Real World Cloud Application Security

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Ed Duguid with subject: MACE Cloud
13,000 Jobs and counting…. Advertising and Data Platform Our System.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
©2006 Microsoft Corporation. All rights reserved. Windows Vista Security Tidbits Steve Riley Senior Security Strategist Microsoft Corporation
AppSec USA 2014 Denver, Colorado Project Monterey or how we learned to stop worrying and love the cloud.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Cost Effort Complexity Benefit Cloud Hosted Low Cost Agile Integrated Fully Supported.
Additional SugarCRM details for complete, functional, and portable deployment.
© 2009 VMware Inc. All rights reserved VMworld Update Ian Moore - Country Manager Ireland ie.linkedin.com/in/iantmooreiantmoore.
Comparison of Agility Platform to VMware
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
MCDevOps Infrastructure In One Hour. Sponsors Improving Enterprises Software Development.
Cloud as a Service Chetan Shinde Column Software Technologies Pvt. Ltd.
Promoting Open Source Software Through Cloud Deployment: Library à la Carte, Heroku, and OSU Michael B. Klein Digital Applications Librarian
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
& Dev Ops. Sherwin-Williams & DevOps Introduction to Sherwin-Williams.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Continuous Delivery on AWS
Automating Operational and Management Tasks in Microsoft Operations Management Suite and Azure
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Microsoft Management Seminar Series SMS 2003 Change Management.
Enterprise Cloud Computing
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Copyright © 2015 Splunk Inc. Rob Charlton Cloud DevOps Architect, Vertu Vertu’s digital transformation.
Russell Rice Senior Director, Product Management Skyport Systems
Information Systems in Organizations 5.2 Cloud Computing.
Alfresco on AWS Provisioning and deploying Alfresco solutions on Amazon Web Services.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Windows Azure and iOS Chris Risner Windows Azure Technical Evangelist Microsoft
Cloud Installation & Configuration Management. Outline  Definitions  Tools, “Comparison”  References.
 Cloud Computing technology basics Platform Evolution Advantages  Microsoft Windows Azure technology basics Windows Azure – A Lap around the platform.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
100% Exam Passing Guarantee & Money Back Assurance
Docker for Ops: Operationalize Your Apps in Production Vivek Saraswat Sr. Product Evan Hazlett Sr. Software
Deploying Docker Datacenter on AWS © 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved.
If it’s not automated, it’s broken!
Web GIS: Architectural Patterns and Practices
Joonas Sirén, Technology Architect, Emerging Technologies Accenture
100% Exam Passing Guarantee & Money Back Assurance
Leading New ICT, Making eFinance More Effective.
Infrastructure Orchestration to Optimize Testing
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
4th Forum How to easily offer your application as a self-service template by using OpenShift and GitLab-CI 4th Forum Alberto.
Power BI Security Best Practices
Getting Started with LANGuardian
Microsoft Azure Helps Guarantee Hyper-V Performance and System Center Workloads “Our Hyper-V integration went GA in We have continually improved.
2017 Real Questions
Get Amazon AWS-DevOps-Engineer-Professional Exam Real Questions - Amazon AWS-DevOps-Engineer-Professional Dumps Realexamdumps.com
Securing Cloud-Native Applications Jason Schmitt CEO
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Cloud Migrations Pose Important Questions
Is your deployment in pants-down mode?
Getting Started.
Automating Security in the Cloud
Getting Started.
AppExchange Security Certification
LitwareHR v2: an S+S reference application
HCL’s Viewpoint – DevOps on MS Cloud
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
Features Overview.
Presentation transcript:

Real World Cloud Application Security

About Me Director of Netflix Responsible for: – Cloud app, product, infrastructure, ops security Previously: – Led security VMware – Earlier, primarily security consulting iSEC Partners

Netflix, Inc. “Netflix is the world’s leading Internet television network with more than 33 million members in 40 countries enjoying more than one billion hours of TV shows and movies per month, including original series...” Source:

APPSEC CHALLENGES

Lots of Good Advice BSIMM Microsoft SDL SAFECode

But, what works? Forrester Consulting, 12/10

Especially, given phenomena such as DevOps, cloud, agile, and the unique characteristics of an organization?

NETFLIX

Availability

“Undifferentiated Heavy Lifting”

Netflix Culture “may well be the most important document ever to come out of the Valley.” Sheryl Sandberg, Facebook COO

Scale and Usage Curve

Netflix is now ~99% in the cloud

On the way to the cloud... (architecture)

On the way to the cloud... (organization) (or NoOps, depending on definitions)

DEPLOYING CODE

A common Netflix Lots of watching in prime time Not as much in early morning Old way - pay and provision for peak, 24/7/365 Multiply this pattern across the dozens of apps that comprise the Netflix streaming service Weekend afternoon ramp-up

Solution: Load-Based Autoscaling

Autoscaling Goals: – # of systems matches load requirements – Load per server is constant – Happens without intervention (the ‘auto’ in autoscaling) Results: – Clusters continuously add & remove nodes – New nodes must mirror existing

Every change requires a new cluster push (not an incremental change to existing systems)

Deploying code must be easy (it is)

Netflix Deployment Pipeline Perforce/Git Code change Config change YUM RPM with app-specific bits Bakery/Amina tor Base image + RPM AMI VM template ready to launch ASG Cluster config Running systems

Operational Impact No changes to running systems No systems mgmt infrastructure (Puppet, Chef, etc.) Fewer logins to prod No snowflakes Trivial “rollback”

Security Impact Need to think differently on: – Vulnerability management – Patch management – User activity monitoring – File integrity monitoring – Forensic investigations

Architecture, organization, deployment are all different. What about security?

We’ve adapted too. Some principles we’ve found useful.

POINTS OF EMPHASIS

Points of Emphasis Integrate Make the right way easy Self-service, with exceptions Trust, but verify Two contexts: 1.Integration with your engineering ecosystem 2.Integration of your security controls Organization SCM, build and release Monitoring and alerting 28

Integration: Base AMI Testing Base AMI – VM/instance template used for all cloud systems – Average instance age = ~24 days (one-time sample) The base AMI is managed like other packages, via P4, Jenkins, etc. We watch the SCM directory & kick off testing when it changes Launch an instance of the AMI, perform vuln scan and other checks SCAN COMPLETED ALERT Site name: AMI1 Stopped by: N/A Total Scan Time: 4 minutes 46 seconds Critical Vulnerabilities: 5 Severe Vulnerabilities: 4 Moderate Vulnerabilities: 4

Integration: Control Packaging and Installation From the RPM spec file of a webserver: Requires: ossec cloudpassage nflx-base-harden hyperguard-enforcer  Pulls in the following RPMs:  HIDS agent  Config assessment/firewall agent  Host hardening package  WAF

Integration: Timeline (Chronos) What IP addresses have been blacklisted by the WAF in the last few weeks? GET /api/v1/event?timelines=type:blacklist&start= Which security groups have changed today? GET /api/v1/event?timelines=type:securitygroup&start=

Integration: Static Analysis Available self-service through build environment – FindBugs, PMD Jenkins plugin to display graphs and support drill through to results

Integration: Static Analysis

Points of Emphasis Integrate Make the right way easy Self-service, with exceptions Trust, but verify Developers are lazy

Making it Easy: Cryptex Crypto: DDIY (“Don’t Do It Yourself”) Many uses of crypto in web/distributed systems: – Encrypt/decrypt (cookies, data, etc.) – Sign/verify (URLs, data, etc.) Netflix also uses heavily for device activation, DRM playback, etc.

Making it Easy: Cryptex Multi-layer crypto system (HSM basis, scale out layer) – Easy to use – Key management handled transparently – Access control and auditable operations

Making it Easy: Cloud-Based SSO In the AWS cloud, access to data center services is problematic – Examples: AD, LDAP, DNS But, many cloud-based systems require authN, authZ – Examples: Dashboards, admin UIs Asking developers to securely handle/accept credentials is also problematic

Making it Easy: Cloud-Based SSO Solution: Leverage OneLogin SaaS SSO (SAML) used by IT for enterprise apps (e.g. Workday, Google Apps) Provides a single & centralized login page Built base module to make SSO/authN trivial

Points of Emphasis Integrate Make the right way easy Self-service, with exceptions Trust, but verify Self-service is perhaps the most transformative cloud characteristic Failing to adopt this for security controls will lead to friction

Self-Service: Security Groups Asgard cloud orchestration tool allows developers to configure their own firewall rules Limited to same AWS account, no IP-based rules

Points of Emphasis Integrate Make the right way easy Self-service, with exceptions Trust, but verify Culture precludes traditional “command and control” approach Organizational desire for agile, DevOps, CI/CD blur traditional security engagement touchpoints

Trust but Verify: Security Monkey Cloud APIs make verification and analysis of configuration and running state simpler Security Monkey created as the framework for this analysis Includes: – Certificate checking – Firewall analysis – IAM entity analysis – Limit warnings – Resource policy analysis

Trust but Verify: Security Monkey From: Security Monkey Date: Wed, 24 Oct :08: To: Security Alerts Subject: prod Changes Detected Table of Contents: Security Groups Changed Security Group (eu-west-1 / prod) (eu-west-1 / prod)>

Trust but Verify: Exploit Monkey AWS Autoscaling group is unit of deployment, so changes signal a good time to rerun dynamic scans On 10/23/12 12:35 PM, Exploit Monkey wrote: I noticed that testapp-live has changed current ASG name from testapp- live-v001 to testapp-live-v002. I'm starting a vulnerability scan against test app from these private/public IPs:

Takeaways Netflix runs a large, dynamic service in AWS Newer concepts like cloud & DevOps need an updated approach to application security Specific context can help jumpstart a pragmatic and effective security program Don ’ t swim upstream - integrate and collaborate with your engineering partners

Netflix References

Other References maybe-the-most-important-document-ever-to-come-out-of-the-valley/

Questions? ?