Secure DevOps:
Overcoming the Risks of
Modern Service Delivery
Kurt Bittner & Rick Holland
Forrester Research
Featuring:
2
Agenda
 The DevOps Revolution
 Threat Landscape
 Best Practices for Secure DevOps
 Q&A
Chris Hoover
GVP, Products & Marketing
Perforce Software
Featuring:
3
Today’s Presenters
Kurt Bittner
Principal Analyst
Application Development
and Delivery
Rick Holland
Principal Analyst
Security & Risk
Featuring:
4
Agenda
 The DevOps Revolution
 Threat Landscape
 Best Practices for Secure DevOps
 Q&A
5
http://www.linkconstructiongroup.net/project.cfm?id=42© Golden Gate Bridge, Highway and Transportation District
Why DevOps?
It’s simple: intense, and increasing competition.
“We don’t compete with other banks. We compete
with Apple, Paypal, and Google.” (CIO, Large Banking
organization)
Featuring:
6
Fast application delivery = better business results
 Less risk
 Less waste
 Lower cost
 Happier customers
October 20, 2014, “The Software-Powered Business”
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
7
Seven Habits Of Highly Successful DevOps
© 2015 Forrester Research, Inc. Reproduction Prohibited
The future is already here — it's just
not very evenly distributed.
William Gibson
Could you manually deploy an airbag?
What if a hacker deployed your airbag
when you are driving at highway speed?
Source: https://farm4.staticflickr.com/3570/3654967093_8181dff16c_o.jpg
10http://blogs-images.forbes.com/sethporges/files/2014/05/googlecar-e1401261602733.jpg
What about kidnapping by hacking an
autonomous vehicle?
Software is eating the world
Companies in every industry need to
assume a software revolution is coming
Featuring:
13
But security missed the memo
CONTINUOUS
FRICTION
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
14
But security missed the memo
CONTINUOUS
NAGGING
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
15
Agenda
 The DevOps Revolution
 Threat Landscape
 Best Practices for Secure DevOps
 Q&A
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
16
Companies & agencies are overwhelmed
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
17
>75% of compromises occurred in days
Source: http://www.verizonenterprise.com/DBIR/2014
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
18
Yet only 25% were discovered in days
Source: http://www.verizonenterprise.com/DBIR/2014/
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
19
Code Spaces goes out of business
 Deleted EBS snapshots, S3 buckets, all AMIs
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
20
The 90s called, wants its security
approach back
 Static and dynamic code
analysis can take days
 Bolt on security cannot keep
pace with DevOps
© 2015 Forrester Research, Inc. Reproduction Prohibited
21
http://media-cdn.tripadvisor.com/media/photo-s/02/ce/93/e8/auditorium-
theatre.jpg
Manual security processes are often little
more than Risk Management Theater
Instead of bright ideas
We have broken bulbsSource:
https://farm2.staticflickr.com/1105/1471414696_b7e
134d097_o.jpg
23
The perimeter is dead!
https://www.flickr.com/photos/23879276@N00/3318932796
Featuring:
24
Except for the perimeters between
our teams
 Development is the “Department of No.”
 Operations is the “Department of No” as well.
 Security is the “Department of Hell No!”
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
26
Agenda
 The DevOps Revolution
 Threat Landscape
 Best Practices for Secure DevOps
 Q&A
Ford’s great innovation: the assembly
line
https://upload.wikimedia.org/wikipedia/commons/2/29/Ford_assembly_line_-_1913.jpg
28
Lean Value Stream Mapping
http://en.wikipedia.org/wiki/Value_stream_mapping
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
29
Faster Delivery = Faster Remediation
Idea
Understand
Needs
Develop Test Deploy
Customer
Value
3 days 5 days 5 days 3 days
10 days7 days 4 days 9 days
Total = 47 days
1 day
feedback
July 25, 2014 “Define A Software Delivery Strategy For Business Innovation”© 2015 Forrester Research, Inc. Reproduction Prohibited
30
Idea
proposed
Understand
Needs &
Invent
Solutions
Functional
Testing
Deploy
Solution
Customer
Value
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
Release
Decision
Ensure only
authorized
changes
Automate and control deployments
Make release
decisions
based on test
data
Provide standard,
secure
environments
Develop,
Commit & Build
Detect
vulnerabilities
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Prevention is better than remediation
31
Idea
proposed
Understand
Needs &
Invent
Solutions
Functional
Testing
Deploy
Solution
Customer
Value
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
Release
Decision
Automate and control deployments
Make release
decisions
based on test
data
Provide standard,
secure
environments
Detect
vulnerabilities
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Ensure only authorized changes
Develop,
Commit & Build
Featuring:
32
Don’t forget about the insider threats
 CERT 2014 US State of Cybercrime Survey
Base: 557 respondents. Software Engineering Institute
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=298318
Insiders commit:
 Fraud
 Theft of IP
 Sabotage
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
33
Terminated worker cripples employer
 Deleted 88 virtual servers in seconds
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
34
Ensure authorized changes with analytics
 Quickly identifying
unauthorized changes is
paramount.
 Behavioral analytics can
detect a myriad of anomalous
or unauthorized changes
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
35
Identify anomalous/malicious behavior
over time:
 Is Rick accessing code he has never accessed before?
 Is Rick accessing code that his peers don’t access?
 Are Rick’s work hours unusual? (8-5 CST, but now 2am)
 Why is Rick suddenly uploading code to Dropbox?
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
36
http://blog.jki.net/news/niweek-2012-fire-and-forget-bulletproof-builds-using-continuous-
integration-with-labview-video-slides-now-available/
Ensure only
authorized
changes
Continuous integration ensures
healthy code
© 2015 Forrester Research, Inc. Reproduction Prohibited
37
Idea
proposed
Understand
Needs &
Invent
Solutions
Functional
Testing
Deploy
Solution
Customer
Value
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
Release
Decision
Ensure only
authorized
changes
Automate and control deployments
Make release
decisions
based on test
data
Develop,
Commit &
Build
Detect
vulnerabilities
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Provide standard, secure environments
* * *
38
http://www.flickr.com/photos/38392483@N00/385912858
“Infrastructure As Art”
 Every hand-crafted environment is unique
 No auditability of changes
 Often, no control over change access
 No repeatability
 “It works fine in my environment.”
Inconsistency Creates Vulnerability
39
Complexity leads to vulnerability
https://sndrs.ca/page/2/
40
http://www.datacenterknowledge.com/wp-content/uploads/2011/05/ITPAC-Servers-
470.jpg
› Standard VM/Container configurations
› Configurations version controlled
› Managed Change authorization
› Changes automated, repeatable, auditable
“Infrastructure As Code”
Versioned
Repository
Configuration Info
Configured Environment
Test
Data
Test
Data
Configuration
Info
Service
Virtualization
Test Data
Management
Deployment
Automation
Featuring:
41
Standardized environments make
security scalable, finally
 Security pros must
leverage IT automation
tools
 Ensure consistent
configurations and
eliminate drift
© 2015 Forrester Research, Inc. Reproduction Prohibited
Featuring:
42
Standardization made Heartbleed
less painful
© 2015 Forrester Research, Inc. Reproduction Prohibited
43
Idea
proposed
Understand
Needs &
Invent
Solutions
Deploy
Solution
Customer
Value
Release
Decision
Ensure only
authorized
changes
Automate and control deployments
Make release
decisions
based on
test data
Provide standard,
secure
environments
Develop,
Commit &
Build
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Detect vulnerabilities
Functional
Testing
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
44
Ensure only
authorized
changes
Automate and control deployments
Provide standard,
secure
environments
Develop,
Commit &
Build
Detect
vulnerabilities
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Idea
proposed
Understand
Needs &
Invent
Solutions
Functional
Testing
Deploy
Solution
Customer
Value
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
Make release decisions based on test data
Release
Decision
45
Benefits of basing release decisions on test data
Increased Confidence Reduced Risk
Fewer Incidents
Simplified Release Decisions
46
Idea
proposed
Understand
Needs &
Invent
Solutions
Functional
Testing
Deploy
Solution
Customer
Value
Load,
Performance,
Security, …
Testing
UAT/Explora
tory Testing
Release
Decision
Ensure only
authorized
changes
Make release
decisions
based on test
data
Provide standard,
secure
environments
Develop,
Commit &
Build
Detect
vulnerabilities
Eliminate the
“console”
Detect
intrusions
Feedback
New Capabilities
Automate and control deployments
Automating deployment reduces vulnerability
47
Add slides on ARA– what it is, how it works
http://h30499.www3.hp.com/t5/Grounded-in-the-Cloud/Transform-DevOps-with-
Application-Release-Automation/ba-p/5952497#.VTZ73c5Gceo
Benefits of Automating Deployment
Increase reliability
Eliminate manual errors
A typical quarterly release at one company consisted of a spreadsheet
of over 1000 changes that needed to be made to deploy the software.
A THOUSAND OPPORTUNITIES FOR SOMETHING TO GO WRONG.
Increase speed
Reduce cost
Featuring:
48
Three Teams, One Goal
 Development, Operations and
Security must work together to win,
serve and retain customers.
 Deliver consistency
• Secure customer experiences
• Trustworthy configurations
• Minimize human error
• Few surprises
© 2015 Forrester Research, Inc. Reproduction Prohibited
Q&A
Featuring:
50
Thank you
Kurt Bittner
Principal Analyst
kbittner@forrester.com
@ksbittner
Rick Holland
Principal Analyst
rholland@forrester.com
@rickhholland

Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery

Editor's Notes

  • #12 http://pixabay.com/p-97849/?no_redirect
  • #13 http://pixabay.com/p-97849/?no_redirect
  • #14 http://pixabay.com/p-97849/?no_redirect
  • #15 http://pixabay.com/p-97849/?no_redirect
  • #18 2015 Verizon DBIR
  • #20 http://pixabay.com/p-97849/?no_redirect
  • #21 http://pixabay.com/p-97849/?no_redirect
  • #23 https://farm2.staticflickr.com/1105/1471414696_b7e134d097_o.jpg
  • #24 http://pixabay.com/p-156676/?no_redirect Perimeter is dead, but not the perimeters we have built up between teams Operations, Architecture, Development, Security Security is all about perimeters so ours are the worst. Department of no One practical way to break down is use same tools
  • #28 https://upload.wikimedia.org/wikipedia/commons/9/92/1919_Ford_Model_T_Highboy_Coupe.jpg https://upload.wikimedia.org/wikipedia/commons/2/29/Ford_assembly_line_-_1913.jpg https://upload.wikimedia.org/wikipedia/commons/1/18/Henry_ford_1919.jpg
  • #33 http://pixabay.com/p-97849/?no_redirect
  • #34 http://pixabay.com/p-97849/?no_redirect
  • #35 http://pixabay.com/p-97849/?no_redirect
  • #36 http://pixabay.com/p-97849/?no_redirect
  • #40 https://upload.wikimedia.org/wikipedia/commons/a/a7/Frankenstein%27s_monster_%28Boris_Karloff%29.jpg http://ia.media-imdb.com/images/M/MV5BMjM3Mzk2MDU3N15BMl5BanBnXkFtZTgwMzg1NTI4MDE@._V1_SX640_SY720_.jpg
  • #42 http://pixabay.com/p-97849/?no_redirect
  • #49 http://pixabay.com/p-97849/?no_redirect