SlideShare a Scribd company logo
Thank you.
Thank you.The Intersection of Security &
DevOps
Ryan Holland, Senior Director of Cloud Architecture, Alert Logic
Summary
1. DevOps implications on Security
2. Developing a Blueprint approach to cloud security
What Drives Cloud Adoption?
• Developers are the driving force behind cloud adoption
• Main reason developers are using cloud services?
Innovation
ability to move
fast
deploy
infrastructure
without IT
overhead
ship code without
delays
Software Drives Business Innovation
Developer Perspective
2013 2017
89% of
developers use
public cloud
* RightScale Survey 2016
The Innovation Power Shift
ITSECURITY
COMPLIANCE
SOFTWARE
DEVELOPERS
DevOps Drives Security Agility
Sonatype
72 % NO
Aligning DevOps with Security
Critical questions to answer:
1. What are we protecting?
2. What controls must be in place?
3. How do you integrate security into your daily workflow?
Reshaping the Security/Dev/Ops Relationship
old school classic IT
new school sec/dev/ops
Rules of the Road
No Yes
1 Random opinions
Everyone works from same
security blueprint
2 General set of controls
Controls specific
to your cloud blueprint
3 Security gateways and overlays
Security is part of
immutable infrastructure
4 Periodic audits
Security testing part of
regression framework
5
Vulnerabilities are escalated
and negotiated for resolution
Vulnerabilities are bugs
Critical vulnerabilities are critical bugs
Perception vs Reality
Our ability to accurately estimate
attack surface is compromised by
our weak sense of perception
More reliable approach:
1. Identify your cloud assets
2. Measure your exposure
3. Implement controls
Blueprint Model for
DevOps Security
Enumerate Your Cloud Footprint
Generalize common workloads into infrastructure-’blueprints’
Blueprint Driven Approach
Key target assets
Across the Full Stack
1. Magento application and plugins
2. PHP
3. Apache
4. NGINX
5. Redis
6. Maria DB, Elastic Search
7. Linux OS and system tools
8. AWS services
EC2 instances
EC2 instances
VPC
Route 53
Users
Internet
gateway
ELB
MariaDB
MariaDB
AvailabilityzoneAAvailabilityzoneB
Auto scaling
group
Apache PHP
Auto scaling
group
EC2 instances
EC2 instances
FPM
S3
Threat model
Identify Most Relevant Threats
Create a threat model for these blueprints
Blueprint
Threat
Model
Blueprint
Threat
Model
Exposure analysis
Post compromise
analysis
Configuration &
Vulnerability Coverage
Required Threat Coverage
(pre-compromise)
Required Threat Coverage
(post-compromise)
Required threat analytics
pre-compromise
post-compromise
Required incident analytics
Required data-sources
Pre compromise
analysis
Integrated Alert Logic Controls for Broad Coverage
Build Coverage Model Blueprint
3-Tier Classic
Web
Micro-
service
E-Com
Blueprint
CMS
Blueprint
Magento
Blueprint
Wordpress
Blueprint
Drupal
Blueprint
OWASP Top 10
SQL-Injection attacks
LAMP target coverage
Critical application coverage
Deep HTTP inspection with anomaly detection
Supervised Machine learning
Data-driven intrusion defense
Coverage for key app components
Full Stack Security Coverage
Pre-compromise Compromise Lateral Movement
Incident
Investigation
System
Visual | Context | Hunt
Collect
web, host,
network
data
Automatic
Detection
Block | Alert | Log
ML Algorithms
Rules & Analytics
SECURITY
EXPERTS
Assess
Exposure
Block
Critical
Attacks
Cloud Security Maturity Model
Basic Cloud
Security Tooling
2
2. Basic Cloud Security
• Agile development team,
coupled to immature security
program
• Minimal use of cloud provider
and OSS security tools
Traditional Security
1. Non-Cloud Native
• Lift & Ship infrastructure
migration
• Traditional on-premises
security tools and processes
• Limited agility
1
DevOps
Integration
3
3. Cloud Native Security
• Security infrastructure part of
deployment pipeline
• Full stack protection across
networks, systems and
applications
• Security does not slow down
innovation
SecDevOps
Integration
D
4. Cloud Security Lifecycle
• Security process part of
continuous integration pipeline
• Mature security assessment
and testing program part of
code deployment process
• Maximum agility and security
Thank you.

More Related Content

PDF
The AWS Shared Responsibility Model in Practice
Alert Logic
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
Alert Logic
 
PPTX
#ALSummit: Realities of Security in the Cloud
Alert Logic
 
PDF
CSS17: Houston - Protecting Web Apps
Alert Logic
 
PDF
Protecting Against Web Attacks
Alert Logic
 
PPTX
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Realities of Security in the Cloud
Alert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 
#ALSummit: Alert Logic & AWS - AWS Security Services
Alert Logic
 
#ALSummit: Realities of Security in the Cloud
Alert Logic
 
CSS17: Houston - Protecting Web Apps
Alert Logic
 
Protecting Against Web Attacks
Alert Logic
 
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 

What's hot (20)

PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Alert Logic
 
PPTX
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 
PDF
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
Alert Logic
 
PPTX
#ALSummit: Architecting Security into your AWS Environment
Alert Logic
 
PDF
Reality Check: Security in the Cloud
Alert Logic
 
PDF
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
PDF
Govern Your Cloud: The Foundation for Success
Alert Logic
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PDF
Securing Healthcare Data on AWS for HIPAA
Alert Logic
 
PPTX
CSS 17: NYC - Stories from the SOC
Alert Logic
 
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Alert Logic
 
PDF
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Alert Logic
 
PDF
CSS17: Houston - Stories from the Security Operations Center
Alert Logic
 
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
PPTX
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Alert Logic
 
PDF
Realities of Security in the Cloud
Alert Logic
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Alert Logic
 
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
CSS 17: NYC - Building Secure Solutions in AWS
Alert Logic
 
#ALSummit: Architecting Security into your AWS Environment
Alert Logic
 
Reality Check: Security in the Cloud
Alert Logic
 
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
Govern Your Cloud: The Foundation for Success
Alert Logic
 
Realities of Security in the Cloud
Alert Logic
 
Securing Healthcare Data on AWS for HIPAA
Alert Logic
 
CSS 17: NYC - Stories from the SOC
Alert Logic
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Alert Logic
 
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Alert Logic
 
CSS17: Houston - Stories from the Security Operations Center
Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Alert Logic
 
Realities of Security in the Cloud
Alert Logic
 
Ad

Similar to The Intersection of Security & DevOps (20)

PDF
The Intersection of Security and DevOps
Alert Logic
 
PDF
The Intersection of Security & DevOps
Alert Logic
 
PDF
The Intersection of Security & DevOps
Alert Logic
 
PDF
Introduction to DevSecOps
Setu Parimi
 
PPTX
Building and Operating Clouds
BMC Software
 
PPTX
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
Daniel Bryant
 
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Shannon Lietz
 
PPTX
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
JAXLondon_Conference
 
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
PDF
A Different Approach to Securing Your Cloud Journey
Cloudflare
 
PPTX
Overcoming Security Challenges in DevOps
Alert Logic
 
PPTX
Unc charlotte prezo2016
Sanjay R. Gupta
 
PPTX
7 Innovations That Will Transform IT Operations
OpsRamp
 
PDF
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
apidays
 
PPTX
Automating your AWS Security Operations
Evident.io
 
PPTX
Managing Performance in the Cloud
DevOpsGroup
 
PPTX
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Mandy Sidana
 
PPTX
cloudComputingSec_p3.pptx
Steven Quach
 
PPTX
Novel cloud computingsecurity issues
Joo Manthar
 
The Intersection of Security and DevOps
Alert Logic
 
The Intersection of Security & DevOps
Alert Logic
 
The Intersection of Security & DevOps
Alert Logic
 
Introduction to DevSecOps
Setu Parimi
 
Building and Operating Clouds
BMC Software
 
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
Daniel Bryant
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Shannon Lietz
 
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
JAXLondon_Conference
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
A Different Approach to Securing Your Cloud Journey
Cloudflare
 
Overcoming Security Challenges in DevOps
Alert Logic
 
Unc charlotte prezo2016
Sanjay R. Gupta
 
7 Innovations That Will Transform IT Operations
OpsRamp
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
apidays
 
Automating your AWS Security Operations
Evident.io
 
Managing Performance in the Cloud
DevOpsGroup
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Mandy Sidana
 
cloudComputingSec_p3.pptx
Steven Quach
 
Novel cloud computingsecurity issues
Joo Manthar
 
Ad

More from Alert Logic (20)

PDF
Managed Threat Detection and Response
Alert Logic
 
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
PDF
Security Implications of the Cloud
Alert Logic
 
PDF
Reducing Your Attack Surface
Alert Logic
 
PDF
The AWS Shared Responsibility Model in Practice
Alert Logic
 
PDF
Security Spotlight: Presidio
Alert Logic
 
PDF
Security Spotlight: Rent-A-Center
Alert Logic
 
PDF
Security Spotlight: Presidio
Alert Logic
 
PDF
Security Implications of the Cloud
Alert Logic
 
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PDF
CSS 2018 Trivia
Alert Logic
 
PDF
The AWS Shared Responsibility Model in Practice
Alert Logic
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PDF
Security Spotlight: The Coca Cola Company
Alert Logic
 
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic
 
PDF
The AWS Shared Responsibility Model in Practice
Alert Logic
 
PDF
Security Implications of the Cloud
Alert Logic
 
PDF
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
PDF
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Alert Logic
 
Managed Threat Detection and Response
Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
Security Implications of the Cloud
Alert Logic
 
Reducing Your Attack Surface
Alert Logic
 
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Security Spotlight: Presidio
Alert Logic
 
Security Spotlight: Rent-A-Center
Alert Logic
 
Security Spotlight: Presidio
Alert Logic
 
Security Implications of the Cloud
Alert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 
Realities of Security in the Cloud
Alert Logic
 
CSS 2018 Trivia
Alert Logic
 
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Realities of Security in the Cloud
Alert Logic
 
Security Spotlight: The Coca Cola Company
Alert Logic
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic
 
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Security Implications of the Cloud
Alert Logic
 
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Alert Logic
 

Recently uploaded (20)

PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Doc9.....................................
SofiaCollazos
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 

The Intersection of Security & DevOps

  • 2. Thank you.The Intersection of Security & DevOps Ryan Holland, Senior Director of Cloud Architecture, Alert Logic
  • 3. Summary 1. DevOps implications on Security 2. Developing a Blueprint approach to cloud security
  • 4. What Drives Cloud Adoption? • Developers are the driving force behind cloud adoption • Main reason developers are using cloud services? Innovation ability to move fast deploy infrastructure without IT overhead ship code without delays
  • 6. Developer Perspective 2013 2017 89% of developers use public cloud * RightScale Survey 2016
  • 7. The Innovation Power Shift ITSECURITY COMPLIANCE SOFTWARE DEVELOPERS
  • 8. DevOps Drives Security Agility Sonatype 72 % NO
  • 9. Aligning DevOps with Security Critical questions to answer: 1. What are we protecting? 2. What controls must be in place? 3. How do you integrate security into your daily workflow?
  • 10. Reshaping the Security/Dev/Ops Relationship old school classic IT new school sec/dev/ops
  • 11. Rules of the Road No Yes 1 Random opinions Everyone works from same security blueprint 2 General set of controls Controls specific to your cloud blueprint 3 Security gateways and overlays Security is part of immutable infrastructure 4 Periodic audits Security testing part of regression framework 5 Vulnerabilities are escalated and negotiated for resolution Vulnerabilities are bugs Critical vulnerabilities are critical bugs
  • 12. Perception vs Reality Our ability to accurately estimate attack surface is compromised by our weak sense of perception More reliable approach: 1. Identify your cloud assets 2. Measure your exposure 3. Implement controls
  • 14. Enumerate Your Cloud Footprint Generalize common workloads into infrastructure-’blueprints’ Blueprint Driven Approach Key target assets Across the Full Stack 1. Magento application and plugins 2. PHP 3. Apache 4. NGINX 5. Redis 6. Maria DB, Elastic Search 7. Linux OS and system tools 8. AWS services EC2 instances EC2 instances VPC Route 53 Users Internet gateway ELB MariaDB MariaDB AvailabilityzoneAAvailabilityzoneB Auto scaling group Apache PHP Auto scaling group EC2 instances EC2 instances FPM S3
  • 15. Threat model Identify Most Relevant Threats Create a threat model for these blueprints Blueprint Threat Model Blueprint Threat Model Exposure analysis Post compromise analysis Configuration & Vulnerability Coverage Required Threat Coverage (pre-compromise) Required Threat Coverage (post-compromise) Required threat analytics pre-compromise post-compromise Required incident analytics Required data-sources Pre compromise analysis
  • 16. Integrated Alert Logic Controls for Broad Coverage Build Coverage Model Blueprint 3-Tier Classic Web Micro- service E-Com Blueprint CMS Blueprint Magento Blueprint Wordpress Blueprint Drupal Blueprint OWASP Top 10 SQL-Injection attacks LAMP target coverage Critical application coverage Deep HTTP inspection with anomaly detection Supervised Machine learning Data-driven intrusion defense Coverage for key app components
  • 17. Full Stack Security Coverage Pre-compromise Compromise Lateral Movement Incident Investigation System Visual | Context | Hunt Collect web, host, network data Automatic Detection Block | Alert | Log ML Algorithms Rules & Analytics SECURITY EXPERTS Assess Exposure Block Critical Attacks
  • 18. Cloud Security Maturity Model Basic Cloud Security Tooling 2 2. Basic Cloud Security • Agile development team, coupled to immature security program • Minimal use of cloud provider and OSS security tools Traditional Security 1. Non-Cloud Native • Lift & Ship infrastructure migration • Traditional on-premises security tools and processes • Limited agility 1 DevOps Integration 3 3. Cloud Native Security • Security infrastructure part of deployment pipeline • Full stack protection across networks, systems and applications • Security does not slow down innovation SecDevOps Integration D 4. Cloud Security Lifecycle • Security process part of continuous integration pipeline • Mature security assessment and testing program part of code deployment process • Maximum agility and security