SlideShare uma empresa Scribd logo
1 de 45
MOTHER
NATURE
JAVA
The Security Face-Off
Why us?
Grace Jansen
Developer Advocate @IBM
@gracejansen27
Steve Poole
Developer Advocate @Sonatype
@spoole167
This talk is intended to
help you think more deeply
about security
Using examples from biology
no humans were hurt in the making of this presentation
Evolution has had billions of years to develop amazing
defenses - what can we learn?
Threats and Challenges - a quick
intro into the bad actors and pesky
microbes
Prevention is better than cure -
how to not get ill in the first place
Detection - knowing you’re infected
is the first step to getting healthy
Mitigation - What should you do to
limit the damage
Outline
Bad actors are trying to get into your
systems using the most sophisticated
methods
Drive by attacks still happen
Ransomware attacks still happen
That will be
6 Trillion $
Now it’s about supply chains and cyber war
The aim is to infiltrate infrastructure and essential
services…
To manipulate, terminate or disrupt
We’re all part of a supply chain.
Whatever their motivations - bad actors intend to:
go through your system to another (and repeat)
steal your data change your data crash your systems use your compute
power
How does that compare to real life - what do
biological bad actors want from us?
Biological bad actors
Viruses Bacteria
Fungus
- Use as a host
- To replicate and grow
- To infect others
- Parasitic for own benefit
Parasitic Worms Protozoa
Whether human or otherwise the bad actors have much in common.
Go through your system to another (and repeat)
Steal your data Change your data Crash your systems Use your compute power
Steal your resources
Go through you to access others (and repeat)
Take control of your
systems
Steal your energy reserves
Edit your DNA
vs vs vs vs
vs
ROUND 1: PREVENTION
Biology: Prevention
Skin
Minimal orifices
Extra defences at openings
Developed enhanced senses
Cell identification - flags
Scabs for wounds
Homeostasis
Behavioural changes
https://microbenotes.com/anatomical-barriers-of-immune-system-skin-and-mucus/
Software Prevention
API Gateways
reduce chance of
inadvertent extra
entry points.
Security checks and Input validation
prevents crude intrusion and manipulation
attacks.
Dependency
management tools -
keeping current is like
being vaccinated.
Nowadays there are nasty
vulnerabilities out there
Automated, high speed
CI/CD keeps the vulnerability
window a small as possible
It’s a DRAW
Summary
Biology vs Software? A draw if you take software
security seriously
Skin
Minimal orifices
Extra defences at openings
Developed enhanced
senses
Cell identification - flags
Behavioural changes
Scabs for wounds
Homeostasis
Developers may not be the first line of
defence but they are key to prevention
Basic security hygiene must be something
you just do like washing hands.
All elements of software lifecycle requires
attention.
ROUND 2: DETECTION
Biology: Detection - billions of years of tuning
Foreign body detection:
White blood cells, Antibodies, etc
Rapid Learning
Extra protection -> vaccines
Cell self-signalling (self-destruction)
Other detection:
Pain and deferred pain
Are painkillers good?
Software detection
Without specific tools in place only ‘gross’ events are visible
System
crashes
Complaints
about
performance
Ransomware Data on the
dark web
Other tools help
Specific monitoring software can help
spot attacks
AI powered tools are learning to spot
more sophisticated attack patterns
Unexpected resource usage can be
flagged.
Mostly it’s still indirect pain.
We don’t write applications to have pain
sensors
Round 2 Winner: Biology
Detection summary
Biology wins hands down.
Detection is needed to take action, guide autonomic
processes. Keep organisms alive and healthy
Simple next steps
1 - investigate the monitoring solutions available
2 - Instrument applications so that unexpected, unlikely
behavior is recorded.
A dull ache is better than nothing
ROUND 3: MITIGATION
Biology: Mitigation
Vaccines
Adaptive immune system (learning)
Make body less habitable
Getting rid of foreign cells
Coat DNA with molecules that suppress viral
genes
Limit access through the body
Patrol access routes
Mitigation - You do follow secure design principles?
•Minimize attack surface area
•Establish secure defaults
•Principle of Least privilege
•Principle of Defense in depth
•Fail securely
•Don’t trust services
•Separation of duties
•Avoid security by obscurity
•Keep security simple
•Fix security issues correctly
www.owasp.org
“Security by Design Principles”
Code
defensively.
Code quality
matters.
Reduce your data output and organize by
usecase
/api/v1/Users/1 /api/v1/UserDelivery/1
Reduce raw data being returned
/api/v1/Calendar/1?from=01122019
/api/v1/Calendar/1
Authorisation should match use cases - not super powers
no
powers
all
powers
/api/v1/Users
/api/v1/UserDelivery
/api/v1/Calendar
/api/v1/UserDelivery
/api/v1/Users /api/v1/Calendar
Delivery powers
Support powers Schedule powers
Mitigation - report unexpected behavior
Microservices may often be “stateless’ but the data is
not.
Think about how the client is expected to change their
state and log deviations.
Think wide - not all attacks come from one IP address.
Can you spot a botnet trying to authenticate with the
same userid from 1M computers?
(Tip) Be careful about the amount of extra info in a log – remember the bad guys may
gain access to them too
Mitigation - handle errors intelligently
try {
…
} catch(Exception e) {
// io error
expected so
ignore
}
try {
…
} catch(FileNotFoundException e1) {
log.debug(“file requested does not exist);
} catch(IOException e2) {
log.error(“unexpected …”);
}
Mitigation - test your dependencies
Keep checking the features you rely on to do the job.
90% of modern applications are open source
Open Source projects that have poor security
hygiene are primary targets for hackers.
(Tip: select dependencies for their good practises as
well as their feature sets)
https://twitter.com/JiliJeanlouis/status/1504737634379345924
How long before exploitation?
How much notice do you get before you get attacked?
How much notice do you get before you get attacked?
Is closed!
Round 3 Winner: Biology
Mitigation Summary
For software the consequences for failure are
getting higher
Our mitigation strategies need to keep pace.
Biology has strong, adaptive mitigation strategies.
Critical for changing environment - attacks are
inevitable and ever-changing
Serious consequences if this fails. No reboots.
And the winner is….
MOTHER NATURE
Takeways
Living organisms have evolved to be robust and adaptable to deal with external
threats.
Java applications can do the same.
Design for defence in depth: validate inputs, highlight unexpected behavior, keep
dependencies up to date. Take a Zero trust approach.
Take time to understand the security measures around your application and work
with them.
An application is just one cell in the system - make it an effective one
Useful Links
● https://openliberty.io/guides/#security
● https://www.ibm.com/docs/en/was-liberty/base?topic=securing-liberty-its-
applications
● https://dev.sonatype.com/
● https://www.owasp.org/index.php/Security_by_Design_Principles#Security_prin
ciples
Thank you!
Grace Jansen
Developer Advocate @IBM
@gracejansen27 Steve Poole
Developer Advocate @Sonatype
@spoole167

Mais conteúdo relacionado

Semelhante a JavaZone_Mother Nature vs Java – the security face off.pptx

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)Manuel Mejías
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208Manuel Mejías
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk judythornell
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxwoodruffeloisa
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxaryan532920
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxbartholomeocoombs
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemCyphort
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and societyAzmiah Mahmud
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and societyShuren Lew
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
Whittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest IrelandWhittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest IrelandDavid O'Dowd
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 

Semelhante a JavaZone_Mother Nature vs Java – the security face off.pptx (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security Ecosystem
 
smpef
smpefsmpef
smpef
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
NetWitness
NetWitnessNetWitness
NetWitness
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
Whittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest IrelandWhittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest Ireland
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 

Mais de Grace Jansen

JPrime_JITServer.pptx
JPrime_JITServer.pptxJPrime_JITServer.pptx
JPrime_JITServer.pptxGrace Jansen
 
SwissJUG_15_factor_app.pptx
SwissJUG_15_factor_app.pptxSwissJUG_15_factor_app.pptx
SwissJUG_15_factor_app.pptxGrace Jansen
 
SwissJUG_Bringing the cloud back down to earth.pptx
SwissJUG_Bringing the cloud back down to earth.pptxSwissJUG_Bringing the cloud back down to earth.pptx
SwissJUG_Bringing the cloud back down to earth.pptxGrace Jansen
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxGrace Jansen
 
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earthPittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earthGrace Jansen
 
Javaland_JITServerTalk.pptx
Javaland_JITServerTalk.pptxJavaland_JITServerTalk.pptx
Javaland_JITServerTalk.pptxGrace Jansen
 
JavaLand_To InstantOn and Beyond.pptx
JavaLand_To InstantOn and Beyond.pptxJavaLand_To InstantOn and Beyond.pptx
JavaLand_To InstantOn and Beyond.pptxGrace Jansen
 
Jfokus_Bringing the cloud back down to earth.pptx
Jfokus_Bringing the cloud back down to earth.pptxJfokus_Bringing the cloud back down to earth.pptx
Jfokus_Bringing the cloud back down to earth.pptxGrace Jansen
 
FooConf23_Bringing the cloud back down to earth.pptx
FooConf23_Bringing the cloud back down to earth.pptxFooConf23_Bringing the cloud back down to earth.pptx
FooConf23_Bringing the cloud back down to earth.pptxGrace Jansen
 
DevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxDevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxGrace Jansen
 
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxUtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxGrace Jansen
 
JCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptxJCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptxGrace Jansen
 
JCON_Adressing the transaction challenge in a cloud-native world.pptx
JCON_Adressing the transaction challenge in a cloud-native world.pptxJCON_Adressing the transaction challenge in a cloud-native world.pptx
JCON_Adressing the transaction challenge in a cloud-native world.pptxGrace Jansen
 
JavaZone_Addressing the transaction challenge in a cloud-native world.pptx
JavaZone_Addressing the transaction challenge in a cloud-native world.pptxJavaZone_Addressing the transaction challenge in a cloud-native world.pptx
JavaZone_Addressing the transaction challenge in a cloud-native world.pptxGrace Jansen
 
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptx
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptxBoost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptx
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptxGrace Jansen
 
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022Grace Jansen
 
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptx
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptxJBCNConf_Addressing_The_Transaction_Challenge_LRA.pptx
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptxGrace Jansen
 
2022-Devnexus-StatefulMicroservices.pptx.pdf
2022-Devnexus-StatefulMicroservices.pptx.pdf2022-Devnexus-StatefulMicroservices.pptx.pdf
2022-Devnexus-StatefulMicroservices.pptx.pdfGrace Jansen
 
How to become a superhero without even leaving your desk!
How to become a superhero without even leaving your desk!How to become a superhero without even leaving your desk!
How to become a superhero without even leaving your desk!Grace Jansen
 
Devoxx Ukraine - Going beyond the 12 factors
Devoxx Ukraine - Going beyond the 12 factorsDevoxx Ukraine - Going beyond the 12 factors
Devoxx Ukraine - Going beyond the 12 factorsGrace Jansen
 

Mais de Grace Jansen (20)

JPrime_JITServer.pptx
JPrime_JITServer.pptxJPrime_JITServer.pptx
JPrime_JITServer.pptx
 
SwissJUG_15_factor_app.pptx
SwissJUG_15_factor_app.pptxSwissJUG_15_factor_app.pptx
SwissJUG_15_factor_app.pptx
 
SwissJUG_Bringing the cloud back down to earth.pptx
SwissJUG_Bringing the cloud back down to earth.pptxSwissJUG_Bringing the cloud back down to earth.pptx
SwissJUG_Bringing the cloud back down to earth.pptx
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptx
 
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earthPittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
 
Javaland_JITServerTalk.pptx
Javaland_JITServerTalk.pptxJavaland_JITServerTalk.pptx
Javaland_JITServerTalk.pptx
 
JavaLand_To InstantOn and Beyond.pptx
JavaLand_To InstantOn and Beyond.pptxJavaLand_To InstantOn and Beyond.pptx
JavaLand_To InstantOn and Beyond.pptx
 
Jfokus_Bringing the cloud back down to earth.pptx
Jfokus_Bringing the cloud back down to earth.pptxJfokus_Bringing the cloud back down to earth.pptx
Jfokus_Bringing the cloud back down to earth.pptx
 
FooConf23_Bringing the cloud back down to earth.pptx
FooConf23_Bringing the cloud back down to earth.pptxFooConf23_Bringing the cloud back down to earth.pptx
FooConf23_Bringing the cloud back down to earth.pptx
 
DevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxDevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptx
 
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxUtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
 
JCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptxJCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptx
 
JCON_Adressing the transaction challenge in a cloud-native world.pptx
JCON_Adressing the transaction challenge in a cloud-native world.pptxJCON_Adressing the transaction challenge in a cloud-native world.pptx
JCON_Adressing the transaction challenge in a cloud-native world.pptx
 
JavaZone_Addressing the transaction challenge in a cloud-native world.pptx
JavaZone_Addressing the transaction challenge in a cloud-native world.pptxJavaZone_Addressing the transaction challenge in a cloud-native world.pptx
JavaZone_Addressing the transaction challenge in a cloud-native world.pptx
 
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptx
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptxBoost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptx
Boost developer productivity with EE, MP and OL (Devoxx Ukraine 22).pptx
 
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022
Addressing the transaction challenge in a cloud-native world Devoxx Ukraine 2022
 
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptx
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptxJBCNConf_Addressing_The_Transaction_Challenge_LRA.pptx
JBCNConf_Addressing_The_Transaction_Challenge_LRA.pptx
 
2022-Devnexus-StatefulMicroservices.pptx.pdf
2022-Devnexus-StatefulMicroservices.pptx.pdf2022-Devnexus-StatefulMicroservices.pptx.pdf
2022-Devnexus-StatefulMicroservices.pptx.pdf
 
How to become a superhero without even leaving your desk!
How to become a superhero without even leaving your desk!How to become a superhero without even leaving your desk!
How to become a superhero without even leaving your desk!
 
Devoxx Ukraine - Going beyond the 12 factors
Devoxx Ukraine - Going beyond the 12 factorsDevoxx Ukraine - Going beyond the 12 factors
Devoxx Ukraine - Going beyond the 12 factors
 

Último

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Último (20)

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

JavaZone_Mother Nature vs Java – the security face off.pptx

  • 2. Why us? Grace Jansen Developer Advocate @IBM @gracejansen27 Steve Poole Developer Advocate @Sonatype @spoole167
  • 3. This talk is intended to help you think more deeply about security Using examples from biology no humans were hurt in the making of this presentation
  • 4. Evolution has had billions of years to develop amazing defenses - what can we learn?
  • 5. Threats and Challenges - a quick intro into the bad actors and pesky microbes Prevention is better than cure - how to not get ill in the first place Detection - knowing you’re infected is the first step to getting healthy Mitigation - What should you do to limit the damage Outline
  • 6. Bad actors are trying to get into your systems using the most sophisticated methods
  • 7. Drive by attacks still happen
  • 8. Ransomware attacks still happen That will be 6 Trillion $
  • 9. Now it’s about supply chains and cyber war The aim is to infiltrate infrastructure and essential services…
  • 10. To manipulate, terminate or disrupt We’re all part of a supply chain.
  • 11. Whatever their motivations - bad actors intend to: go through your system to another (and repeat) steal your data change your data crash your systems use your compute power
  • 12. How does that compare to real life - what do biological bad actors want from us?
  • 13. Biological bad actors Viruses Bacteria Fungus - Use as a host - To replicate and grow - To infect others - Parasitic for own benefit Parasitic Worms Protozoa
  • 14.
  • 15. Whether human or otherwise the bad actors have much in common. Go through your system to another (and repeat) Steal your data Change your data Crash your systems Use your compute power Steal your resources Go through you to access others (and repeat) Take control of your systems Steal your energy reserves Edit your DNA vs vs vs vs vs
  • 17. Biology: Prevention Skin Minimal orifices Extra defences at openings Developed enhanced senses Cell identification - flags Scabs for wounds Homeostasis Behavioural changes https://microbenotes.com/anatomical-barriers-of-immune-system-skin-and-mucus/
  • 18. Software Prevention API Gateways reduce chance of inadvertent extra entry points. Security checks and Input validation prevents crude intrusion and manipulation attacks. Dependency management tools - keeping current is like being vaccinated. Nowadays there are nasty vulnerabilities out there Automated, high speed CI/CD keeps the vulnerability window a small as possible
  • 20. Summary Biology vs Software? A draw if you take software security seriously Skin Minimal orifices Extra defences at openings Developed enhanced senses Cell identification - flags Behavioural changes Scabs for wounds Homeostasis Developers may not be the first line of defence but they are key to prevention Basic security hygiene must be something you just do like washing hands. All elements of software lifecycle requires attention.
  • 22. Biology: Detection - billions of years of tuning Foreign body detection: White blood cells, Antibodies, etc Rapid Learning Extra protection -> vaccines Cell self-signalling (self-destruction) Other detection: Pain and deferred pain Are painkillers good?
  • 23. Software detection Without specific tools in place only ‘gross’ events are visible System crashes Complaints about performance Ransomware Data on the dark web
  • 24. Other tools help Specific monitoring software can help spot attacks AI powered tools are learning to spot more sophisticated attack patterns Unexpected resource usage can be flagged. Mostly it’s still indirect pain. We don’t write applications to have pain sensors
  • 25. Round 2 Winner: Biology
  • 26. Detection summary Biology wins hands down. Detection is needed to take action, guide autonomic processes. Keep organisms alive and healthy Simple next steps 1 - investigate the monitoring solutions available 2 - Instrument applications so that unexpected, unlikely behavior is recorded. A dull ache is better than nothing
  • 28. Biology: Mitigation Vaccines Adaptive immune system (learning) Make body less habitable Getting rid of foreign cells Coat DNA with molecules that suppress viral genes Limit access through the body Patrol access routes
  • 29. Mitigation - You do follow secure design principles? •Minimize attack surface area •Establish secure defaults •Principle of Least privilege •Principle of Defense in depth •Fail securely •Don’t trust services •Separation of duties •Avoid security by obscurity •Keep security simple •Fix security issues correctly www.owasp.org “Security by Design Principles”
  • 31. Reduce your data output and organize by usecase /api/v1/Users/1 /api/v1/UserDelivery/1
  • 32. Reduce raw data being returned /api/v1/Calendar/1?from=01122019 /api/v1/Calendar/1
  • 33. Authorisation should match use cases - not super powers no powers all powers /api/v1/Users /api/v1/UserDelivery /api/v1/Calendar /api/v1/UserDelivery /api/v1/Users /api/v1/Calendar Delivery powers Support powers Schedule powers
  • 34. Mitigation - report unexpected behavior Microservices may often be “stateless’ but the data is not. Think about how the client is expected to change their state and log deviations. Think wide - not all attacks come from one IP address. Can you spot a botnet trying to authenticate with the same userid from 1M computers? (Tip) Be careful about the amount of extra info in a log – remember the bad guys may gain access to them too
  • 35. Mitigation - handle errors intelligently try { … } catch(Exception e) { // io error expected so ignore } try { … } catch(FileNotFoundException e1) { log.debug(“file requested does not exist); } catch(IOException e2) { log.error(“unexpected …”); }
  • 36. Mitigation - test your dependencies Keep checking the features you rely on to do the job. 90% of modern applications are open source Open Source projects that have poor security hygiene are primary targets for hackers. (Tip: select dependencies for their good practises as well as their feature sets) https://twitter.com/JiliJeanlouis/status/1504737634379345924
  • 37. How long before exploitation?
  • 38. How much notice do you get before you get attacked?
  • 39. How much notice do you get before you get attacked? Is closed!
  • 40. Round 3 Winner: Biology
  • 41. Mitigation Summary For software the consequences for failure are getting higher Our mitigation strategies need to keep pace. Biology has strong, adaptive mitigation strategies. Critical for changing environment - attacks are inevitable and ever-changing Serious consequences if this fails. No reboots.
  • 42. And the winner is…. MOTHER NATURE
  • 43. Takeways Living organisms have evolved to be robust and adaptable to deal with external threats. Java applications can do the same. Design for defence in depth: validate inputs, highlight unexpected behavior, keep dependencies up to date. Take a Zero trust approach. Take time to understand the security measures around your application and work with them. An application is just one cell in the system - make it an effective one
  • 44. Useful Links ● https://openliberty.io/guides/#security ● https://www.ibm.com/docs/en/was-liberty/base?topic=securing-liberty-its- applications ● https://dev.sonatype.com/ ● https://www.owasp.org/index.php/Security_by_Design_Principles#Security_prin ciples
  • 45. Thank you! Grace Jansen Developer Advocate @IBM @gracejansen27 Steve Poole Developer Advocate @Sonatype @spoole167