Top Banner
Security Delusions Kelly Shortridge (@ swagitda _) QCon NYC 2019
108

Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

May 30, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

Security Delusions

Kelly Shortridge (@swagitda_)QCon NYC 2019

Page 2: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

Hi, I’m Kelly

Page 3: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

3

“Ignorance is the parent of fear.”

― Herman Melville, Moby Dick

Page 4: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

4

Infosec is consistently a tech laggard –“skepticism” is seen as a strength

Page 5: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

5

How can you herd these frightened sheep to modern tech pastures?

Page 6: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

6

1. A History of Cloud Compunction

2. APIs: Infosec’s Anathema

3. The Curse of Containers

4. Cheat Codes for Dealing with This

Page 7: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

A History of Cloud Compunction

Page 8: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

8

“Cloud transformation” ruffled infosec feathers in the early 2010s

Page 9: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

9

“Storing data online,” shared resources, insider threat, DDoS, supply chain…

Page 10: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

10

The crux of cloud fear was rooted in a loss of control by the infosec team

Page 11: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

11

The firewall was always the center of the enterprise infosec universe

Page 12: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

12

Page 13: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

13

Page 14: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

14

Defense in Depth model: the firewall is the first line of defense

Page 15: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

15

Cloud + microservices represents a Copernican revolution for infosec

Page 16: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

16

What do surveys from yesteryear reveal about infosec’s fear of cloud tech?

Page 17: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

17

2012: “What is holding back cloud?”

Page 18: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

18

Source: Intel

57%

55%

49%

Inability to measure CSP's security measures

Lack of control over data

Lack of confidence in CSP's security capabilities

Page 19: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

19

“Uneasiness about adequate firewalling” = the pre-Copernican mindset

Page 20: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

20

2014: Cloud Multiplier effect on security

Page 21: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

21

Source: Ponemon

66%

64%

51%

Diminishes the ability to protect sensitive data

Makes it difficult to secure business-critical apps

Increases the likelihood of a data breach

Page 22: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

22

2015: 71% view cloud data security as a big red flag & 38% feared loss of control

Source: Cloud Security Alliance

Page 23: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

23

Endowment effect & sunk cost fallacy: “Our security is better than CSPs!”

Page 24: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

24

Evidence is quite scant that CSPs are breached more frequently

Page 25: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

25

Acceptance that CSPs have better security is only in the past few years

Page 26: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

26

Reality: misconfigurations are the biggest concern for cloud security

Page 27: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

27

Gartner: “Through 2020, 80% of cloud breaches will be due to misconfiguration … not cloud provider vulnerabilities”

Page 28: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

28

Using cloud-native security controls can reduce security expense by 30%

Source: McKinsey

Page 29: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

29

Network security blinky boxes often carry price tags of $100k - $200k

Page 30: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

30

So, how is infosec reacting to emerging tech today?

Page 31: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

APIs: Infosec’s Anathema

Page 32: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

32

Microservices fears: APIs + containers

Page 33: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

33

Horror story: microservices creates a titanic, labyrinthian attack surface

Page 34: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

34

Basically monolithic app risk x 10,000 = infosec’s mental model of microservices

Page 35: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

35

Revisionist history: as long as the perimeter is secure, the org is safe

Page 36: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

36

Real history: lateral movement was easy because everything else was #yolosec

Page 37: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

37

Public-by-default begets embedded security vs. bolt-on security – a big win

Page 38: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

38

2018: 51% aren’t certain the infosec team knows all APIs within the organization

Source: Ping Identity

Page 39: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

39

Public API fears – adds attack surface, closer to attackers, impossible to control

Page 40: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

40

A lie: “Formerly, local networks had only a few connections to the outside world, & securing those endpoints was sufficient.”

Page 41: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

41

Public API fears – provides a “roadmap” for underlying functionality of the app

Page 42: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

42

Reality: “Security through obscurity” is a garbage cop-out

Page 43: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

43

Security resilience: assume your added security controls will fail

Page 44: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

44

API endpoints actually raise the cost of attack – attack tools don’t work & entire vuln classes are removed

Page 45: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

45

Standardization begets security benefits – but isn’t a common concept in infosec

Page 46: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

The Curse of Containers

Page 47: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

47

Few in infosec realize containers aren’t just featherweight VMs

Page 48: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

48

2019: 94% have concerns on container security – leading 42% to delay adoption

Source: Tripwire

Page 49: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

49

54% acknowledge inadequate container security knowledge among teams

Source: Tripwire

Page 50: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

50

Source: Tripwire

52%

43%

42%

40%

Lack of visibility into container security

Inability to assess container image risk pre-deploy

Lack of tools to secure containers

Insufficient processes to handle fundamental differencesin securing containers

Page 51: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

51

52% want incident detection & response. 49% want isolation of pwned containers.

Source: Tripwire

Page 52: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

52

40% want “AI security analytics” & 22% want “blockchain” to secure containers.

Source: Tripwire

Page 53: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

53

We can presume at least 22% of security pros have nfi what containers are.

Page 54: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

54

Straw man: each container needs its own monitoring, management, & securing

Page 55: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

55

Standardization fear: vulns can be replicated ad infinitum

Page 56: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

56

Because scanning for vulns in monolithic, custom-built Java apps is easy???

Page 57: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

57

Rose-tinted glasses: monolithic apps = “You know exactly where the bad guys are going to try to get in”

Page 58: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

58

Microservices: easily mapped workflows means easier threat models

Page 59: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

59

Container fear: shared environments (just like with cloud previously)

Page 60: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

60

Should we go back to apps talking over FTP, telnet, SSH, random UDP ports, etc.?

Page 61: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

61

Past: get in via a running FTP service

Containers: exploit the web server

Page 62: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

62

Container fear: too easy for devs to use vulnerable versions of software

Page 63: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

63

As opposed to what – versions of Windows Server 2008 with Metasploit backdoors ready to go?

Page 64: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

64

Separating complex functionality into separate services is better for security

Page 65: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

65

Now that we’ve explored the tinfoil universe, how do we return to reality?

Page 66: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

Cheat Codes for Dealing with This Mess

Page 67: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

67

How can we evangelize real threat models & solutions in this new world?

Page 68: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

68

Warning: Infosec largely views DevOps as a frenemy (at best)

Page 69: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

69

“DevOps is like a black hole to security teams because they have no idea what DevOps is doing and have no way of ensuring security policy is enforced.”

Page 70: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

70

Telling someone gripped by fear to “calm down” will backfire

Page 71: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

71

Acknowledge there are relevant concerns for using this tech – just not the ones they believe

Page 72: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

72

Which concerns should you highlight? There are three critical basics:

Page 73: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

73

1. Don’t expose cloud storage publicly

2. Don’t use unauthenticated APIs

3. Don’t use “god mode” in containers

Page 74: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

74

Infosec’s job becomes validating adherence to established best practices

Page 75: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

75

Analogize “new security” to pre-Copernican methods to facilitate comms

Page 76: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

76

Example: security groups & network isolation by CSPs = firewall equivalent

Page 77: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

77

Amazon Inspector + AWS Trusted Advisor are great tools to start

Page 78: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

78

Use IAM roles for least priv or segment prod + dev through different accounts

Page 79: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

79

Basic API hygiene will suffice – auth, validation, & not trusting external data

Page 80: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

80

Example: Don’t expose API keys in the URL, only use HTTPS endpoints, etc.

Page 81: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

81

Validate input & content types. Explicitly define intended types & reject all others.

Page 82: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

82

Analogize this as a form of granular whitelisting only possible with APIs

Page 83: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

83

For containers, restrict access – no “god mode”, no anon access, don’t expose management dashboards, etc.

Page 84: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

84

Any CISO will already be familiar with the concept of “Least Privilege”

Page 85: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

85

Containers = antidote to the “Equifax problem” (patching procrastination)

Page 86: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

86

Container registries make security scanning easier & add sense of control

Page 87: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

87

Live migration means security can patch without impacting end users

Page 88: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

88

Analogy: Windows updates if Word & PPT docs were migrated to a healthy OS

Page 89: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

89

If misconfigs are covered, what remains for infosec teams to tackle?

Page 90: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

90

Codifying secure configs – modern equivalent of security policy templates

Page 91: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

91

Documenting threat models, starting with scenarios most damaging to the org & working back to likely vectors

Page 92: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

92

Focus on securing data stores – enticing to attackers & less standardized

Page 93: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

93

Help infosec finds database visibility & monitoring tools (e.g. Vivid Cortex)

Page 94: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

94

Cultivates an activity baseline for policy creation & aids in security investigation

Page 95: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

95

Highlight compliance – file integrity monitoring underpins most standards

Page 96: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

96

FIM is easier given the improved inspectability of containers

Page 97: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

97

(Observability isn’t a common term in infosec, but visibility is)

Page 98: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

98

Infosec ppl aren’t all the same – different tactics will work to build understanding

Page 99: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

99

Generally, infosec is more familiar with Windows than Unix, thinks in a network-centric model, & doesn’t have dev skills

Page 100: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

100

Patience, analogies, & proof that not all control is lost are critical ingredients

Page 101: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

Conclusion

Page 102: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

102

Letting go of core, long-held beliefs is difficult for anyone

Page 103: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

103

Most of infosec’s fears of modern tech distill into fears over losing control

Page 104: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

104

Redirect grasping at phantasms towards control of meaningful threat mitigation

Page 105: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

105

Work together to codify standards so infosec can focus on securing “pets”

Page 106: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

106

DevOps can be the Perseus to infosec’s Andromeda

Page 107: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

107

Unchain infosec from their fears & bring forth a new dawn of secure & resilient software delivery performance

Page 108: Security Delusions - swagitda › speaking › Security-Delusions-Kelly...Microservices fears: APIs + containers 33 Horror story: microservices creates a titanic, labyrinthian attack

108

@swagitda_

/in/kellyshortridge

[email protected]