Upgrade to Pro — share decks privately, control downloads, hide ads and more …

AWS Security the DevOps Way (AWS Loft SF Edition)

AWS Security the DevOps Way (AWS Loft SF Edition)

DevOps methodologies have transformed the way we run operations and interact with product development. However, security has been slow to react to the DevOps revolution. In this talk, I discuss what you need to do to do security the DevOps way in AWS.

John Martinez

July 16, 2015
Tweet

More Decks by John Martinez

Other Decks in Technology

Transcript

  1. AWS Security the DevOps Way AWS Pop-Up Loft SF John

    Martinez Principal Solutions Architect July 16, 2015
  2. About Me ▪Been doing DevOps and Cloud stuff for ~5

    years ▪Helped architect and build Creative Cloud @ Adobe ▪Cut my teeth on “the cloud” at Netflix ▪UNIX and Linux throat beard for >20 years ▪I now talk to people about security for a living ▪I’m completely addicted to building Raspberry Pi 2’s for random things around the house 2
  3. Why do Security? 4 Reasons Vary by Organization Regulatory Customers

    Demand It Industrial Partners Demand It Self-Imposed Protect Your IP Imposed Upon You Steal Their IP
  4. Modern Security Sucks 9 Dependent on presence Doesn’t understand non-TCP/IP

    stacks Too human-dependent Assumption that resources are relatively static Attackers use automation, defenders don’t Security companies don’t get Cloud and DevOps
  5. Rugged DevOps http://devops.com/2015/04/20/the-rugged-devops-ebook/ What is Rugged Software? “Rugged” describes software

    development organizations which have a culture of rapidly evolving their ability to create available, survivable, defensible, secure, and resilient software. —From www.ruggedsoftware.org * Disclaimer: Evident.io was one of the corporate sponsors for the production cost of the book – we believe in it! 11
  6. Host Integrity The Old Way Expensive, single purpose tools 14

    The New Way Configuration Management platforms like Chef, Puppet, Ansible
  7. Compliance 15 The New Way Automated compliance testing, evidence and

    audits The Old Way Quarterly audits, manual reviews “You are in direct violation of PCI DSS 3.0 requirement 3 section 6.1. You have 10 seconds to comply…”
  8. Incident Management 17 The New Way Instant, out of band

    forensic data and automation The Old Way Long discovery phase of breach, panic
  9. Infrastructure Security 18 The New Way Template-based infrastructure via CloudFormation,

    (commercial) Evident.io The Old Way Homegrown scripts, outdated CMDB
  10. What you should take away 19 Don’t wait for security

    to come to you – chase it 1 Automate your security behaviors 2 Champion the marriage of DevOps & Security 3
  11. Coming Soon to a Loft Near You (SF or NYC)

    20 Programmatic Security (with real code, too!)