The evolving practice of security Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall He/His/Him michael@bruntonspall.com https://tinyletter.com/cyberweekly Michael Brunton-Spall Bruntonspall Ltd
Why is security evolving Where we’ve come from Where we are going Michael Brunton-Spall Bruntonspall Ltd
How to rethink security practices in organisations Michael Brunton-Spall Bruntonspall Ltd
Some Context Michael Brunton-Spall Bruntonspall Ltd
2005 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 6
2010 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 7
2013 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 8
2018 2018 Michael Brunton-Spall Bruntonspall Ltd 08/03/2019 9
Maginot Line Michael Brunton-Spall Bruntonspall Ltd
1930 France “We’d really like the Germans not to invade” Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
In WW1, they came slowly overland and built trenches Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The Germans had invented Blitzkrieg “Lightning Strike” which simply went around Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The French were fighting a war from 1920 against an adversary using 1939 techniques Michael Brunton-Spall Bruntonspall Ltd
The evolution of compute Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From on premise to cloud Michael Brunton-Spall Bruntonspall Ltd
Physical machine Michael Brunton-Spall Bruntonspall Ltd
Remote hosted machine Michael Brunton-Spall Bruntonspall Ltd
Virtual machines in a data center Michael Brunton-Spall Bruntonspall Ltd
Virtual machines at scale Michael Brunton-Spall Bruntonspall Ltd
Side note: Wardley Mapping Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Why Wardley Maps? Michael Brunton-Spall Bruntonspall Ltd
We can see changing landscapes Michael Brunton-Spall Bruntonspall Ltd
We can discuss strategies Michael Brunton-Spall Bruntonspall Ltd
A map isn’t reality, it’s just an abstraction Michael Brunton-Spall Bruntonspall Ltd
Things evolve Michael Brunton-Spall Bruntonspall Ltd
As servers move from physical to virtual, single to multiple, practice evolves Michael Brunton-Spall Bruntonspall Ltd
Coevolution of product and practice Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From pets to cattle Michael Brunton-Spall Bruntonspall Ltd
How do we administer servers? Michael Brunton-Spall Bruntonspall Ltd
Worries about hard drives, CPU’s, power etc Michael Brunton-Spall Bruntonspall Ltd
Cloud providers give us abstractions Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
We stop worrying about whether a hard drive fails in a server Michael Brunton-Spall Bruntonspall Ltd
This results in changing operations practice Michael Brunton-Spall Bruntonspall Ltd
DevOps, SRE Michael Brunton-Spall Bruntonspall Ltd
This results in different developer consumption of operations Michael Brunton-Spall Bruntonspall Ltd
Kubernetes, Serverless Michael Brunton-Spall Bruntonspall Ltd
What does this mean for security? Michael Brunton-Spall Bruntonspall Ltd
How we think about security has to change Michael Brunton-Spall Bruntonspall Ltd
Security practices are evolving Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Traditional security is about assurance Michael Brunton-Spall Bruntonspall Ltd
Where will my data sit Michael Brunton-Spall Bruntonspall Ltd
Where does the data go Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
This works when you have individual servers Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work with modern cloud Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work th the e same same with modern cloud Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
“Skate to where the puck is going, not where it has been” Wayne Gretsky Michael Brunton-Spall Bruntonspall Ltd
Where the puck was yesterday Michael Brunton-Spall Bruntonspall Ltd
What are solved problems? Michael Brunton-Spall Bruntonspall Ltd
Commonly solved the same way Michael Brunton-Spall Bruntonspall Ltd
Productionised processes Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
SDLC, Assurance of suppliers, network assurance, hardware assurance Michael Brunton-Spall Bruntonspall Ltd
All cloud customers have similar concerns in this area Michael Brunton-Spall Bruntonspall Ltd
Buy don’t Build Michael Brunton-Spall Bruntonspall Ltd
Compliance via certificates ISO27001, CSA, ISO27017, SOC, FISMA, HIPAA … Michael Brunton-Spall Bruntonspall Ltd
Where the puck is today Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Continuous Integration, Continuous Deployment, DevOps Michael Brunton-Spall Bruntonspall Ltd
Patching Michael Brunton-Spall Bruntonspall Ltd
How quickly can you patch? Michael Brunton-Spall Bruntonspall Ltd
DevOps Michael Brunton-Spall Bruntonspall Ltd
How secure is your code? Michael Brunton-Spall Bruntonspall Ltd
Code review and Pull requests Michael Brunton-Spall Bruntonspall Ltd
Staff identity and single sign on Michael Brunton-Spall Bruntonspall Ltd
Zero Trust Networking Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
But where is the puck going? Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Adversary thinking Michael Brunton-Spall Bruntonspall Ltd
ATT&CK Framework Michael Brunton-Spall Bruntonspall Ltd
Goals, Restrictions Michael Brunton-Spall Bruntonspall Ltd
No adversary has unlimited funds, time and energy Michael Brunton-Spall Bruntonspall Ltd
Anti Personas Michael Brunton-Spall Bruntonspall Ltd
Han Solo Motivation Han Solo is motivated primarily by money, but also works with the rebel alliance. Han is capable of using common tools as well as modifying existing tools on the fly Capabilities Han doesn’t want to be caught and so takes an Resources: 2/5 effort to avoid head on confrontations Capability: 4/5 Connections Bravery: 2/5 Rebel Alliance, Hutts Criminal connections: 3/5 Michael Brunton-Spall Bruntonspall Ltd
Red Teams Michael Brunton-Spall Bruntonspall Ltd
Internal pentesting Michael Brunton-Spall Bruntonspall Ltd
Threat Hunting Michael Brunton-Spall Bruntonspall Ltd
DevSecOps Michael Brunton-Spall Bruntonspall Ltd
Security as code Michael Brunton-Spall Bruntonspall Ltd
Compliance as Code Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Cloud configuration as code Michael Brunton-Spall Bruntonspall Ltd
Pull requests = audit trail Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Recommend
More recommend