does agile make us less secure
play

Does agile make us less secure? Security in a post devops world - PowerPoint PPT Presentation

Does agile make us less secure? Security in a post devops world YOW! Sydney 2019 Michael Brunton-Spall Bruntonspall Ltd Michael Brunton-Spall He/His/Him michael@bruntonspall.com Michael Brunton-Spall Bruntonspall Ltd The second most


  1. Does agile make us less secure? Security in a post devops world YOW! Sydney 2019 Michael Brunton-Spall Bruntonspall Ltd

  2. Michael Brunton-Spall He/His/Him michael@bruntonspall.com Michael Brunton-Spall Bruntonspall Ltd

  3. The second most scariest words in the English language Michael Brunton-Spall Bruntonspall Ltd

  4. The second most scariest words in the English language “Hi, I’m from the Government and I’m here to help” Michael Brunton-Spall Bruntonspall Ltd

  5. The scariest words in the English language? Michael Brunton-Spall Bruntonspall Ltd

  6. The scariest words in the English language? “Hi, I’m from security and I’m here to help” Michael Brunton-Spall Bruntonspall Ltd

  7. Michael Brunton-Spall Bruntonspall Ltd

  8. https://cyberweekly.net Michael Brunton-Spall Bruntonspall Ltd

  9. Why is security evolving Where we’ve come from Where we are going Michael Brunton-Spall Bruntonspall Ltd

  10. How to rethink security practices in organisations Michael Brunton-Spall Bruntonspall Ltd

  11. Some Context Michael Brunton-Spall Bruntonspall Ltd

  12. 2006 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 12

  13. 2010 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 13

  14. 2013 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 14

  15. 2015 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 15

  16. 2019 Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 16

  17. Michael Brunton-Spall Bruntonspall Ltd

  18. Michael Brunton-Spall Bruntonspall Ltd

  19. Michael Brunton-Spall Bruntonspall Ltd

  20. Michael Brunton-Spall Bruntonspall Ltd

  21. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 21

  22. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 22

  23. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 23

  24. Michael Brunton-Spall Bruntonspall Ltd 06/12/2019 24

  25. Michael Brunton-Spall Bruntonspall Ltd

  26. Maginot Line

  27. 1930 France Michael Brunton-Spall Bruntonspall Ltd

  28. “We’d really like Germany not to invade us” Michael Brunton-Spall Bruntonspall Ltd

  29. In WW1, they came slowly overland and built trenches Michael Brunton-Spall Bruntonspall Ltd

  30. Michael Brunton-Spall Bruntonspall Ltd

  31. Michael Brunton-Spall Bruntonspall Ltd

  32. Michael Brunton-Spall Bruntonspall Ltd

  33. The Germans had invented Blitzkrieg “Lightning Strike” which simply went around Michael Brunton-Spall Bruntonspall Ltd

  34. Michael Brunton-Spall Bruntonspall Ltd

  35. The French were fighting a war from 1920 against an adversary using 1939 techniques Michael Brunton-Spall Bruntonspall Ltd

  36. Evolution

  37. Michael Brunton-Spall Bruntonspall Ltd

  38. Custom built minicomputer Michael Brunton-Spall Bruntonspall Ltd

  39. Servers in data center Michael Brunton-Spall Bruntonspall Ltd

  40. Colocated servers Michael Brunton-Spall Bruntonspall Ltd

  41. Virtual private servers Michael Brunton-Spall Bruntonspall Ltd

  42. Virtual machines at scale Michael Brunton-Spall Bruntonspall Ltd

  43. Michael Brunton-Spall Bruntonspall Ltd

  44. Michael Brunton-Spall Bruntonspall Ltd

  45. Why Wardley Maps? Michael Brunton-Spall Bruntonspall Ltd

  46. We can see changing landscapes Michael Brunton-Spall Bruntonspall Ltd

  47. We can discuss strategies Michael Brunton-Spall Bruntonspall Ltd

  48. A map isn’t reality, it’s just an abstraction Michael Brunton-Spall Bruntonspall Ltd

  49. Things evolve Michael Brunton-Spall Bruntonspall Ltd

  50. As servers move from physical to virtual, single to multiple, practice evolves Michael Brunton-Spall Bruntonspall Ltd

  51. Coevolution of product and practice

  52. Michael Brunton-Spall Bruntonspall Ltd

  53. Michael Brunton-Spall Bruntonspall Ltd

  54. Michael Brunton-Spall Bruntonspall Ltd

  55. How do we administer servers? Michael Brunton-Spall Bruntonspall Ltd

  56. Worries about hard drives, CPU’s, power etc Michael Brunton-Spall Bruntonspall Ltd

  57. Cloud providers give us abstractions Michael Brunton-Spall Bruntonspall Ltd

  58. Michael Brunton-Spall Bruntonspall Ltd

  59. We stop worrying about whether a hard drive fails in a server Michael Brunton-Spall Bruntonspall Ltd

  60. This results in changing operations practice Michael Brunton-Spall Bruntonspall Ltd

  61. DevOps, SRE Michael Brunton-Spall Bruntonspall Ltd

  62. This results in different developer consumption of operations Michael Brunton-Spall Bruntonspall Ltd

  63. Kubernetes, Serverless Michael Brunton-Spall Bruntonspall Ltd

  64. Michael Brunton-Spall Bruntonspall Ltd

  65. What does this mean for security? Michael Brunton-Spall Bruntonspall Ltd

  66. How we think about security has to change Michael Brunton-Spall Bruntonspall Ltd

  67. Security practices have to evolve Michael Brunton-Spall Bruntonspall Ltd

  68. Michael Brunton-Spall Bruntonspall Ltd

  69. Traditional security is about assurance Michael Brunton-Spall Bruntonspall Ltd

  70. Where will my data sit Michael Brunton-Spall Bruntonspall Ltd

  71. Where does the data go Michael Brunton-Spall Bruntonspall Ltd

  72. Michael Brunton-Spall Bruntonspall Ltd

  73. This works when you have individual servers Michael Brunton-Spall Bruntonspall Ltd

  74. This doesn’t work with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  75. This doesn’t work th the e same same with modern cloud Michael Brunton-Spall Bruntonspall Ltd

  76. Security is currently fighting a war from a decade ago Michael Brunton-Spall Bruntonspall Ltd

  77. Mapping Security

  78. Michael Brunton-Spall Bruntonspall Ltd

  79. “Skate to where the puck is going, not where it has been” Wayne Gretsky Michael Brunton-Spall Bruntonspall Ltd

  80. Where the puck was yesterday Michael Brunton-Spall Bruntonspall Ltd

  81. What are solved problems? Michael Brunton-Spall Bruntonspall Ltd

  82. Commonly solved the same way Michael Brunton-Spall Bruntonspall Ltd

  83. Productionised processes Michael Brunton-Spall Bruntonspall Ltd

  84. Michael Brunton-Spall Bruntonspall Ltd

  85. SDLC, Assurance of suppliers, network assurance, hardware assurance Michael Brunton-Spall Bruntonspall Ltd

  86. All cloud customers have similar concerns in this area Michael Brunton-Spall Bruntonspall Ltd

  87. Buy don’t Build Michael Brunton-Spall Bruntonspall Ltd

  88. Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA … Michael Brunton-Spall Bruntonspall Ltd

  89. Where the puck is today Michael Brunton-Spall Bruntonspall Ltd

  90. Michael Brunton-Spall Bruntonspall Ltd

  91. Continuous Integration, Continuous Deployment, DevOps Michael Brunton-Spall Bruntonspall Ltd

  92. Patching Michael Brunton-Spall Bruntonspall Ltd

  93. How quickly can you patch? Michael Brunton-Spall Bruntonspall Ltd

  94. DevOps Michael Brunton-Spall Bruntonspall Ltd

  95. How secure is your code? Michael Brunton-Spall Bruntonspall Ltd

  96. Code review and Pull requests Michael Brunton-Spall Bruntonspall Ltd

  97. Staff identity and single sign on Michael Brunton-Spall Bruntonspall Ltd

  98. Zero Trust Networking Michael Brunton-Spall Bruntonspall Ltd

  99. Michael Brunton-Spall Bruntonspall Ltd

  100. But where is the puck going? Michael Brunton-Spall Bruntonspall Ltd

Recommend


More recommend