SlideShare uma empresa Scribd logo
1 de 37
Securing your DevOps Pipeline
Justin Fox, Lead Solutions Architect
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• About NuData Security
• Disclaimer
• Leveraging CI/CD
• Security vs Compliance
• CIS Benchmarks for AWS
Agenda
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Four Integrated Technology Layers:
– Behavioral Biometrics
– Behavioral Analytics
– Device & Access Intel
– Cloud Consortium of Trusted Intelligence
• Quick facts:
– 100 Billion Behavioral Events Monitored Annually
– 4.3 Billion Behavioral Identity Profiles
– 100% Real-time
• Learn how to prevent more fraud: sales@nudatasecurity.com
About NuData Security
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Lead Solutions Architect
– NuData Security’s Platform Team
• Previously:
– DevOps Engineer
– Systems Adminsitrator
• Sometimes more of a Chaos Engineer 
• Website: https://justinfox.me
• Twitter: @666jfox777
About Justin Fox
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• All views expressed in this presentation are my own and do
not represent the opinions of any entity with which I have
been, am now, or will be in the future affiliated with.
• Presentations are intended for educational purposes only and
do not replace independent professional judgment.
• Attendees should note that sessions are audio-recorded and
may be published in various media, including print, audio and
video formats without further notice.
Disclaimer
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• A few terms:
– Continuous Integration
– Continuous Delivery
– Continuous Deployment
– Continuous Release
• AWS Definitions:
– Continuous delivery is a software development methodology where
the release process is automated.
– Continuous integration is a software development practice where
members of a team use a version control system and frequently
integrate their work to the same location, such as a master branch.
What is Continuous [term]
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• What do you automate with Jenkins?
– Deploying AMIs or software updates?
– Creating, updating, deleting CloudFormation stacks?
– Managing Auto Scaling Groups?
– … and otherwise simplify complex tasks through automation
• How do you grant access?
– User / password?
– Hidden behind a VPN?
– 2F MFA?
– Shared service users?
Using Jenkins to Automate AWS Actions
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Sloppy, old, or “legacy” code or
automation scripts
• Old, vulnerable versions of
Jenkins
• Default users, left enabled
• Ex-employee accounts, or
similarly forgotten accounts
• Developers who want to get
work done
• … there might be many ways in,
all that matters is that it
succeeds once!
The Threat(s)
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Jenkins was created using automation
• Administrative user logs in with initial account
– Configures LDAP
• Users add jobs, pipelines, and various configuration
• Months later, the Administrative user walks in one morning…
– All S3 data deleted, instance counts maxed out, limits maxed
out
• … That administrative user never deleted the initial account
• The IAM role on Jenkins let the attacker run random API calls
What if?
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• During all phases of all the projects that you work on, consider the
security aspect.
• Examples:
– “We need a service user…”
– “That’s the vendor’s default account…”
• Consider what permissions you hand out – you never know how
they could be used!
• Remember, you never know where your users/code will end up!
• Set up monitoring and alerting for your AWS accounts!
Consider Security
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Have you heard of:
– CodeCommit?
– CodeBuild?
– CodeDeploy?
– CodePipeline?
– Elastic Beanstalk?
– CloudFormation?
– Lambda?
• The goal is to reduce the
number of permission we give
to Jenkins
• Developers only need limited
permissions => CodeCommit
access!
• Jenkins should only need
limited AWS permissions as
well!
Improving Security using AWS
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• CodeCommit
Developers commit code.
• CodeBuild
Build code artifacts and store them on S3.
• CodeDeploy
Deploy artifacts to instances (AWS or elsewhere)
• CodePipeline
Monitors for changes in each stage and triggers the event.
AWS Developer Tools
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
AWS Developer Tools (graphic)
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Security and compliance are not the same!
– Security protects your information from threats by controlling
how that information is used, consumed and provided.
– Compliance is a demonstration — a reporting function — of
how your security program meets specific security standards
as laid out by regulatory organizations.
• Compliance defines minimum security level!
• You are NOT doing it to impress an auditor; you are doing it to
stop an attacker!
Security vs Compliance
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Compliance Certificates:
– SOC (1,2,3), PCI, ISO 9001 / 27001 / 27017 / 27018
– HIPAA BAA, IRAP, MTCS, C5
– FedRAMP (Moderate / High)
– DoD CC SRG IL2, DoD CC SRG IL4, DoD CC SRG IL5
• See: https://aws.amazon.com/compliance/services-in-scope/
• DoD CC SRG = Department of Defense Cloud Computing Security Requirements Guide
• IRAP = InfoSec Registered Assessors Program
• MTCS = Multi-Tier Cloud Security
• C5 = Cloud Computing Compliance Controls Catalogue
AWS Services Compliance
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
AWS Compliance Examples
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
AWS Service SOC 1, 2, 3 PCI ISO HIPAA BAA C5
IAM √ √ √ √
VPC √ √ √
CloudTrail √ √ √ √
AutoScaling *In Progress*
SNS *In Progress*
SQS √ √ √ √ √
DynamoDB √ √ √ √ √
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• CIS = Centre for Internet Security
• Provides guidance for configuring
security features for a variety of
systems.
• Examples:
– CentOS
– Apache
– AWS
– Etc
• Targets AWS Technologies (in 4
sections):
– IAM
– Config
– CloudTrail
– CloudWatch
– SNS
– S3
– VPC
CIS Benchmarks for AWS
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• There are 24 IAM recommendations
• Benchmark Examples (3/24):
– Ensure multi-factor authentication (MFA) is enabled for all
IAM users that have a console password
– Ensure IAM instance roles are used for AWS resource
access from instances (Not Scored)
– Ensure IAM policies that allow full "*:*" administrative
privileges are not created
IAM
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• There are 8 Logging recommendations
• Benchmark Examples (3/8):
– Ensure CloudTrail is enabled in all regions
– Ensure AWS Config is enabled in all regions
– Ensure CloudTrail logs are encrypted at rest using KMS
CMKs
Logging
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• There are 15 Monitoring recommendations
• Benchmark Examples (3/15):
– Ensure a log metric filter and alarm exist for unauthorized
API calls
– Ensure a log metric filter and alarm exist for Management
Console sign-in without MFA
– Ensure a log metric filter and alarm exist for usage of "root"
account
• Note: some AWS services may show as the ”root” account
Monitoring
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• There are 5 networking recommendations
• Benchmark Examples (3/5):
– Ensure no security groups allow ingress from 0.0.0.0/0 to
port 22
– Ensure no security groups allow ingress from 0.0.0.0/0 to
port 3389
– Ensure VPC flow logging is enabled in all VPCs
Networking
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
Ok, now what?
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• AWS Config Rules  We’re going to talk about this one
• AWS Partners:
– https://www.alertlogic.com/
– https://evident.io/cloud-security-compliance-for-aws/
– https://www.threatstack.com/
• Monitoring system?
– Nagios, Zabbix, Sensu, etc.?
How to Monitor / Enforce?
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Generally used to target specific resource types
• Examples:
– IAM Users MFA Enabled
– VPC Flow Logging Enabled
– S3 Buckets have Access Logs
AWS Config Rules: Triggered Rules
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Called “Periodic”.
• Generally used to target GLOBAL resources.
• Examples:
– Root Account MFA Enabled
– CloudTrail Enabled
– Config Enabled
– CloudTrail Log Encryption Enabled
AWS Config Rules: Scheduled Rules
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
1. COMPLIANT
2. NON_COMPLIANT
3. NOT_APPLICABLE
• If you’re seeing a lot of “NOT_APPLICABLE”, adjust your rule.
– It’s costing you money.
AWS Config Rules: Result States
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Time for some technical
examples!
• AWS Config Rules is used to
provide a dashboard overview
and manage alert
configuration
• AWS Config Rules allows for
Triggered and Scheduled
rules
• AWS Lambda is my tool of
choice for detection /
remediation
Examples:
1. Ensure multi-factor
authentication (MFA) is
enabled for all IAM users
that have a console
password
2. Ensure CloudTrail is enabled
in all regions
3. Ensure VPC flow logging is
enabled in all VPCs
Examples
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
if (resourceType == 'AWS::IAM::User') {
iam.listMFADevices({ UserName:
invokingEvent.configurationItem.resourceName }, function(err, mfa) {
var compliance = 'NON_COMPLIANT';
if (!err) {
if (mfa.MFADevices.length > 0) {
compliance = 'COMPLIANT';
}
} else {
console.log(err);
}
putEval(event,context,resType,resId,compliance,timestamp);
});
} else {
putEval(event,context,resType,resId,'NOT_APPLICABLE',timestamp);
}
Example #1 – MFA for IAM Users
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
readSnapshot(s3, s3key, s3bucket, function(err, snapshot) {
if (err === null) {
var compliance = 'NON_COMPLIANT';
for (var i = 0; i < snapshot.configurationItems.length; i++) {
var item = snapshot.configurationItems[i];
if (item.resourceType === 'AWS::CloudTrail::Trail') {
if (item.configuration.isMultiRegionTrail) {
compliance = 'COMPLIANT';
}
}
}
putEval(event,context,resType,resId,compliance,timestamp);
} else {
context.fail(err);
}
});
Example #2 – AWS CloudTrail Enabled
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
ec2.describeFlowLogs(
{ Filter: [ { Name: 'resource-id', Values: [ resourceId ] } ]
},
function(err, data) {
var compliance = 'NON_COMPLIANT';
if (!err) {
if (data.FlowLogStatus == 'ACTIVE') {
compliance = 'COMPLIANT';
}
}
putEval(event,context,resType,resId,compliance,timestamp);
});
Example #3 – VPC Flow Logging
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
Example #4 – AWS Config Rules
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
Example #4 – AWS Config Rules
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Note: Time dependant, don’t worry folks links at the end for
walkthroughs and examples!
• CodeCommit => CodeBuild => CodeDeploy w/ CodePipeline
• Config Rules + Dashboard
Demo
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
Wrap Up
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• Tryout CodePipeline for your CI/CD pipeline
• Add auto remediation to the AWS Config Rules example
– E.g.: Disable IAM user keys when they expire.
• Use AWS CloudWatch Events to intercept API calls
– E.g.: Don’t allow AWS CloudTrail to be disabled!
• Use AWS CloudWatch Events like CROND.
• Use AWS Service Catalog to provide AWS CloudFormation Templates for
reuse
• If you enjoyed this session, be sure to check out my blog:
https://justinfox.me/
Follow-up
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments
• For today’s slides:
https://justinfox.me/articles/devopscloudsummit-toronto-2017
• Related Blog Posts:
https://justinfox.me/articles/compliance-with-aws-config
https://justinfox.me/articles/aws-developer-tools-for-cicd
• Github Repository:
https://github.com/666jfox777/aws-config-rules-template
https://github.com/666jfox777/aws-codepipeline-example
Questions
SECURING YOUR DEVOPS PIPELINE ON AWS
DevOps Cloud Summit – Toronto 2017
Thank You!

Mais conteúdo relacionado

Mais procurados

Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierTriNimbus
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...Amazon Web Services
 
Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Amazon Web Services
 
Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Amazon Web Services
 
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...Amazon Web Services
 
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...Amazon Web Services
 
Application Lifecycle Management
Application Lifecycle ManagementApplication Lifecycle Management
Application Lifecycle ManagementAmazon Web Services
 
Compute Without Servers – Building Applications with AWS Lambda - Technical 301
Compute Without Servers – Building Applications with AWS Lambda - Technical 301Compute Without Servers – Building Applications with AWS Lambda - Technical 301
Compute Without Servers – Building Applications with AWS Lambda - Technical 301Amazon Web Services
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Amazon Web Services
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
Following Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfFollowing Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfAmazon Web Services
 
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...Amazon Web Services
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)Amazon Web Services
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWSAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...Amazon Web Services
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSAmazon Web Services
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAmazon Web Services
 

Mais procurados (20)

Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave Millier
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
 
Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017
 
Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301
 
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...
DevOps on Windows: How to Deploy Complex Windows Workloads | AWS Public Secto...
 
Husqvarna Group
Husqvarna GroupHusqvarna Group
Husqvarna Group
 
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...
 
Application Lifecycle Management
Application Lifecycle ManagementApplication Lifecycle Management
Application Lifecycle Management
 
Compute Without Servers – Building Applications with AWS Lambda - Technical 301
Compute Without Servers – Building Applications with AWS Lambda - Technical 301Compute Without Servers – Building Applications with AWS Lambda - Technical 301
Compute Without Servers – Building Applications with AWS Lambda - Technical 301
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Following Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfFollowing Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdf
 
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...
SRV414 NEW LAUNCH! Introducing AWS CodeStar: The central experience to quickl...
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWS
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 

Semelhante a Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation

Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesAhmad Khan
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation OverviewAmazon Web Services
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Amazon Web Services
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersAmazon Web Services
 
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...Amazon Web Services
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud SecurityAmazon Web Services
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAmazon Web Services
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareAmazon Web Services
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineAmazon Web Services
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
AWS November meetup Slides
AWS November meetup SlidesAWS November meetup Slides
AWS November meetup SlidesJacksonMorgan9
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsAmazon Web Services
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAmazon Web Services
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the CloudAmazon Web Services
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceAmazon Web Services
 

Semelhante a Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation (20)

Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation Overview
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud Security
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
AWS November meetup Slides
AWS November meetup SlidesAWS November meetup Slides
AWS November meetup Slides
 
AWS User Group November
AWS User Group NovemberAWS User Group November
AWS User Group November
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOps
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps Pipelines
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to Maintenance
 

Mais de TriNimbus

Convergence of Containers and Serverless by Mency Woo
Convergence of Containers and Serverless by Mency WooConvergence of Containers and Serverless by Mency Woo
Convergence of Containers and Serverless by Mency WooTriNimbus
 
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_InsightsJuni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_InsightsTriNimbus
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTeri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTriNimbus
 
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_DataPeter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_DataTriNimbus
 
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
Darin_Briskman_AWS_Machine_Learning_Beyond_the_HypeDarin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
Darin_Briskman_AWS_Machine_Learning_Beyond_the_HypeTriNimbus
 
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and BeyondAmazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and BeyondTriNimbus
 
Using Active Directory in AWS
Using Active Directory in AWSUsing Active Directory in AWS
Using Active Directory in AWSTriNimbus
 
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
AWS 2017 re:Invent re:Cap - TriNimbus Presentation SlidesAWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
AWS 2017 re:Invent re:Cap - TriNimbus Presentation SlidesTriNimbus
 
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
Performance Optimization of Cloud Based Applications by Peter Smith, ACLPerformance Optimization of Cloud Based Applications by Peter Smith, ACL
Performance Optimization of Cloud Based Applications by Peter Smith, ACLTriNimbus
 
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web ServicesBuilding and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web ServicesTriNimbus
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
VMware + Amazon Web Services
VMware + Amazon Web ServicesVMware + Amazon Web Services
VMware + Amazon Web ServicesTriNimbus
 
The New Normal - Eric Gales, AWS Canada
The New Normal - Eric Gales, AWS CanadaThe New Normal - Eric Gales, AWS Canada
The New Normal - Eric Gales, AWS CanadaTriNimbus
 
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...TriNimbus
 
Darragh Kennedy, Build Products Not Data Centres
Darragh Kennedy, Build Products Not Data CentresDarragh Kennedy, Build Products Not Data Centres
Darragh Kennedy, Build Products Not Data CentresTriNimbus
 
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...TriNimbus
 

Mais de TriNimbus (16)

Convergence of Containers and Serverless by Mency Woo
Convergence of Containers and Serverless by Mency WooConvergence of Containers and Serverless by Mency Woo
Convergence of Containers and Serverless by Mency Woo
 
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_InsightsJuni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTeri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
 
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_DataPeter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
 
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
Darin_Briskman_AWS_Machine_Learning_Beyond_the_HypeDarin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
 
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and BeyondAmazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
 
Using Active Directory in AWS
Using Active Directory in AWSUsing Active Directory in AWS
Using Active Directory in AWS
 
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
AWS 2017 re:Invent re:Cap - TriNimbus Presentation SlidesAWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
 
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
Performance Optimization of Cloud Based Applications by Peter Smith, ACLPerformance Optimization of Cloud Based Applications by Peter Smith, ACL
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
 
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web ServicesBuilding and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
VMware + Amazon Web Services
VMware + Amazon Web ServicesVMware + Amazon Web Services
VMware + Amazon Web Services
 
The New Normal - Eric Gales, AWS Canada
The New Normal - Eric Gales, AWS CanadaThe New Normal - Eric Gales, AWS Canada
The New Normal - Eric Gales, AWS Canada
 
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
 
Darragh Kennedy, Build Products Not Data Centres
Darragh Kennedy, Build Products Not Data CentresDarragh Kennedy, Build Products Not Data Centres
Darragh Kennedy, Build Products Not Data Centres
 
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation

  • 1. Securing your DevOps Pipeline Justin Fox, Lead Solutions Architect
  • 2. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • About NuData Security • Disclaimer • Leveraging CI/CD • Security vs Compliance • CIS Benchmarks for AWS Agenda SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 3. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Four Integrated Technology Layers: – Behavioral Biometrics – Behavioral Analytics – Device & Access Intel – Cloud Consortium of Trusted Intelligence • Quick facts: – 100 Billion Behavioral Events Monitored Annually – 4.3 Billion Behavioral Identity Profiles – 100% Real-time • Learn how to prevent more fraud: sales@nudatasecurity.com About NuData Security SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 4. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Lead Solutions Architect – NuData Security’s Platform Team • Previously: – DevOps Engineer – Systems Adminsitrator • Sometimes more of a Chaos Engineer  • Website: https://justinfox.me • Twitter: @666jfox777 About Justin Fox SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 5. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • All views expressed in this presentation are my own and do not represent the opinions of any entity with which I have been, am now, or will be in the future affiliated with. • Presentations are intended for educational purposes only and do not replace independent professional judgment. • Attendees should note that sessions are audio-recorded and may be published in various media, including print, audio and video formats without further notice. Disclaimer SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 6. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • A few terms: – Continuous Integration – Continuous Delivery – Continuous Deployment – Continuous Release • AWS Definitions: – Continuous delivery is a software development methodology where the release process is automated. – Continuous integration is a software development practice where members of a team use a version control system and frequently integrate their work to the same location, such as a master branch. What is Continuous [term] SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 7. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • What do you automate with Jenkins? – Deploying AMIs or software updates? – Creating, updating, deleting CloudFormation stacks? – Managing Auto Scaling Groups? – … and otherwise simplify complex tasks through automation • How do you grant access? – User / password? – Hidden behind a VPN? – 2F MFA? – Shared service users? Using Jenkins to Automate AWS Actions SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 8. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Sloppy, old, or “legacy” code or automation scripts • Old, vulnerable versions of Jenkins • Default users, left enabled • Ex-employee accounts, or similarly forgotten accounts • Developers who want to get work done • … there might be many ways in, all that matters is that it succeeds once! The Threat(s) SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 9. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Jenkins was created using automation • Administrative user logs in with initial account – Configures LDAP • Users add jobs, pipelines, and various configuration • Months later, the Administrative user walks in one morning… – All S3 data deleted, instance counts maxed out, limits maxed out • … That administrative user never deleted the initial account • The IAM role on Jenkins let the attacker run random API calls What if? SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 10. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • During all phases of all the projects that you work on, consider the security aspect. • Examples: – “We need a service user…” – “That’s the vendor’s default account…” • Consider what permissions you hand out – you never know how they could be used! • Remember, you never know where your users/code will end up! • Set up monitoring and alerting for your AWS accounts! Consider Security SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 11. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Have you heard of: – CodeCommit? – CodeBuild? – CodeDeploy? – CodePipeline? – Elastic Beanstalk? – CloudFormation? – Lambda? • The goal is to reduce the number of permission we give to Jenkins • Developers only need limited permissions => CodeCommit access! • Jenkins should only need limited AWS permissions as well! Improving Security using AWS SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 12. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • CodeCommit Developers commit code. • CodeBuild Build code artifacts and store them on S3. • CodeDeploy Deploy artifacts to instances (AWS or elsewhere) • CodePipeline Monitors for changes in each stage and triggers the event. AWS Developer Tools SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 13. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments AWS Developer Tools (graphic) SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 14. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Security and compliance are not the same! – Security protects your information from threats by controlling how that information is used, consumed and provided. – Compliance is a demonstration — a reporting function — of how your security program meets specific security standards as laid out by regulatory organizations. • Compliance defines minimum security level! • You are NOT doing it to impress an auditor; you are doing it to stop an attacker! Security vs Compliance SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 15. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Compliance Certificates: – SOC (1,2,3), PCI, ISO 9001 / 27001 / 27017 / 27018 – HIPAA BAA, IRAP, MTCS, C5 – FedRAMP (Moderate / High) – DoD CC SRG IL2, DoD CC SRG IL4, DoD CC SRG IL5 • See: https://aws.amazon.com/compliance/services-in-scope/ • DoD CC SRG = Department of Defense Cloud Computing Security Requirements Guide • IRAP = InfoSec Registered Assessors Program • MTCS = Multi-Tier Cloud Security • C5 = Cloud Computing Compliance Controls Catalogue AWS Services Compliance SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 16. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments AWS Compliance Examples SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017 AWS Service SOC 1, 2, 3 PCI ISO HIPAA BAA C5 IAM √ √ √ √ VPC √ √ √ CloudTrail √ √ √ √ AutoScaling *In Progress* SNS *In Progress* SQS √ √ √ √ √ DynamoDB √ √ √ √ √
  • 17. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • CIS = Centre for Internet Security • Provides guidance for configuring security features for a variety of systems. • Examples: – CentOS – Apache – AWS – Etc • Targets AWS Technologies (in 4 sections): – IAM – Config – CloudTrail – CloudWatch – SNS – S3 – VPC CIS Benchmarks for AWS SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 18. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • There are 24 IAM recommendations • Benchmark Examples (3/24): – Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password – Ensure IAM instance roles are used for AWS resource access from instances (Not Scored) – Ensure IAM policies that allow full "*:*" administrative privileges are not created IAM SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 19. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • There are 8 Logging recommendations • Benchmark Examples (3/8): – Ensure CloudTrail is enabled in all regions – Ensure AWS Config is enabled in all regions – Ensure CloudTrail logs are encrypted at rest using KMS CMKs Logging SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 20. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • There are 15 Monitoring recommendations • Benchmark Examples (3/15): – Ensure a log metric filter and alarm exist for unauthorized API calls – Ensure a log metric filter and alarm exist for Management Console sign-in without MFA – Ensure a log metric filter and alarm exist for usage of "root" account • Note: some AWS services may show as the ”root” account Monitoring SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 21. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • There are 5 networking recommendations • Benchmark Examples (3/5): – Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 – Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 – Ensure VPC flow logging is enabled in all VPCs Networking SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 22. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments Ok, now what? SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 23. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • AWS Config Rules  We’re going to talk about this one • AWS Partners: – https://www.alertlogic.com/ – https://evident.io/cloud-security-compliance-for-aws/ – https://www.threatstack.com/ • Monitoring system? – Nagios, Zabbix, Sensu, etc.? How to Monitor / Enforce? SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 24. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Generally used to target specific resource types • Examples: – IAM Users MFA Enabled – VPC Flow Logging Enabled – S3 Buckets have Access Logs AWS Config Rules: Triggered Rules SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 25. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Called “Periodic”. • Generally used to target GLOBAL resources. • Examples: – Root Account MFA Enabled – CloudTrail Enabled – Config Enabled – CloudTrail Log Encryption Enabled AWS Config Rules: Scheduled Rules SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 26. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments 1. COMPLIANT 2. NON_COMPLIANT 3. NOT_APPLICABLE • If you’re seeing a lot of “NOT_APPLICABLE”, adjust your rule. – It’s costing you money. AWS Config Rules: Result States SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 27. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Time for some technical examples! • AWS Config Rules is used to provide a dashboard overview and manage alert configuration • AWS Config Rules allows for Triggered and Scheduled rules • AWS Lambda is my tool of choice for detection / remediation Examples: 1. Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password 2. Ensure CloudTrail is enabled in all regions 3. Ensure VPC flow logging is enabled in all VPCs Examples SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 28. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments if (resourceType == 'AWS::IAM::User') { iam.listMFADevices({ UserName: invokingEvent.configurationItem.resourceName }, function(err, mfa) { var compliance = 'NON_COMPLIANT'; if (!err) { if (mfa.MFADevices.length > 0) { compliance = 'COMPLIANT'; } } else { console.log(err); } putEval(event,context,resType,resId,compliance,timestamp); }); } else { putEval(event,context,resType,resId,'NOT_APPLICABLE',timestamp); } Example #1 – MFA for IAM Users SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 29. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments readSnapshot(s3, s3key, s3bucket, function(err, snapshot) { if (err === null) { var compliance = 'NON_COMPLIANT'; for (var i = 0; i < snapshot.configurationItems.length; i++) { var item = snapshot.configurationItems[i]; if (item.resourceType === 'AWS::CloudTrail::Trail') { if (item.configuration.isMultiRegionTrail) { compliance = 'COMPLIANT'; } } } putEval(event,context,resType,resId,compliance,timestamp); } else { context.fail(err); } }); Example #2 – AWS CloudTrail Enabled SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 30. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments ec2.describeFlowLogs( { Filter: [ { Name: 'resource-id', Values: [ resourceId ] } ] }, function(err, data) { var compliance = 'NON_COMPLIANT'; if (!err) { if (data.FlowLogStatus == 'ACTIVE') { compliance = 'COMPLIANT'; } } putEval(event,context,resType,resId,compliance,timestamp); }); Example #3 – VPC Flow Logging SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 31. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments Example #4 – AWS Config Rules SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 32. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments Example #4 – AWS Config Rules SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 33. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Note: Time dependant, don’t worry folks links at the end for walkthroughs and examples! • CodeCommit => CodeBuild => CodeDeploy w/ CodePipeline • Config Rules + Dashboard Demo SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 35. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • Tryout CodePipeline for your CI/CD pipeline • Add auto remediation to the AWS Config Rules example – E.g.: Disable IAM user keys when they expire. • Use AWS CloudWatch Events to intercept API calls – E.g.: Don’t allow AWS CloudTrail to be disabled! • Use AWS CloudWatch Events like CROND. • Use AWS Service Catalog to provide AWS CloudFormation Templates for reuse • If you enjoyed this session, be sure to check out my blog: https://justinfox.me/ Follow-up SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017
  • 36. ©2017 NuData Security Inc., A Mastercard Company. Proprietary.@mastercardnews I #saferpayments • For today’s slides: https://justinfox.me/articles/devopscloudsummit-toronto-2017 • Related Blog Posts: https://justinfox.me/articles/compliance-with-aws-config https://justinfox.me/articles/aws-developer-tools-for-cicd • Github Repository: https://github.com/666jfox777/aws-config-rules-template https://github.com/666jfox777/aws-codepipeline-example Questions SECURING YOUR DEVOPS PIPELINE ON AWS DevOps Cloud Summit – Toronto 2017

Notas do Editor

  1. // Description: Checks that all IAM Users have MFA Enabled // Trigger Type: Change Triggered // Scope of Changes: IAM:User // Required Parameter: None function evaluateIamUsersMfaIsEnabled(event,context,resourceType,resourceId,orderingTimestamp){ var invokingEvent = JSON.parse(event.invokingEvent); if (resourceType == 'AWS::IAM::User') { iam.listMFADevices({ UserName: invokingEvent.configurationItem.resourceName }, function(mfaerr, mfadata) { var compliance = 'NON_COMPLIANT'; if (!mfaerr) { if (mfadata.MFADevices.length > 0) { compliance = 'COMPLIANT'; } } else { console.log(mfaerr); } putEvaluation(event,context,resourceType,resourceId,compliance,orderingTimestamp); }); } else { putEvaluation(event,context,resourceType,resourceId,'NOT_APPLICABLE',orderingTimestamp); } }
  2. readSnapshot = s3 get object // Description: Checks that a CloudTrail exists that is set to multi-region // Trigger Type: Periodic // Scope of Changes: Global // Required Parameter: None function evaluateCloudTrailIsEnabled(event,context,resourceType,resourceId,orderingTimestamp){ var invokingEvent = JSON.parse(event.invokingEvent); var s3key = invokingEvent.s3ObjectKey; var s3bucket = invokingEvent.s3Bucket; readSnapshot(s3, s3key, s3bucket, function(err, snapshot) { if (err === null) { var compliance = 'NON_COMPLIANT'; for (var i = 0; i < snapshot.configurationItems.length; i++) { var item = snapshot.configurationItems[i]; if (item.resourceType === 'AWS::CloudTrail::Trail') { if (item.configuration.isMultiRegionTrail) { compliance = 'COMPLIANT'; } } } putEvaluation(event,context,resourceType,resourceId,compliance,orderingTimestamp); } else { context.fail(err); } }); }
  3. // Checks that all Vpc networks have flow logging enabled. // Trigger Type: Change Triggered // Scope of Changes: AWS::EC2::VPC // Required Parameter: None