Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security In Automation

jamfish
August 25, 2017

Security In Automation

Given at CodeMania and Uptime

jamfish

August 25, 2017
Tweet

More Decks by jamfish

Other Decks in Technology

Transcript

  1. Person Jamesha Fisher • Security Operations Engineer at GitHub •

    Love Automation, Ops and Security • Aspires to be Garnet, a badass character from Steven Universe (though I fail with my version of future vision)
  2. Jamesha Fisher • Security Operations Engineer at GitHub • Love

    Automation, Ops and Security • Aspires to be Garnet, a badass character from Steven Universe (though I fail with my version of future vision)
  3. Person What we’re gonna talk about: • Why Security Automation?

    • What is Security Automation? • Starting Small • What is Security Automation? Part II • Starting from Scratch
  4. My definition of Security Automation: “the technique of making a

    security apparatus, process, or system operate automatically”
  5. What Boardboat Does • Listens for Command to Onboard or

    Offboard • After some checks, Duo Authentication Request is made (which must be confirmed on caller’s phone) before command execution continues. • For Offboarding, command disables/removes access for a set of users leaving the company. • Results of this are written to a log that’s linked, and the link is returned to the slack channel when the command is finished.
  6. What Aegis Does • Listens for Command to Change Secret

    (if prod, requires Duo flag for Auth) • After perm checks, Duo Authentication Request is made (which must be confirmed on caller’s phone) before command execution continues. • Certificate is renewed via calls to Certificate Vendor’s API, and committed to a data repo with a pull request. • Pull request link is returned to slack channel for review.
  7. Cause you said: “Security automation is the technique of making

    a security apparatus, process, or system operate automatically”
  8. I also don’t think going Dev way all the way

    is going to be helpful either.
  9. Security Automation: “the technique of making security from a known

    apparatus, process, or system operate automatically”
  10. What Bino Does • Listens for Commands to Scan IP

    • Does Checks & Duo Auth (same as the others) • Post checks, Bino makes an API call to scan the specified IP, then an API call for the results if the scan succeeds • Bino then calls to generate report and returns the url for review and triage.
  11. • Security Automation is the technique of making security from

    known apparatus, process, or system operate automatically. • Start Small with what exists: ◦ User Management ◦ Quickly Changing (or Rolling) Secrets • Security from Scratch requires: ◦ A Collaboration of Security and Company ◦ Input, Iteration (aka Change) Things to Keep in Mind This is the slide to photograph….