24
Securing the Heart of Automated Infrastructure Why Security is DevOps

Securing the Heart of Automated Infrastructure

Embed Size (px)

Citation preview

Page 1: Securing the Heart of Automated Infrastructure

Securing the Heart of

Automated InfrastructureWhy Security is DevOps

Page 2: Securing the Heart of Automated Infrastructure

About Me: Jamesha Fisher

✴ DevOps Security Pirate

✴ Work at CloudPassage

✴ Security +

Automation =

Awesomeness

✴ Here to Discuss

✴ DevOpsSec

✴ Chef Server

Page 3: Securing the Heart of Automated Infrastructure

Why is Security

DevOps? (also known as DevOpsSec?)

Page 4: Securing the Heart of Automated Infrastructure

Security is in the Public Eye More than Ever

- Brand Name Vulnerabilities

- Breaches of Various Industries

- Digital Fraud and Crimes

Page 5: Securing the Heart of Automated Infrastructure

Security Principles Match

with DevOps!

Page 6: Securing the Heart of Automated Infrastructure

Confidentiality

Availability

Integrity

“For any information system to serve

its purpose, the information must be

available when it is needed.”

“Confidentiality is the requirement that

private or confidential information not

be disclosed to unauthorized

individuals. ”

“That a system and it’s data are not

manipulated for unauthorized

functionality or alteration.”

Fast

Ensure Uptime

Controlled, but not Silo’edCollaborative Repeatable & Standardized

Auditable/Processed

Page 7: Securing the Heart of Automated Infrastructure

Why is this important

for deployment of Chef?

Page 8: Securing the Heart of Automated Infrastructure

Planning: Availability

Page 9: Securing the Heart of Automated Infrastructure

- How Many Nodes

Do You Have (or

Plan to)

- Are You Cloud or

Bare Metal?

- What do you Plan to

Do with Chef?

- How quickly do we

need to recover?

Page 10: Securing the Heart of Automated Infrastructure

Planning: Integrity

Page 11: Securing the Heart of Automated Infrastructure

- How do we

Configure Servers?

- How do we Ensure

Standards/Security

?

Page 12: Securing the Heart of Automated Infrastructure

Planning: Confidentiality

Page 13: Securing the Heart of Automated Infrastructure

- How do we want to

structure our Chef

Server?

- How are we going to

deploy?

- How are Users going

to access?

Page 14: Securing the Heart of Automated Infrastructure

Testing:The Prep and Practice Firefight

Page 15: Securing the Heart of Automated Infrastructure

Prep and Practice Firefighting : Availability

๏ Build Host and Set Up Chef-Server

๏ SSL Certs Too!

๏ Ensure minimum authorized users can

login

๏ Test Basic Operations/Worst Cases

Page 16: Securing the Heart of Automated Infrastructure

Prep and Practice

Firefighting: Integrity

๏ Check SVA and CSM for

Consistency

๏ Pre and Post-Setup

๏ Verify that Firewall Rules work

๏ Make sure SSL is Valid and Setup

Page 17: Securing the Heart of Automated Infrastructure

Prep and Practice

Firefighting: Confidentiality๏ Create Organizational Setup

๏ Create Users and Role/Based Access

๏ Test Authentication and Basic

Operations

๏ Users/Roles

Page 18: Securing the Heart of Automated Infrastructure

DEMO TIME!

Page 19: Securing the Heart of Automated Infrastructure

Deployment

Page 20: Securing the Heart of Automated Infrastructure

Things to Keep in Mind

• Chef Cookbooks are your friends

• chef-client and omnibus_updater

• New Installs

• It’s going to take some time and adjustment

• Migration

• Download and move from old Chef Server

• Move Everything First, then Separate if Env->Org Migration

Page 21: Securing the Heart of Automated Infrastructure

So In Conclusion...

Page 22: Securing the Heart of Automated Infrastructure

Confidentiality

Availability

Integrity

- Plan for Recovery

- Test Setup and Basic Operations (at Least)

- Plan for the

repeatable and

enforceable

- Check for

Security….always!

- Plan out Chef Org

- Including Users,

Roles

- Test for Operability

Page 23: Securing the Heart of Automated Infrastructure

Questions?

Page 24: Securing the Heart of Automated Infrastructure

Sources - Images

- “Fleet Street Newspaper Wallpaper”, 2012, Muriva.

- CIA Triad, 2012, The EMail Admin, http://www.theemailadmin.com/wp-

content/uploads/2012/11/CIA.png

- Others are Stock Images purchased from 123f.com

- Paper Sources

- NIST Special Publication 800-33, csrc.nist.gov

- Information security. (2015, March 19). In Wikipedia, The Free Encyclopedia.

Retrieved 21:52, March 27, 2015, from

http://en.wikipedia.org/w/index.php?title=Information_security&oldid=652104012

- All about Enterprise Chef, http://docs.chef.io/enterprise/

- CloudPassage. http://www.cloudpassage.com