Top Banner
DevOpsSec and Container/ FaaS (Function as a Service) Security Suppawut Kaopaiboon Security Consultant
35

DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

May 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

DevOpsSec and Container/

FaaS (Function as a

Service) Security

Suppawut Kaopaiboon

Security Consultant

Page 2: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

•Protecting customer applications through all threat vectors in the public cloud

Discover RespondDetect

Config Scanning

Compliance Reporting

Continuous monitoring of Config vulnerabilities across critical cloud services

Comprehensive compliance reporting across compliance standards

Public Cloud (IaaS/PaaS/FaaS) Private Cloud

Serverless Security

Visibility & runtime application security

IAM Security

Access governance, Privileged monitoring and UEBA through ML

Network Security

Detection of advanced network threats using flow traffic analytics

Data Protection

Data classification, malware & DLP scanning for cloud storage

Automated Response

Automated remediation combined with integration with SoC, Ticketing & other 3rd party tools

Host & Containers

Security

Vulnerability scanning & runtime security

Page 3: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

4 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 4: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Software Industry need to change!

5 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 5: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Need of faster, cheaper, quality and secure

6 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 6: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Coming of AGILE + CI/CD + DevOps

7 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 7: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Changing of SW Engineering Process

8 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 8: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Microservices

9 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

Monolithic application Microservices

Page 9: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Changing of the team formation

10 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 10: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Overview of DevOps culture

The Goal of DevOps

- Fast Development Methodologies

- Fast Quality Assurance Methodologies

- Fast Deployment Methodologies

- Iteration & Continuous Feedback (strong and continuous communication between stakeholders - the end users and customers,

product owners, development, quality assurance, and production engineers)

11 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 11: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

DevSecOps

12 | © 2018 Palo Alto Networks, Inc. All Rights Reserved.

- Check Tool Chain and Library

- Static/Dynamic Code Analysis

- Compliance

Reference : https://www.microsoft.com/en-us/sdl/

Page 12: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Current CI/CD Pipeline

13 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 13: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Orchestrators

• Orchestrators allow for better management containers

• Cluster management

• Scheduling

• Reliability

• Resource management

14 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

• Orchestrators

• Kubernetes

• OpenShift

• Amazon Elastic Container Service

(ECS)

• Fargate

• Docker Swarm

• Etc.

Page 14: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Containers and VMs

15 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

https://unit42.paloaltonetworks.com/making-containers-more-isolated-an-overview-of-sandboxed-container-technologies/

Page 15: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

A lot of opensource tools on the cloud!

Page 16: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

CI/CD Flow Example

18 | © 2018 Palo Alto Networks, Inc. All Rights Reserved.

Page 17: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Overall of CI/CD Process and Tools

19 | © 2019 Palo Alto Networks. All Rights Reserved.

Continuous Integration (CI) Continuous Deployment (CD) Monitor & Feedback

Page 18: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

SERVERLESS IS REIMAGINING SOFTWARE DEVELOPMENT

20 | © 2019 Palo Alto Networks. All Rights Reserved.

Less operational

overhead

Only pay for what

you run

Designed for agility

& scale

No servers to patch,

no network to inspect

X

“20 percent of global enterprises will

have deployed serverless computing

technologies by 2020”

Gartner

Page 19: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

What is Serverless?

21 | © 2019 Palo Alto Networks. All Rights Reserved.

Applications that fully rely on managed cloud services,

and leverage FaaS (AWS Lambda, Google Cloud

Functions) for core business logic.

Load balancer

Application servers, business logic

Database

Event trigger

Business logic

Output

Code repo

Code repo

Server-based application Serverless application

Page 20: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

HR SERVERLESS APPLICATION EXAMPLE

22 | © 2019 Palo Alto Networks. All Rights Reserved.

1. Candidate sends CV as PDF in email

2. SES receives email, creates SNS message

3. SNS invokes the function

4. Function converts PDF to text + stores results in DynamoDB

5. Function sends receipt to candidate

Simple Email Service Simple Notification Service Lambda Function

DynamoDB

Page 21: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

NEW SECURITY CHALLENGES ARE EMERGING

23 | © 2019 Palo Alto Networks. All Rights Reserved.

Threats have been reimagined

With serverless, application owners

have no control over infrastructure,

and must deal with new attack vectors.

Rapid adoption requires action

Over 20% of open-source serverless

apps have critical vulnerabilities.

Enterprises must adapt quickly.

Page 22: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Desired Security Outcomes

24 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

• Prevent compromise of a resource

• Safe enablement of applications

Page 23: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Desired Security Outcomes

25 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

Reconnaissance Weaponization Delivery Exploitation InstallationCommand

& Control

Act on

Objective

Stop the attack at any point!

Cyber Attack Lifecycle

Page 24: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

For hosts, containers,

and serverless

Across the

DevSecOps lifecycle

CYBERSECURITY FOR YOUR CLOUD NATIVE

APPLICATIONS

26 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 25: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

CI/CD is Enabling Security Earlier in the Lifecycle

27 | © 2019 Palo Alto Networks. All Rights Reserved.

Build RunDeploy

Shift Left – Ideal to implement security early in the dev lifecycle

Integrate vulnerability and

compliance scanning into

every build as part of any

CI workflow

Secure every deployment by

seamlessly integrating

security into continuous

delivery process

Reduce burden on security

teams by production with

minimized threat footprint

Page 26: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Current CI/CD Pipeline

28 | © 2019 Palo Alto Networks. All Rights Reserved.

Notification System

Fail Fail Fail Fail Fail Fail

Vulnerability Scanning & Penetration testing

Page 27: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Adding with Dev”Sec”Ops to Existing process

29 | © 2019 Palo Alto Networks. All Rights Reserved.

Notification System

Fail Fail Fail Fail Fail Fail

Vulnerability Scanning & Penetration testing

Scanning

Page 28: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Prevention

CI/CD INTEGRATION

CLOUD NATIVE FIREWALLING

ACCESS CONTROL

VULNERABILITY MANAGEMENT

VisibilityAutomation

RUN TIME DEFENSE

Container Security Requirement

30 | © 2019 Palo Alto Networks. All Rights Reserved.

COMPLIANCE

Page 29: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Vulnerability Management

Industry leading precision across hosts, images, containers, and serverless functions

Automated prioritization of vulnerabilities based on your unique environment

Prevent running vulnerable software across your environment

31 | © 2019 Palo Alto Networks. All Rights Reserved.

Automation Visibility Prevention

Page 30: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Cloud Native Firewalling

Layer 4 and Layer 7 firewalls tuned for cloud native environments

True Intrusion Detection and Intrusion Prevention

Fully automated mesh discovery and microsegmentation

32 | © 2019 Palo Alto Networks. All Rights Reserved.

Automation Visibility Prevention

Page 31: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Compliance

One-click enforcement for CIS, PCI-DSS, HIPAA, GDPR, NIST SP 800-190, and FISMA

Centrally discover and monitor cloud native services across all your providers, accounts, and regions

Custom checks using OpenSCAP, PowerShell, and Bash scripts

33 | © 2019 Palo Alto Networks. All Rights Reserved.

Automation Visibility Prevention

Page 32: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

CI/CD Integration

Native plugins and standalone scanner for integration into any CI/CD workflow or tool

“Shift left” quality gates with compliance

and vulnerability thresholds in every build

Scan hosts, container images, serverless functions, and PCF blob stores

34 | © 2019 Palo Alto Networks. All Rights Reserved.

Automation Visibility Prevention

Page 33: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

RUNTIME DEFENSE

Use machine learning to model what each image is intended to do

Automatically look for anomalies between the model and runtime behavior

35 | © 2019 Palo Alto Networks. All Rights Reserved.

Machine

learningPredictive

model

Runtime

Defense

Static

analysis

cache

data

fe01 fe02

ip, category, score, first_seen, last_seen, ports74.88.8.7,31,65,2016-04-16,2016-04-16, 233.16.9.49,35,125,2016-04-11,2016-04-20,80 82.16.9.65,35,127,2016-04-09,2016-04-21,80

Twistlock Advanced

Threat Protection

Page 34: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

Docker Engine

Docker Engine

Docker Engine

nc –l –p 666Docker Engine

Ap

p vulnerable web service

buffer = OPENSSL_malloc(1 + 2 + payload + padding);bp = buffer;

storage sensors looks for malware and suspicious file access patterns

process sensors see a process not in the authentic image and stop it from spawning

network sensors detect abnormal traffic flows and dangerous endpoints

syscall sensors detect anomalous kernel calls

Ap

p

Ap

p

Ap

p

STOPPING THE KILL CHAIN

36 | © 2019 Palo Alto Networks. All Rights Reserved.

Page 35: DevOpsSec and Container/ FaaS (Function as a …...Serverless Security Visibility & runtime application security IAM Security Access governance, Privileged monitoring and UEBA through

40 | © 2019 Palo Alto Networks. All Rights Reserved.

paloaltonetworks.com

Email: [email protected]

Thank You