Christian Price
Cloud Security Architect, Intuit
Shannon Lietz
Sr. Mgr & DevSecOps Leader, Intuit
•
•
•
•
Page 3 of 375
Security
Configuration
Procedures
V 3.6.0.1.1,
January 2011
•
•
•
•
• -- FOUNDER --
•
•
•
•
•
•
•
•
•
•
Bang
Head
Here
OPS
SEC
DEV
AppSec
• Security as Code
• Self-Service Testing
• Red Team/Blue Team
• Inline Enforcement
• Analytics & Insights
• Detect & Contain
• Incident Response
• Investigations
• Forensics
DevSecOps
Security
Engineering
Experiment,
Automate, Test
Security
Operations
Hunt, Detect,
Contain
Compliance
Operations
Respond,
Manage, Train
Security
Science
Learn, Measure,
Forecast
• API KEY EXPOSURE ->
8 HRS
• DEFAULT CONFIGS ->
24 HRS
• SECURITY GROUPS ->
24 HRS
• ESCALATION OF PRIVS
-> 5 DAYS
• KNOWN VULN ->
8 HRS
•
•
•
•
•
•
•
•
•
•
•
•
•
+/-
Central Account
(Trusted)
Admin
IAM IAMIAM IAM IAM IAM
SecRole SecRole SecRole SecRole SecRole SecRole
IAM
How did we decide which roles would be
deployed?
• Human
• IAM Admin
• Incident Response
• Read Only
• Services
• IAM Grantor
• Instance Roles required to support
security services
• Read Only
•
•
•
•
•
AWS
RUBY, PYTHON, GO
API/MICRO-
SERVICES
LOG EVENTS
•
•
•
•
MACHINE IMAGES
DOCKER CONTAINERS
BASELINE SCRIPTS
LIBRARIES & TOOLKITS
•
•
•
•
•
•
•
•
•
ZAP PROXY
GAUNTLT
NESSUS
NEXPOSE
METASPLOIT
BURP SUITE
LIFECYCLE/AUDITOR
•
•
•
•
RESQUE
SNS SQS
KINESIS
KAFKA
insights
security
science
security
tools & data
AWS
accounts
S3
Glacier
EC2
CloudTrail
ingestion
threat intel
•
•
•
RUBY
AWS API
DR ACCOUNT
ENCASE
•
•
•
•
•
•
•
*
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Security as Code owasp