Top Banner
SESSION ID: SESSION ID: #RSAC Jeffrey Kok Taking a DevOps Approach to Securing Privileged Credentials in DevOps Senior Director, Asia Pacific and Japan CyberArk [email protected] GPS-F01B
21

Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Apr 17, 2018

Download

Documents

vanque
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

SESSION ID:SESSION ID:

#RSAC

Jeffrey Kok

Taking a DevOps Approach to Securing Privileged Credentials in DevOps

Senior Director, Asia Pacific and [email protected]

GPS-F01B

Page 2: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq2

Application architectures are getting pulverized

Monolith Virtualized Containerized Micro Services

All may need access to secrets. Some are very short-lived.

How do we manage all this?

Page 3: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

Automation enables reliable, rapid change at scale

Page 4: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

So basically, robots are your administrators now

Page 5: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq5

Providing all kinds of new opportunities

It’s all automated – nobody’s really watching it

So many new tools...

Unchanged, shared,over-provisioned

secrets

New ways to access servers

Look for API keys, AWS servers/images that are publicly available and use default secrets or cache secrets in plain text

Page 6: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

MALWAREOPERATIONAL

EFFICIENCYCOMPLIANCETHIRD PARTY

ACCESS

BREACHES & INSIDER THREATS

Page 7: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

MALWAREOPERATIONAL

EFFICIENCYCOMPLIANCE

A hacker accessed a docker registry that contained the entire source code, API keys and secrets

THIRD PARTYACCESS

Page 8: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

MALWAREOPERATIONAL

EFFICIENCYCOMPLIANCE

A hacker accessed a docker registry that contained the entire Vine source code, API keys and secrets

The initial intrusion into organization’s systems was traced back to network credentials that were stolen from a third-party vendor

Page 9: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

A hacker accessed a docker registry that contained the entire Vine source code, API keys and secrets

The initial intrusion into Target’s systems was traced back to network credentials that were stolen from a third-party vendor

UK-based telco was fined a record £400,000 due to a breach that exposed the personal data of 150,000 customers

MALWAREOPERATIONAL

EFFICIENCY

Page 10: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

A hacker accessed a docker registry that contained the entire Vine source code, API keys and secrets

The initial intrusion into Target’s systems was traced back to network credentials that were stolen from a third-party vendor

UK-based telco TalkTalk was fined a record £400,000 due to a breach that exposed the personal data of 150,000 customers

Hackers are exploiting known organization’s misconfigurations and vulnerabilities and planting ransomware into high-profile clients such as Emory Healthcare

OPERATIONALEFFICIENCY

Page 11: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

The Threat Surface is Broad

A hacker accessed a docker registry that contained the entire Vine source code, API keys and secrets

The initial intrusion into Target’s systems was traced back to network credentials that were stolen from a third-party vendor

UK-based telco TalkTalk was fined a record £400,000 due to a breach that exposed the personal data of 150,000 customers

Hackers are exploiting known MongoDB misconfigurations and vulnerabilities and planting ransomware into high-profile clients such as Emory Healthcare

Organization had a database containing personal information about drivers compromised after storing the key in a publicly available repository

Page 12: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

Summary of Current Challenges

12

Explosion of short-lived entities that need access to secrets

Scaling to millions of instances in minutes

Privileged automation tools are doing the work of SysAdmins

Cloud and DevOps workflows represent new security risks

Page 13: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

Five Recommended Practices

13

1. Make Secrets Ephemeral

2. No Security Islands

3. Embrace Machine Identity

4. Security-as-Code

5. Good Security UX

Page 14: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

1. Ephemeral Secrets

14

▪ No embedded passwords

▪ Get secrets out of source code

▪ Dynamically fetch them as needed

▪ Use a password rotation strategy for apps you can’t modify easily

Page 15: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

2. No Security Islands

15

Page 16: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

3. Embrace Machine Identity

16

Page 17: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

4. Security as Code (borrowing ideas from Automation)

17

Modern automation tools are declarative Documents describe desired state (the what) Tools configure/remediate to that state (the how)

Security tools need to follow suit w/ Policies This has multiple benefits:

Versioned, like source code Collaborative Encourages design vs. ad hoc administration Automated audit/compliance workflows

Determine if current state aligns with desired state (or not) Ensures consistency across teams, environments and domains Can be used to quickly reconstruct entire structure for new DCs, DR, etc.

Page 18: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

5. Security UX – need to change perception

18

Five short years ago…

DevOps Security

TodayI want

security!

We can produce change reliably, at scale and speed!

Page 19: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq19

Security is a user experience, make it a good one!

Page 20: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

Presenter’s Company Logo – replace or

delete on master slide

#RSAC

wq

RECAP : Five Recommended Practices

20

1. Make Secrets Ephemeral

2. No Security Islands

3. Embrace Machine Identity

4. Security-as-Code

5. Good Security UX

Page 21: Taking a DevOps Approach to Securing Privileged ... · SESSION ID: #RSAC Jeffrey Kok. Taking a DevOps Approach to Securing Privileged Credentials in DevOps. Senior Director, Asia

#RSAC

Thank You!

Jeffrey KokSenior Director, Asia Pacific and [email protected]