Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Operationalizing Security Controls: Getting You...

Operationalizing Security Controls: Getting Your Program to Shift Left

This presentation will focus on how DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage. In addition, this presentation will demonstrate how the future can support for more cost effective governance models, regardless of industry or size of IT environment.

VerSprite, Inc

February 16, 2019
Tweet

More Decks by VerSprite, Inc

Other Decks in Technology

Transcript

  1. @t0nyuv LinkedIn.com/tonyuv Tony UcedaVélez CEO/ Founder, VerSprite VerSprite.com - Global

    Security Firm • OWASP Atlanta Chapter Leader (past 10 years) • Author, “Risk Centric Threat Modeling – Process for Attack Simulation & Threat Analysis”, Wiley June 2015 • Passionate global, threat modeling evangelist • ~25 years of diverse IT/ Security experience in software development, architecture, pen testing, threat modeling, sys admin, security operations • Dreams of bankrupting #infosec with intelligent, threat inspired DevSecOps automation
  2. • Usually led by overzealous technologist(s) • Multiple technologies downloaded

    • Limited in-house expertise • Automation utopias promised • 80% cost saving projections What’s Said...
  3. • Orphaned technologies • Unmaintained repos, VMs, containers, VPCs, etc.

    • Account sprawl across environments • Lost time, money & credibility Vs. What Actually Happens
  4. What are we Solving via DevSecOps? Traditional IT Activities Alleviated

    w/ Automation • Reducing security control gaps across the stack • Reducing time associated w/ manual configurations • Improving recovery efforts for security incidents • Accelerating common security abuse case testing • Increasing security assurance levels per environment • Assurance vs. Patch Management approaches • Building security requirements into products & platforms • Moving security ‘left’ of implementation SDLC stages • Eliminating vulnerabilities in deployment pipeline • Operationalizing governance
  5. Goals of Shifting Left • Ensure that lower Dev environments

    receive security configurations; not just Prod • Helps reduce environmental discrepancies around security, privacy, and other control factors • Shifting Left can also related to introducing security earlier in a software development lifecycle • Goals are to operationalize or automate security efforts via code and Continuous Integration & Continuous Delivery
  6. •Assurance Certifying Platforms & Overall Environments Validating 3rd party libraries

    •Governance & Compliance Building security controls in Alignment to regulatory requirements •Agile Security Testing Testing use cases faster, fixing faster Layers of Need Speed, Accuracy, & Assurance – Tomorrow’s New Security Paradigm
  7. •An AppSec pipeline integrates activities like SAST, DAST as part

    of process to test, validate, fix and deploy •OWASP has a sample pipeline schematic denoting where integrated testing can occur (see right) •Tools such as OWASP Glue are interesting and still supported to help security efforts in CI/ CD Ruby Gems project that is fairly well maintained. •Similar to StackStorm in the sense you are also automating AppSec pipeline •https://www.owasp.org/index.php/OWASP_ Glue_Tool_Project Building an AppSec Pipeline
  8. Threat Models as Blueprints Mapping Automation Opportunities into the DSc

    • Threat Modeling not just a point in time activity • Application Threat models provide blueprint for S-SDLC activities • PASTA as a Risk Centric Approach • Full stack • Threat integration • Exploit testing automation • Building Security-In • Building Compliance-In •Provides a collaborative approach to make DevSecOps a planned success vs. ad hoc wish.
  9. Planning Automation All Phases are Left of SDLC Deployment Phases

    •STAGE 1 can define pre-emptive mitigation strategies via hardening, control adherence •STAGE 2 identifies risks stemming from vuln components from attack surface •STAGE 3 understand security context of callers in application architecture. •STAGE 4 can identify threats that can be addressed earlier in SDLC •STAGE 5 & 6 can audit code, app configs, & app responses •STAGE 7 identifies residual risks & determines pass/fail criteria for app acceptance Stage 1 Stage 2 Stage 7 Stage 5 ,6 Stage4 Stage 3
  10. Remediation Workflows - Information Collection •Retrieve logged users (actor inventory,

    security context) •Retrieve open files •Retrieve listening ports (security hardening objectives) •Retrieve established connections (PASTA Stage 3) •Retrieve running processes (baseline configurations, NIST CM) •Retrieve file hashes (data integrity) •Retrieve logs from /var/log/* (logging, auditing) •Upload information to Rackspace CloudFiles (archiving)
  11. Operationalizing Governance Mapping Automation Opportunities into the SDLC •12.3 Use

    cryptographic controls to protect your information •There are multiple ways to ‘comply’ with a control •Automate checks with Puppet, Chef, Ansible, Vagrant, Terraform •Checks can sometimes run natively on native platforms Auditor GRC 3rd Party Audits NetSec SysSec DB Sec AppSec (subjective control presence) (subjective control presence) (subjective control presence) Ex: CA Signing, encryption algorithm Ex: Disk encryption status Ex: Field vs. Table Encryption Ex: employing proper TLS levels for in-transit
  12. • Automatically issue TLS certs • Vault feature can be

    used to automate TLS certs to TLS clients & servers • Validate TLS presence • Provide assurance to client-server environments across desired environments • PROD|STAGE|UAT|QA|TEST • Terraform scripts interface w/ Vault to generate CSR, issue certs • Chef, Puppet, Ansible all have similar variants for secret/ key management 12.3 Use Cryptographic Controls … NetSec Control Implementation Example Using Vault Provider
  13. • Simple powershell script can be checked into any config

    management tool • Can be run as a service account • Can be run when configuring VMs for any environment • Provides assurance to encrypted file systems • Output can be stored automatically via interfaces to Sharepoint, Confluence, GRC platforms 12.3 Use Cryptographic Controls … SysSec Control Validation Example Using Native Capabilities
  14. • Integrating SAST via automation tools like OWASP Glue •

    Linting or static code analysis can be carried out by various tools ◦ Bandit is one for Python • Automatic linting for Python can be automated via tools like OWASP Glue ◦ Targets can include: file systems, git repos, dockerfiles, iso files, etc.) • Series of tasks that can be defined ◦ Bandit task for SAST on python codebase • DAST tasks can be defined w/ ZAP ◦ ruby bin/glue -t zap --zap-host http://localhost --zap-port 1234 –z p-passive-mode http://juice-shop • TeamCity Integration Example ◦ ruby bin/glue -t zap --zap-host http://localhost --zap-port 1234 --zap-passive-mode http://juice-shop -f teamcity 12.6 Establish Technical Vulnerability Management
  15. 11.2.2 Control the Management of System Privileges All Phases are

    Left of SDLC Deployment Phases •Another ISO Control Implementation (ISO 27002 11.2 Domain) •Ensuring the security context of actors running 3rd party software or internal software is not elevated •Chef automation scripts can validate Apache web server environments that are in scope •Multiple baselines exist and can be code as checks using Ansible, Chef, Puppet •Great resource: https://dev-sec.io/baselines/apache/
  16. Did You Know? • Security product vendors want to have

    customers that use their products. • DevSecOps can leverage many security, compliance products today; find the ones that work. • DevSecOps can increase TCO for current solutions and help create workflows via integration
  17. • Define Goals: Compliance? Improved Security Posture? Security Cost Reduction?

    IP Preservation ◦ Regulatory landscape for application(s) • Identify Attack Surface ◦ This will be the object of DevSecOps automation • Understand Flows via App Decomposition ◦ Static API Calls, ◦ SAST/ DAST reports ◦ Actors & their Security Context • Threat Analysis ◦ Harvest alerts that feed triggers on OWASP Glue, StackStorm • Vuln/ Weakness Detection ◦ Go beyond the AppStack (concern for integrated dependencies) ◦ CVE, CWE to CAPEC mapping • Attack Modeling ◦ Automated & Integrated SAST / DAST ◦ Queuing for manual exploits (vFEED) • Residual Risk | Countermeasure Development ◦ Getting to remediation quicker • Eliminating time spent on FPs Leveraging PASTA to Encompass Goals & Scope ISO Controls for Automation 12.4 - Protect Source Code 11.4.2 Auth remote user connections 13.1.2 – DAST Automation via Jenkins & Zed Attack Proxy 12.1.1 Identify InfoSec requirements
  18. • Low-touch high-value assessments for your Cloud environment ideal for

    baseline, testing and monitoring remediation. • Utilize control guidance defined by CSA 3.1, CIS benchmarks, Microsoft and Amazon. • Automated checks continually evolving; Combination of VerSprite developed, CSP provided, and Open Source tooling • Key areas covered: Cloud Security Auditing Assessment and Remediation • Public attack surface • Identity & Access Management • Networking • Virtual Compute (VM) • Application Containers • Storage • Database • Logging and Alerting • Security Center (Azure) • Security Hub/GuardDuty (AWS)
  19. • Focus coverage of HIPAA/HITECH, ISO 27001, FedRAMP. • Cloud

    controls (automated checks) mapped directly to compliance control domains. • Example mappings: ◦ CIS Benchmarks for AWS 1.1-1.16 (IAM) => ISO 27001 control domain 9.x ◦ CIS Benchmarks for Azure 5.1- 5.13 (Logs) => HIPAA 164.308 • Data encryption (S3, Database) => FedRAMP SC-13 • Monthly audit drives evidence collection supporting audits for baseline and deltas. • Integrate control results into Azure Security Center and AWS Security Hub (in preview) for central dashboard. Cloud Security Auditing Control Domains and Compliance