Transcript
Page 1: Five things I learned about information security

Major HaydenUniversity of the Incarnate Word - November 2, 2015

Five lessons I learnedabout information security

Page 2: Five things I learned about information security

A bit about me

Page 3: Five things I learned about information security

Major HaydenPrincipal Architect at Rackspace

Fedora Security TeamPackage maintainer

Fedora Planet bloggerFormer board member

Ambassador

AnsiblePython

OpenStackXen/KVM/ContainersInformation Security

Page 4: Five things I learned about information security

Major HaydenPrincipal Architect at Rackspace

GIAC Certified Unix Security Administrator

Paper: Securing Linux Containershttp://bit.ly/securinglinuxcontainers

GIAC Security Essentials Certification

Red Hat Certified Architect

Page 5: Five things I learned about information security
Page 6: Five things I learned about information security
Page 7: Five things I learned about information security

icanhazip.comicanhazptr.com

icanhaztrace.comicanhazproxy.comicanhazepoch.com

icanhaztraceroute.com

Page 8: Five things I learned about information security

Agenda

How did I get intoinformation security?

Five lessons learned(many of them learned the hard way)

Final thoughts(and some required reading)

Page 9: Five things I learned about information security

How did I get intoinformation security?

Page 10: Five things I learned about information security

How did I stumble intoinformation security?

Page 11: Five things I learned about information security

I sent an angry emailafter a security incident.

Special note: this is not a recommended method for getting into an information security career.

Page 12: Five things I learned about information security

Impromptu calendar invitation fromthe Chief Security Officer (CSO) arrives

Page 13: Five things I learned about information security

“I’m totally fired.”

Page 14: Five things I learned about information security
Page 15: Five things I learned about information security

Lesson 1:Information security requires

lots of communication and relationships

Page 16: Five things I learned about information security

People within businesses generallyfall into one of three security mindsets:

Page 17: Five things I learned about information security

“Security is mission-critical for usand it’s how we maintain

our customers’ trust.”

These are your allies.

Share your intelligence with them frequently.They must be ”read into” what’s happening.

Highlight their accomplishments and effortsto your leadership and theirs

at every possible opportunity.

Page 18: Five things I learned about information security

“Security is really important,but we have lots of features to release.

We will get to it.”

These people see security as a bolt-on,value-added product feature.

Share methods for building in security from the start.

Make it easier for this group to build secure systemsthrough technical standards.

Page 19: Five things I learned about information security

“I opened this weird file fromsomeone I didn’t know

and now my computer is acting funny.”

This group is your biggest risk.

Take steps to prevent them from being ableto make mistakes in the first place.

Regularly send high-level communicationto this group with useful information

in a friendly format.

Page 20: Five things I learned about information security

Lesson 2:Spend the majority of your time and money

on detection and response capabilities

Page 21: Five things I learned about information security

Make it easier to detect an intruderand respond to the intrusion

Don’t let your intruders act like this:

Make themact more like this:

Page 22: Five things I learned about information security

Ensure that if an attackergains access to your network,you know about the intrusion

and how to respond

Automation, aggregation, alerting

Firewall logs

Netflow data/analysis

Intrusion Detection Systems (IDS)

Server logs

Authentication logs

Physical security devices

Immediate, coordinated response

Page 23: Five things I learned about information security

Incident communication

Use broad communication thathints at urgency without sharing details.

Share the details with your allies in the business.

Page 24: Five things I learned about information security

Lesson 3:People, process, and technology

must be in sync

Page 25: Five things I learned about information security

After an incident:

Don’t talk about people*.

Don’t talk about what could have been done.

Don’t talk about vendors.

* No matter how delicate you are, you will eventually “call the baby ugly”.

Page 26: Five things I learned about information security

Assume the worst will happen again.Design processes and technologies to

reduce its impact in the future.

This is an iterative process.

Page 27: Five things I learned about information security

Lesson 4:Set standards, not policies.

Page 28: Five things I learned about information security

Use a little psychology todrive the behavior you truly want:

a more secure infrastructure

Page 29: Five things I learned about information security

Compare these two methods ofcommunicating with the business:

Page 30: Five things I learned about information security

“If your system doesn’t pass this PCI-DSS audit,we won’t be able to take credit cards.

We know what that means.”

Page 31: Five things I learned about information security

“We have a technical standardfor public-facing environments

that you need to meet,and we have some tools

to self-assess your systems.”

Page 32: Five things I learned about information security

Technical people can easilydigest technical standards, but

not lengthy compliance documents.

Design a standard so that an environmentcan meet multiple compliance programs

if it is followed carefully.

Page 33: Five things I learned about information security

Lesson 5:Don’t take security incidents personally.

Page 34: Five things I learned about information security
Page 35: Five things I learned about information security

Security incidents highlightareas for improvement.

They also give you a better ideaof what attackers want from your business.

Page 36: Five things I learned about information security

Take the time to do athorough root cause analysis.

Adjust spending, priorities, and tasksbased on what you find.

Page 37: Five things I learned about information security

Final thoughts

Page 38: Five things I learned about information security

Information security thrives on frequent,honest, meaningful communication

more than anything else.

Security incidents will happen.How you respond to them is critical.

Design systems that prevent peoplefrom making mistakes in the first place.

Page 39: Five things I learned about information security

Switch: How to Change Things When Change is HardChip & Dan Heath

When you want to make change happen, this book will help you focus your thinking. It has some great frameworks and situational examples.

Page 40: Five things I learned about information security

Winning With PeopleJohn Maxwell

Building relationships requires learning a lot about yourself first. This book is broken into five sections that gradually take you through how to have stronger, lasting relationships with others.

Page 41: Five things I learned about information security

The Phoenix ProjectGene Kim, Kevin Behr, and George Spafford

A must for anyone working in IT. It’s a modern spin on Goldratt’s classic, The Goal, that focuses on a new IT executive that is in over his head. Security and compliance issues play a big role in how he works within his business.

Page 42: Five things I learned about information security

Thank you!majorhayden

[email protected]

major.io

Page 43: Five things I learned about information security

Image Credits

Bank safe on title slide: By Alvesgaspar (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via

Wikimedia Commons

Honduran TIGRES soldiers: United States Special Operations Command (Flickr: https://flic.kr/p/qweJtn, CC-BY 2.0)

Longhorn cattle: Evelyn Simak [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons

NORAD: By NORAD (government website) [Public domain], via Wikimedia Commons

Iterative process diagram: By Aflafla1 [CC0], via Wikimedia Commons