrastructure change.
  • 24. © 2017 CloudPassage24 Slack Jenkins sends notifications to Slack – shorten the feedback loop.
  • 25. © 2017 CloudPassage25 Jenkins, Chef, Test Kitchen, Security Tools • EC2 Test Kitchen – launch golden image • Chef – install lightweight security agent • Python – API calls to security tools python /home/jenkins/workload_security_analysis.py python /home/jenkins/deploy.py
  • 26. © 2017 CloudPassage confidential26 Git – Audit Trail If the build succeeds or fails an audit report can be created and checked into Git.
  • 27. © 2017 CloudPassage27 Patch – “Golden Image” Using the results of the workload security analysis from the audit report the golden image can be patched.
  • 28. © 2017 CloudPassage28 Create New Golden Image and Check in as Code