Download presentation
Presentation is loading. Please wait.
Published byJulian Harrell Modified over 8 years ago
1
Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) ben@twistlock.com
2
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)
3
Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect
4
Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect
5
Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect Conceptual Design
6
Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect Conceptual Design Common Pitfalls
7
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Roles and Responsibilities
8
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Roles and Responsibilities
9
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Dev Team Vulnerabilities/patching, infrastructure, identities/access Fix Proactively consider security Roles and Responsibilities
10
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Dev Team Vulnerabilities/patching, infrastructure, identities/access Fix Proactively consider security Devops Team Implementation Daily security operations Roles and Responsibilities
11
Today Conceptual Design
12
Today (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team
13
Today (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS
14
Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Milestone Review Review Setup Scripts, Security Testing, App Compliance Communicate Infra Requirements to IT Development & Staging Micro-Segmentation E-W FWs Production Updates Security Alerts / Patches Maintenance Security Operation Team Offline Guidance Set Policy Handle Notifications IPS/IDS Deception 1 st / Next Gen Firewall Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Host Configuration Compliance Traffic Encryption Data Encryption Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS
15
Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS
16
Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Maintenance Security Operation Team Set Policy Isolation Network Set Policy Dev/Devops Team Pre-Checkin Review Code Analysis User Behavior Analytics Identity Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Dev/Devops Team
17
Better & Even Yet Better Architectural Diagram
18
Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Updates Security Alerts / Patches Maintenance Security Operation Team Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications Dev/Devops Team Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Host Configuration Compliance Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Delivery Review CVE checks, Signing, Base Image, Other Metadata Ports, Volumes, Devices, Processes Delivery Aware Network Restrictions Delivery Aware Anomaly Detection Delivery Aware Deception Dev/Devops Team
19
Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Updates Security Alerts / Patches Maintenance Security Operation Team Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications Dev/Devops Team Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Host Configuration Compliance Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Delivery Review CVE checks, Signing, Base Image, Other Metadata Ports, Volumes, Devices, Processes Delivery Aware Network Restrictions Delivery Aware Anomaly Detection Delivery Aware Deception Dev/Devops Team Fuzzing, Sandboxing Delivery Aware Pen-Tests
20
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Three Common Pitfalls Battle Tested
21
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies Adjust per micro-service Adjust per R&D team / Org / Application Group. Three Common Pitfalls Battle Tested
22
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies Adjust per micro-service Adjust per R&D team / Org / Application Group. Delivery hygiene Monitoring only in production Monitor early in CI/CD and in production Three Common Pitfalls Battle Tested
23
(NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies Adjust per micro-service Adjust per R&D team / Org / Application Group. Delivery hygiene Monitoring only in production Monitor early in CI/CD and in production Active Threat Protection Trust your “application / next-gen firewall” Use “delivery aware” active threat protection Three Common Pitfalls Battle Tested
24
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.