Slide 1

Slide 1 text

Platform and Security Engineering join forces to build more secure and robust applications. The death of #security as we know it Christoph Hartmann @chri_hartmann

Slide 2

Slide 2 text

Hi, I am Chris. I am CTO at Mondoo - leader in Security Posture Management What is your background? Y I co-created the open source security projects DevSec Project and InSpec, Co-Founded Vulcano Security (acquired by Chef Software) and was Director of Engineering at Chef Software @chri_hartmann

Slide 3

Slide 3 text

What is the problem? @chri_hartmann

Slide 4

Slide 4 text

4 Hackers used to look like this

Slide 5

Slide 5 text

5 Ransomware is a business Name Name Words words Sales Quotas Playbooks Customer Support Affiliate Programs

Slide 6

Slide 6 text

6 Average of 20% increase of YoY CVE publication

Slide 7

Slide 7 text

Vulnerability Discovery 0⃣ 0-Day Exploit πŸ’₯ Vulnerability discovered πŸ“’ CVE published πŸ— Patch by vendor πŸ“ CVE assigned 0⃣ Exploit ~25% of CVEs have known exploits 14% exploits published before the patches 23% exploits published in the first week after CVE 50% exploits were published in the first month after CVE

Slide 8

Slide 8 text

Patch Rollout 🎟 Tickets created 🐌 Rollout Slow πŸ— Fixed in dev πŸ”Ž Identify in dev πŸ›‘ Report created According to NTT Application Security average time to fix high severity vulnerabilities is about 246 days

Slide 9

Slide 9 text

9 πŸ”₯ Yearly increase of 20% of known vulnerabilities 🏎 Hackers use full automation to discover and hack targets, about 90% of exploits are available within the first month after the CVE has been published 🐌 Rollout of fixes is way too slow Issues outpace the fix

Slide 10

Slide 10 text

10 Independent survey of 1100 IT and security professionals

Slide 11

Slide 11 text

11 Hardening of Infrastructure (Cloud, Servers, Workstation) Patch Management 01 02 Main Problems: Why Hackers are so successful? The same root causes are also corroborated in the Cyber Signals Report by Microsoft that revealed 80% of attacks can be attributed to outdated software and misconfiguration.

Slide 12

Slide 12 text

Why is it so difficult? @chri_hartmann

Slide 13

Slide 13 text

13 Software delivery Local Development Source Control CI/CD Pre-Production Production

Slide 14

Slide 14 text

14 Use Case: Ensure that Cloud Storage Buckets have a uniform bucket level access enabled

Slide 15

Slide 15 text

15 Ensure that Cloud Storage Buckets have a uniform bucket level access enabled Security Engineers focus on attack paths

Slide 16

Slide 16 text

16 Ensure that Cloud Storage Buckets have a uniform bucket level access enabled Platform Engineers focus on automation

Slide 17

Slide 17 text

17 Software delivery Local Development Source Control CI/CD Pre-Production Production

Slide 18

Slide 18 text

18 Leads to frustration

Slide 19

Slide 19 text

19 Security Therapy

Slide 20

Slide 20 text

Interviewed and worked with 100+ Sec/DevOps Leaders Theme In their words…... More organized threats Software is eating the world so hackers are having a feast Wait days/weeks to data Coordinating over 30+ security tools to answer if we have the vulnerability and then waiting for verification it’s been fixed Security owns all the tools DevOps don’t have consistent access to what security uses, just their outputs aka a giant spreadsheet Security vendors are slow Their product roadmap is the same every year, so we hacked a solution to dump into Splunk Unclear on the right priority for the business The trade off between shipping new features vs fixing what security wants us to fix. Re-enforces good practices I need my teams to have a way continuous improve our posture and for management to recognize the effort

Slide 21

Slide 21 text

Security is Hard

Slide 22

Slide 22 text

What is the solution? @chri_hartmann

Slide 23

Slide 23 text

Cloud Services Cluster Nodes Workloads (Deployments / Pods) Cluster Configuration Application Containers Unified View Tech Stack

Slide 24

Slide 24 text

Cloud Services Cluster Nodes Workloads (Deployments / Pods) Cluster Configuration Application Containers Application Delivery Pipeline Local Development Source Control CI/CD

Slide 25

Slide 25 text

25 Ensure that Cloud Storage Buckets have a uniform bucket level access enabled Reach the next level: Focus on Problem

Slide 26

Slide 26 text

26 Software delivery Local Development Source Control CI/CD Pre-Production Production

Slide 27

Slide 27 text

27 What are successful security engineers using Access: Every developer and security engineer has access to the same tooling Coverage: security tooling that supports build and runtime Automation: security tooling that works hand-in-hand with automation Extensible: security tooling that has open source foundation, not hard-coded rules 1 2 3 4

Slide 28

Slide 28 text

28 open source security https://cnquery.io Asset Inventory, search and gather information about your infrastructure https://cnspec.io Security Scanner, scan for vulnerabilities and misconfiguration

Slide 29

Slide 29 text

29 Amazon S3 buckets do not allow public read access S3 Buckets are configured with 'Block public access' Easily ask questions with GraphQL-based MQL

Slide 30

Slide 30 text

30 Use Security as Code to define requirements

Slide 31

Slide 31 text

31 Discover Security Content Security Registry mondoo.com/registry Security Policies github.com/mondoohq/cnspec-policies Inventory and Incident Response Query Packs github.com/mondoohq/cnquery-packs

Slide 32

Slide 32 text

32 We can be more secure! Local Development Source Control CI/CD Pre-Production Production

Slide 33

Slide 33 text

We built a platform we are using we worked at Soo Choi CEO Dominik Richter CPO Christoph Hartmann CTO Patrick MΓΌnch CISO

Slide 34

Slide 34 text

Christoph Hartmann 🐦 @chri_hartmann βœ‰ [email protected] 🏠 mondoo.com Thank you