SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Prove it!
The last mile for DevOps in regulated organizations
Bill Shinn
AWS Principal Security Solutions Architect
#DOES15
Session Goals
Identify Blockers and Friction
Partnership
Control Design
Control Evidence - Proofs!
#DOES14 Research Agenda
Better strategies and tactics for creating automated tests for legacy applications
Addressing culture and leadership aspects during transforming
Top approaches to organizational design, roles and responsibilities
Information security and compliance practices
Identifying metrics to best improve performance with DevOps initiatives.
#DOES14 Research Agenda
Addressing culture and leadership aspects during transforming
Top approaches to organizational design, roles and responsibilities
Information security and compliance practices
Pierre de Fermat
(~1601 - 1665)
xn + yn = zn
has no whole number solution for n greater
than 2
Fermat’s Last Theorem
Fermat’s Last Theorem
“I have a truly marvelous demonstration of the
proposition which this margin is too narrow to
contain.”
Sir Andrew John Wiles
(1953 - )
First encounters Fermat’s Last Theorem
at age 10
“I loved doing the problems in school. I’d
take them home and make up new ones on
my own.”
(Fermat’s Enigma - Simon Singh 1997, Walker Publishing, Inc)
Andrew Wiles
Sir Andrew John Wiles
(1953 - )
Spends 7 years working in isolation
Produces a 200-page proof
(Fermat’s Enigma - Simon Singh 1997, Walker Publishing, Inc)
Andrew Wiles
Learning from Fermat’s Last Theorem:
Friction in DevOps & Compliance
Write down the proof - controls and control evidence is sprints.
Don’t work in isolation. Share.
People will criticize.
Everyone reads each others proofs. (NIST 800-53 vs. Data Flows & Code)
Perseverance pays off.
Heliocentrism
Disproved that servers are not the center of
the universe
Spent remaining years of his life under
house arrest trying to Prove It.
Learning from Galileo:
Friction in DevOps & Compliance
The world does not revolve around servers.
Policies might not accommodate changes to Ops.
Tides: it’s ok to iterate….
John Harrison
(1693 - 1776)
Longitude
Goes head-to-head with
Astronomer Royal
Humble clock maker, hacker
Relatively short sprints.
Learning from Longitude:
Friction in DevOps & Compliance
Makers win.
Defer to expertise, not auhority.
Optimism pays off.
Don’t get lost at sea. Automate your navigation.
The Security Rule is located at 45 CFR Part 160 and
Subparts A and C of Part 164.
Title 45 of the Code of Federal Regulations – Public Welfare
Subtitle A - Health and Human Services
Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED
REQUIREMENTS
Part 160 - General Administrative Requirements
Part 164 - Security and Privacy
Subpart C - Security Standards for the Protection of Electronic Protected Health Information
Section 164.308 - Administrative Safeguards
Section 164.310 - Physical Safeguards
Section 164.312 - Technical Safeguards
164.312(b)(2) – Standard: Audit Controls
Section 164.314 - Organizational Safeguards
Deriving Engineering from Regulations
164.312 (b)(2) Standard: Audit Controls
Implement hardware, software, and/or procedural
mechanisms that *record and examine activity* in
information systems that contain or use electronic
protected health information.
Deriving Engineering from Regulations
§164.312(b):
Key Activity
Determine the Activities that Will be Tracked or Audited
Audit Procedures
Inquire of management as to whether audit controls have been implemented over information systems that
contain or use ePHI. Obtain and review documentation relative to the specified criteria to determine whether
audit controls have been implemented over information systems that contain or use ePHI.
Key Activity
Select the Tools that Will be Deployed for Auditing and System Activity Reviews
Audit Procedures
Inquire of management as to whether systems and applications have been evaluated to determine whether
upgrades are necessary to implement audit capabilities. Obtain and review documentation of tools or
applications that management has identified to capture the appropriate audit information.
Section 164.314 - Organizational Safeguards
Deriving Engineering from Regulations
Audit Controls 164.308(b)(2) – OCR Audit
Protocol
Something you have to do.
§164.312(b):
Key Activity
Determine the Activities that Will be Tracked or Audited
Audit Procedures
Inquire of management as to whether audit controls have been implemented over information systems that contain or use
ePHI. Obtain and review documentation relative to the specified criteria to determine whether audit controls have been
implemented over information systems that contain or use ePHI.
Key Activity
Select the Tools that Will be Deployed for Auditing and System Activity Reviews
Audit Procedures
Inquire of management as to whether systems and applications have been evaluated to determine whether upgrades are
necessary to implement audit capabilities. Obtain and review documentation of tools or applications that management has
identified to capture the appropriate audit information.
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Determine the Activities
EC2 CloudTrail Events
AttachVolume
AuthorizeSecurityGroupIngress
CopySnapshot
CreateNetworkAclEntry
CreateSnapshot
DeleteSnapshot
DeleteTags
DeleteVolume
TerminateInstance
RDS CloudTrail Events
AuthorizeDBSecurityGroupIngress
CopyDBSnapshot
CreateDBSnapshot
DeleteDBInstance
DeleteDBSnapshot
ModifyDBInstance
DynamoDB CloudTrail Events
DeleteTable
UpdateTable
Amazon Redshift CloudTrail Events
AuthorizeClusterSecurityGroupIngress
CopyClusterSnapshot
CreateClusterSnapshot
DeleteCluster
DeleteClusterSnapshot
DisableLogging
Amazon Glacier CloudTrail Events
DeleteArchive
DeleteVault
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Document Implementation
Capture CloudTrail Configuration (CLI Example)
$ aws cloudtrail describe-trails
{
"trailList": [
{
"IncludeGlobalServiceEvents": true,
"Name": "Default",
"S3KeyPrefix": ”CloudTrail",
"S3BucketName": "us-east-1.logging",
"CloudWatchLogsRoleArn": "arn:aws:iam::663354267581:role/
CloudTrail_CloudWatchLogs_Role",
"CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:663354267581:log-
group:CloudTrail/us-east-1-LogGroup:*"
}
]
}
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Select the Tools
CloudTrail CloudWatch Logs Amazon
Kinesis
CloudWatch
Logs
subscription
consumer 

(KCL-based)
ELK
CloudWatch
Logs
subscription
Amazon EC2 +

CloudWatch
Logs agent
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Select the Tools
CloudWatch Logs Amazon
Kinesis
CloudWatch
Logs
subscription
LogGroup-CloudTrail/Stream1
LogGroup-CWL-syslog/instance-1
LogGroup-CWL-syslog/instance-2
LogGroup-CWL-customApp/instance-3
[…]
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Select the Tools
CloudTrail CloudWatch Logs
CloudWatch
Logs
subscription
Amazon EC2 +

CloudWatch
Logs agent
Amazon
Elasticsearch
Service
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Document Implementation
§164.312(b):
Key Activity
Select the Tools that Will be Deployed for Auditing and System Activity Reviews
Audit Procedures
[…] Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information.
$ aws logs describe-log-groups --log-group-name-prefix "CloudTrail"
{
"logGroups": [
{
"arn": "arn:aws:logs:us-east-1:663354267581:log-group:CloudTrail/us-east-1-LogGroup:*",
"creationTime": 1439155915783,
"metricFilterCount": 0,
"logGroupName": "CloudTrail/us-east-1-LogGroup",
"storedBytes": 411573
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Document Implementation
§164.312(b):
Audit Procedures
[…] Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information.
$ aws logs describe-subscription-filters --log-group-name CloudTrail/us-east-1-LogGroup
{
"subscriptionFilters": [
{
"filterPattern": "",
"filterName": "cwl-cfn-es-CWL-Elasticsearch-KinesisSubscriptionStream-1KSJUFTUP6K5K",
"roleArn": "arn:aws:iam::663354267581:role/CWL-Elasticsearch-
CloudWatchLogsKinesisRole-4DVR5UWI4QBR",
"creationTime": 1439157386140,
"logGroupName": "CloudTrail/us-east-1-LogGroup",
"destinationArn": "arn:aws:kinesis:us-east-1:663354267581:stream/CWL-Elasticsearch-
KinesisSubscriptionStream-1KSJUFTUP6K5K"
Audit Controls 164.312(b)(2) – OCR Audit
Protocol – Activity Reviews
Similar Controls
PCI DSS 3.1 Requirement 10.1 - 10.8 — Track and monitor all
access to network resources and cardholder data.
NIST 800-53r4 (AU-1 - AU-16) Audit and Accountability Controls
ISO 27001 A.10.10 - Monitoring - Objective: To detect
unauthorized information processing activities.
Additional Resources
The DevOps Audit Defense Tool Kit (http://itrevolution.com/devops-and-auditors-the-devops-audit-defense-toolkit/)
AWS re:Invent SEC310 - Splitting the Check on Compliance and Security: Keeping Developers and Auditors Happy in the Cloud - Jason Chan,
Engineering Director @NetFlix, October 2015 (https://youtu.be/Io00_K4v12Y)
AWS Secure By Design - Collection of guidance and templates to automate security, compliance and governance on AWS
(http://aws.amazon.com/compliance/security-by-design/)
Singh, S. (1997). Fermat's enigma: The epic quest to solve the world's greatest mathematical problem. New York: Walker.
Sobel, D. (1995). Longitude: The true story of a lone genius who solved the greatest scientific problem of his time. New York: Walker.
Sobel, D. (1999). Galileo's daughter: A historical memoir of science, faith, and love. New York: Walker
Thank You!
Bill Shinn - billshin@amazon.com
@packet791

Mais conteúdo relacionado

Mais procurados

Dev ops continuousdeliveryforcloudproduct
Dev ops continuousdeliveryforcloudproductDev ops continuousdeliveryforcloudproduct
Dev ops continuousdeliveryforcloudproductGopinath Ramachandran
 
What is DevOps? - ITSM Academy Webinar
What is DevOps?  - ITSM Academy Webinar What is DevOps?  - ITSM Academy Webinar
What is DevOps? - ITSM Academy Webinar ITSM Academy, Inc.
 
Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4Aswin Kumar
 
DevOps Transformation - Another View
DevOps Transformation - Another ViewDevOps Transformation - Another View
DevOps Transformation - Another ViewAgron Fazliu
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...InfoSeption
 
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-WilliamsDynatrace
 
Intro to dev ops and cloud services
Intro to dev ops and cloud servicesIntro to dev ops and cloud services
Intro to dev ops and cloud serviceshardwyrd
 
Tech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps TransformationTech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps TransformationCA Technologies
 
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation Gene Kim
 
Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsTechWell
 
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...Puppet
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015Bob Sokol
 
The Evolution of Test Automation for DevOps
The Evolution of Test Automation for DevOpsThe Evolution of Test Automation for DevOps
The Evolution of Test Automation for DevOpsTEST Huddle
 
Dev ops lessons learned - Michael Collins
Dev ops lessons learned  - Michael CollinsDev ops lessons learned  - Michael Collins
Dev ops lessons learned - Michael CollinsDevopsdays
 
DevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than TechnologyDevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than TechnologyCA Technologies
 
Continuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QAContinuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QAJeff Sussna
 

Mais procurados (20)

Dev ops continuousdeliveryforcloudproduct
Dev ops continuousdeliveryforcloudproductDev ops continuousdeliveryforcloudproduct
Dev ops continuousdeliveryforcloudproduct
 
What is DevOps? - ITSM Academy Webinar
What is DevOps?  - ITSM Academy Webinar What is DevOps?  - ITSM Academy Webinar
What is DevOps? - ITSM Academy Webinar
 
Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4Blueprinting DevOps for Digital Transformation_v4
Blueprinting DevOps for Digital Transformation_v4
 
DevOps Transformation - Another View
DevOps Transformation - Another ViewDevOps Transformation - Another View
DevOps Transformation - Another View
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
 
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
 
Continuous Delivery Maturity Model
Continuous Delivery Maturity ModelContinuous Delivery Maturity Model
Continuous Delivery Maturity Model
 
Intro to dev ops and cloud services
Intro to dev ops and cloud servicesIntro to dev ops and cloud services
Intro to dev ops and cloud services
 
Tech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps TransformationTech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps Transformation
 
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation
DOES15 - Sherry Chang - Intel’s Journey to Large Scale DevOps Transformation
 
DevOps: IT's Automation Revolution
DevOps: IT's Automation RevolutionDevOps: IT's Automation Revolution
DevOps: IT's Automation Revolution
 
Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOps
 
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...
Demystifying DevOps for Ops - Including Findings from the 2015 State of DevOp...
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015
 
The Evolution of Test Automation for DevOps
The Evolution of Test Automation for DevOpsThe Evolution of Test Automation for DevOps
The Evolution of Test Automation for DevOps
 
Dev ops lessons learned - Michael Collins
Dev ops lessons learned  - Michael CollinsDev ops lessons learned  - Michael Collins
Dev ops lessons learned - Michael Collins
 
DevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than TechnologyDevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than Technology
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
 
Devops skills you got what it takes ?
Devops skills   you got what it takes ?Devops skills   you got what it takes ?
Devops skills you got what it takes ?
 
Continuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QAContinuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QA
 

Destaque

Mobility in Retail - Market Research by RapidValue Solutions
Mobility in Retail - Market Research by RapidValue SolutionsMobility in Retail - Market Research by RapidValue Solutions
Mobility in Retail - Market Research by RapidValue SolutionsRapidValue
 
Business Intelligence Application
Business Intelligence ApplicationBusiness Intelligence Application
Business Intelligence ApplicationHendra Saputra
 
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive ScaleAmazon Web Services
 
Docker Container Security - A Network View
Docker Container Security - A Network ViewDocker Container Security - A Network View
Docker Container Security - A Network ViewNeuVector
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityAmazon Web Services
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQANQA
 
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)Amazon Web Services
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Architecting for the Cloud: Best Practices
Architecting for the Cloud: Best PracticesArchitecting for the Cloud: Best Practices
Architecting for the Cloud: Best PracticesAmazon Web Services
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic ManagementFarhaad Sheikh
 
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)Amazon Web Services
 
Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013Fabernovel
 

Destaque (16)

Mobility in Retail - Market Research by RapidValue Solutions
Mobility in Retail - Market Research by RapidValue SolutionsMobility in Retail - Market Research by RapidValue Solutions
Mobility in Retail - Market Research by RapidValue Solutions
 
Business Intelligence Application
Business Intelligence ApplicationBusiness Intelligence Application
Business Intelligence Application
 
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
 
Docker Container Security - A Network View
Docker Container Security - A Network ViewDocker Container Security - A Network View
Docker Container Security - A Network View
 
Brief Security Overview
Brief Security OverviewBrief Security Overview
Brief Security Overview
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQA
 
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Architecting for the Cloud: Best Practices
Architecting for the Cloud: Best PracticesArchitecting for the Cloud: Best Practices
Architecting for the Cloud: Best Practices
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic Management
 
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
 
Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013
 

Semelhante a DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organizations

Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018
Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018
Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018Amazon Web Services
 
An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178BAdaCore
 
Continuous compliance using data and code
Continuous compliance using data and codeContinuous compliance using data and code
Continuous compliance using data and codeErkang Zheng
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
Dev confus.2020 compliance operator
Dev confus.2020 compliance operatorDev confus.2020 compliance operator
Dev confus.2020 compliance operatorjaormx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...XebiaLabs
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
Continuous Monitoring Deck
Continuous Monitoring DeckContinuous Monitoring Deck
Continuous Monitoring DeckBrian Fennimore
 
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATO
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATOAUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATO
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATOAsmaranies Harun
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesSaurabh Rai
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingPrecisely
 
Agile Development in a Regulated Environment
Agile Development in a Regulated EnvironmentAgile Development in a Regulated Environment
Agile Development in a Regulated EnvironmentTechWell
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Software audiit information management
Software audiit   information managementSoftware audiit   information management
Software audiit information managementHallmark B-school
 

Semelhante a DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organizations (20)

Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018
Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018
Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018
 
An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178B
 
Continuous compliance using data and code
Continuous compliance using data and codeContinuous compliance using data and code
Continuous compliance using data and code
 
HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Dev confus.2020 compliance operator
Dev confus.2020 compliance operatorDev confus.2020 compliance operator
Dev confus.2020 compliance operator
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
Continuous Monitoring Deck
Continuous Monitoring DeckContinuous Monitoring Deck
Continuous Monitoring Deck
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATO
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATOAUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATO
AUDIT PROGRAM LOGICAL SECURITY BY LANCE M TURCATO
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and Reporting
 
Agile Development in a Regulated Environment
Agile Development in a Regulated EnvironmentAgile Development in a Regulated Environment
Agile Development in a Regulated Environment
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Software audiit information management
Software audiit   information managementSoftware audiit   information management
Software audiit information management
 
Large Data Management Strategies
Large Data Management StrategiesLarge Data Management Strategies
Large Data Management Strategies
 

Mais de Gene Kim

DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...Gene Kim
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonGene Kim
 
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOpsDOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOpsGene Kim
 
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the EnterpriseDOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the EnterpriseGene Kim
 
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at ScaleDOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at ScaleGene Kim
 
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...Gene Kim
 
DOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to OpenDOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to OpenGene Kim
 
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, InitiativeDOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, InitiativeGene Kim
 
DOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream MappingDOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream MappingGene Kim
 
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding EdgeDOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding EdgeGene Kim
 
DOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital OneDOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital OneGene Kim
 
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?Gene Kim
 
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge ScaleDOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge ScaleGene Kim
 
DOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBsDOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBsGene Kim
 
DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet? DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet? Gene Kim
 
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the EnterpriseDOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the EnterpriseGene Kim
 
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...Gene Kim
 
DOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime DirectiveDOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime DirectiveGene Kim
 
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams Gene Kim
 
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...Gene Kim
 

Mais de Gene Kim (20)

DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
 
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOpsDOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
 
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the EnterpriseDOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
DOES SFO 2016 - Daniel Perez - Doubling Down on ChatOps in the Enterprise
 
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at ScaleDOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
DOES SFO 2016 - Greg Maxey and Laurent Rochette - DSL at Scale
 
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
DOES SFO 2016 - Rich Jackson & Rosalind Radcliffe - The Mainframe DevOps Team...
 
DOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to OpenDOES SFO 2016 - Greg Padak - Default to Open
DOES SFO 2016 - Greg Padak - Default to Open
 
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, InitiativeDOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
DOES SFO 2016 - Michael Nygard - Tempo, Maneuverability, Initiative
 
DOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream MappingDOES SFO 2016 - Alexa Alley - Value Stream Mapping
DOES SFO 2016 - Alexa Alley - Value Stream Mapping
 
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding EdgeDOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
DOES SFO 2016 - Mark Imbriaco - Lessons From the Bleeding Edge
 
DOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital OneDOES SFO 2016 - Topo Pal - DevOps at Capital One
DOES SFO 2016 - Topo Pal - DevOps at Capital One
 
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
DOES SFO 2016 - Cornelia Davis - DevOps: Who Does What?
 
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge ScaleDOES SFO 2016 - Avan Mathur - Planning for Huge Scale
DOES SFO 2016 - Avan Mathur - Planning for Huge Scale
 
DOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBsDOES SFO 2016 - Chris Fulton - CD for DBs
DOES SFO 2016 - Chris Fulton - CD for DBs
 
DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet? DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet?
 
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the EnterpriseDOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
DOES SFO 2016 - Steve Brodie - The Future of DevOps in the Enterprise
 
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
DOES SFO 2016 - Aimee Bechtle - Utilizing Distributed Dojos to Transform a Wo...
 
DOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime DirectiveDOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
DOES SFO 2016 - Ray Krueger - Speed as a Prime Directive
 
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
DOES SFO 2016 - Paula Thrasher & Kevin Stanley - Building Brilliant Teams
 
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organizations

  • 1. Prove it! The last mile for DevOps in regulated organizations Bill Shinn AWS Principal Security Solutions Architect #DOES15
  • 2. Session Goals Identify Blockers and Friction Partnership Control Design Control Evidence - Proofs!
  • 3. #DOES14 Research Agenda Better strategies and tactics for creating automated tests for legacy applications Addressing culture and leadership aspects during transforming Top approaches to organizational design, roles and responsibilities Information security and compliance practices Identifying metrics to best improve performance with DevOps initiatives.
  • 4. #DOES14 Research Agenda Addressing culture and leadership aspects during transforming Top approaches to organizational design, roles and responsibilities Information security and compliance practices
  • 5. Pierre de Fermat (~1601 - 1665) xn + yn = zn has no whole number solution for n greater than 2 Fermat’s Last Theorem
  • 6. Fermat’s Last Theorem “I have a truly marvelous demonstration of the proposition which this margin is too narrow to contain.”
  • 7. Sir Andrew John Wiles (1953 - ) First encounters Fermat’s Last Theorem at age 10 “I loved doing the problems in school. I’d take them home and make up new ones on my own.” (Fermat’s Enigma - Simon Singh 1997, Walker Publishing, Inc) Andrew Wiles
  • 8. Sir Andrew John Wiles (1953 - ) Spends 7 years working in isolation Produces a 200-page proof (Fermat’s Enigma - Simon Singh 1997, Walker Publishing, Inc) Andrew Wiles
  • 9. Learning from Fermat’s Last Theorem: Friction in DevOps & Compliance Write down the proof - controls and control evidence is sprints. Don’t work in isolation. Share. People will criticize. Everyone reads each others proofs. (NIST 800-53 vs. Data Flows & Code) Perseverance pays off.
  • 10. Heliocentrism Disproved that servers are not the center of the universe Spent remaining years of his life under house arrest trying to Prove It.
  • 11. Learning from Galileo: Friction in DevOps & Compliance The world does not revolve around servers. Policies might not accommodate changes to Ops. Tides: it’s ok to iterate….
  • 12. John Harrison (1693 - 1776) Longitude Goes head-to-head with Astronomer Royal Humble clock maker, hacker Relatively short sprints.
  • 13. Learning from Longitude: Friction in DevOps & Compliance Makers win. Defer to expertise, not auhority. Optimism pays off. Don’t get lost at sea. Automate your navigation.
  • 14. The Security Rule is located at 45 CFR Part 160 and Subparts A and C of Part 164. Title 45 of the Code of Federal Regulations – Public Welfare Subtitle A - Health and Human Services Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS Part 160 - General Administrative Requirements Part 164 - Security and Privacy Subpart C - Security Standards for the Protection of Electronic Protected Health Information Section 164.308 - Administrative Safeguards Section 164.310 - Physical Safeguards Section 164.312 - Technical Safeguards 164.312(b)(2) – Standard: Audit Controls Section 164.314 - Organizational Safeguards Deriving Engineering from Regulations
  • 15. 164.312 (b)(2) Standard: Audit Controls Implement hardware, software, and/or procedural mechanisms that *record and examine activity* in information systems that contain or use electronic protected health information. Deriving Engineering from Regulations
  • 16. §164.312(b): Key Activity Determine the Activities that Will be Tracked or Audited Audit Procedures Inquire of management as to whether audit controls have been implemented over information systems that contain or use ePHI. Obtain and review documentation relative to the specified criteria to determine whether audit controls have been implemented over information systems that contain or use ePHI. Key Activity Select the Tools that Will be Deployed for Auditing and System Activity Reviews Audit Procedures Inquire of management as to whether systems and applications have been evaluated to determine whether upgrades are necessary to implement audit capabilities. Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information. Section 164.314 - Organizational Safeguards Deriving Engineering from Regulations
  • 17. Audit Controls 164.308(b)(2) – OCR Audit Protocol Something you have to do. §164.312(b): Key Activity Determine the Activities that Will be Tracked or Audited Audit Procedures Inquire of management as to whether audit controls have been implemented over information systems that contain or use ePHI. Obtain and review documentation relative to the specified criteria to determine whether audit controls have been implemented over information systems that contain or use ePHI. Key Activity Select the Tools that Will be Deployed for Auditing and System Activity Reviews Audit Procedures Inquire of management as to whether systems and applications have been evaluated to determine whether upgrades are necessary to implement audit capabilities. Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information.
  • 18. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Determine the Activities EC2 CloudTrail Events AttachVolume AuthorizeSecurityGroupIngress CopySnapshot CreateNetworkAclEntry CreateSnapshot DeleteSnapshot DeleteTags DeleteVolume TerminateInstance RDS CloudTrail Events AuthorizeDBSecurityGroupIngress CopyDBSnapshot CreateDBSnapshot DeleteDBInstance DeleteDBSnapshot ModifyDBInstance DynamoDB CloudTrail Events DeleteTable UpdateTable Amazon Redshift CloudTrail Events AuthorizeClusterSecurityGroupIngress CopyClusterSnapshot CreateClusterSnapshot DeleteCluster DeleteClusterSnapshot DisableLogging Amazon Glacier CloudTrail Events DeleteArchive DeleteVault
  • 19. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Document Implementation Capture CloudTrail Configuration (CLI Example) $ aws cloudtrail describe-trails { "trailList": [ { "IncludeGlobalServiceEvents": true, "Name": "Default", "S3KeyPrefix": ”CloudTrail", "S3BucketName": "us-east-1.logging", "CloudWatchLogsRoleArn": "arn:aws:iam::663354267581:role/ CloudTrail_CloudWatchLogs_Role", "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:663354267581:log- group:CloudTrail/us-east-1-LogGroup:*" } ] }
  • 20. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Select the Tools CloudTrail CloudWatch Logs Amazon Kinesis CloudWatch Logs subscription consumer 
 (KCL-based) ELK CloudWatch Logs subscription Amazon EC2 + CloudWatch Logs agent
  • 21. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Select the Tools CloudWatch Logs Amazon Kinesis CloudWatch Logs subscription LogGroup-CloudTrail/Stream1 LogGroup-CWL-syslog/instance-1 LogGroup-CWL-syslog/instance-2 LogGroup-CWL-customApp/instance-3 […]
  • 22. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Select the Tools CloudTrail CloudWatch Logs CloudWatch Logs subscription Amazon EC2 + CloudWatch Logs agent Amazon Elasticsearch Service
  • 23. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Document Implementation §164.312(b): Key Activity Select the Tools that Will be Deployed for Auditing and System Activity Reviews Audit Procedures […] Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information. $ aws logs describe-log-groups --log-group-name-prefix "CloudTrail" { "logGroups": [ { "arn": "arn:aws:logs:us-east-1:663354267581:log-group:CloudTrail/us-east-1-LogGroup:*", "creationTime": 1439155915783, "metricFilterCount": 0, "logGroupName": "CloudTrail/us-east-1-LogGroup", "storedBytes": 411573
  • 24. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Document Implementation §164.312(b): Audit Procedures […] Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information. $ aws logs describe-subscription-filters --log-group-name CloudTrail/us-east-1-LogGroup { "subscriptionFilters": [ { "filterPattern": "", "filterName": "cwl-cfn-es-CWL-Elasticsearch-KinesisSubscriptionStream-1KSJUFTUP6K5K", "roleArn": "arn:aws:iam::663354267581:role/CWL-Elasticsearch- CloudWatchLogsKinesisRole-4DVR5UWI4QBR", "creationTime": 1439157386140, "logGroupName": "CloudTrail/us-east-1-LogGroup", "destinationArn": "arn:aws:kinesis:us-east-1:663354267581:stream/CWL-Elasticsearch- KinesisSubscriptionStream-1KSJUFTUP6K5K"
  • 25. Audit Controls 164.312(b)(2) – OCR Audit Protocol – Activity Reviews
  • 26. Similar Controls PCI DSS 3.1 Requirement 10.1 - 10.8 — Track and monitor all access to network resources and cardholder data. NIST 800-53r4 (AU-1 - AU-16) Audit and Accountability Controls ISO 27001 A.10.10 - Monitoring - Objective: To detect unauthorized information processing activities.
  • 27. Additional Resources The DevOps Audit Defense Tool Kit (http://itrevolution.com/devops-and-auditors-the-devops-audit-defense-toolkit/) AWS re:Invent SEC310 - Splitting the Check on Compliance and Security: Keeping Developers and Auditors Happy in the Cloud - Jason Chan, Engineering Director @NetFlix, October 2015 (https://youtu.be/Io00_K4v12Y) AWS Secure By Design - Collection of guidance and templates to automate security, compliance and governance on AWS (http://aws.amazon.com/compliance/security-by-design/) Singh, S. (1997). Fermat's enigma: The epic quest to solve the world's greatest mathematical problem. New York: Walker. Sobel, D. (1995). Longitude: The true story of a lone genius who solved the greatest scientific problem of his time. New York: Walker. Sobel, D. (1999). Galileo's daughter: A historical memoir of science, faith, and love. New York: Walker
  • 28. Thank You! Bill Shinn - billshin@amazon.com @packet791