Slide 1

Slide 1 text

Open Source Cloud Strategies and Solutions Towards Reliability and Compliance Security at Scale

Slide 2

Slide 2 text

Open Source is the default.

Slide 3

Slide 3 text

96% of applications have OSS dependencies and they're in your repos. 96% of applications have OSS dependencies and they're in your repos.

Slide 4

Slide 4 text

Sr. Developer Advocate at HashiCorp for Infrastructure and Orchestration @ksatirli he / him Kerim Satirli

Slide 5

Slide 5 text

developer's environment and remote experiences develop developer's environment and build environments build build environments and artifact registries store orchestration platforms (Nomad, Kubernetes etc) run Software Delivery Lifecycle

Slide 6

Slide 6 text

trust trust developer's environment and remote experiences developer's environment and build environments build environments and artifact registries orchestration platforms (Nomad, Kubernetes etc) trust trust Software Delivery Lifecycle

Slide 7

Slide 7 text

Using unverified code is like doing a trust fall with people you don't know.

Slide 8

Slide 8 text

Assume hostile intent for any unverified code.

Slide 9

Slide 9 text

01 Securing Development

Slide 10

Slide 10 text

! dscl . -read /Groups/admin GroupMembership GroupMembership: root Terminal "

Slide 11

Slide 11 text

! dscl . -read /Groups/admin GroupMembership GroupMembership: root kerim # Terminal $

Slide 12

Slide 12 text

Endpoint Protection is important.

Slide 13

Slide 13 text

Securing Development Level 1 ▪ clear guidelines on what is acceptable and what isn’t ▪ locally available tooling to verify code meets rulesets Level 2 ▪ automated linting and testing after git push ▪ cryptographically signed and verified commits Level 3 ▪ branch protection and required trust levels ▪ no unaudited bypassing of security functionality

Slide 14

Slide 14 text

02 Protecting Builds

Slide 15

Slide 15 text

Protecting Builds Level 1 ▪ no builds using unsigned or unverified commits ▪ build server configuration is codified and tested Level 3 ▪ all builds have a validated software bill of materials ▪ all builds are hermetic, all dependencies packaged Level 2 ▪ actively create and store tamper-proof build logs ▪ build server configuration uses strong addressing

Slide 16

Slide 16 text

03 Safeguarding Artifacts

Slide 17

Slide 17 text

Safeguarding Artifacts Level 1 ▪ artifacts must be fully cryptographically signed ▪ monitor for outliers in artifact attributes Level 2 ▪ isolate artifact servers by application environment ▪ limit admin access and regularly audit access Level 3 ▪ all dependencies must be explicitly allowed for use ▪ artifacts must pass regular scans while "live"

Slide 18

Slide 18 text

04 Securing Orchestrators

Slide 19

Slide 19 text

Securing Orchestrators Level 1 ▪ consider the shared responsibility model ▪ lock down ingress and egress of service interface Level 2 ▪ only allow codified workloads to be executed ▪ define a clear secrets management strategy Level 3 ▪ right-size hardware and monitor for zombie usage ▪ build patterns to fail securely instead of safely

Slide 20

Slide 20 text

Codified Patterns github.com/workloads/

Slide 21

Slide 21 text

Defense requires Layers.

Slide 22

Slide 22 text

Layers require People.

Slide 23

Slide 23 text

Security is a Team Sport.

Slide 24

Slide 24 text

Open Source Cloud Strategies and Solutions speakerdeck.com/ksatirli Thank you