Presentation is loading. Please wait.

Presentation is loading. Please wait.

Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)

Similar presentations


Presentation on theme: "Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)"— Presentation transcript:

1 Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) ben@twistlock.com

2 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)

3 Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect

4 Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect

5 Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect Conceptual Design

6 Roles & Responsibilities Agenda Implementing Secure Docker Environments At Scale Architectural guidance for the security architect Conceptual Design Common Pitfalls

7 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Roles and Responsibilities

8 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Roles and Responsibilities

9 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Dev Team Vulnerabilities/patching, infrastructure, identities/access Fix  Proactively consider security Roles and Responsibilities

10 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Security Team Design secure continuum Compliance Micro service aware active threat protection Synergy with developers Dev Team Vulnerabilities/patching, infrastructure, identities/access Fix  Proactively consider security Devops Team Implementation  Daily security operations Roles and Responsibilities

11 Today Conceptual Design

12 Today (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team

13 Today (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS

14 Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Milestone Review Review Setup Scripts, Security Testing, App Compliance Communicate Infra Requirements to IT Development & Staging Micro-Segmentation E-W FWs Production Updates Security Alerts / Patches Maintenance Security Operation Team Offline Guidance Set Policy Handle Notifications IPS/IDS Deception 1 st / Next Gen Firewall Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Identity Handle Notifications Set Policy Host Configuration Compliance Traffic Encryption Data Encryption Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS

15 Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development & Staging ProductionMaintenance Security Operation Team Offline Guidance Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications “IT” Operation Team Offline Communications Offline Review Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Platform/Host “IT” Operation Team Development Team “IT” Operation Team MS

16 Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Maintenance Security Operation Team Set Policy Isolation Network Set Policy Dev/Devops Team Pre-Checkin Review Code Analysis User Behavior Analytics Identity Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Dev/Devops Team

17 Better & Even Yet Better Architectural Diagram

18 Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Updates Security Alerts / Patches Maintenance Security Operation Team Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications Dev/Devops Team Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Host Configuration Compliance Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Delivery Review CVE checks, Signing, Base Image, Other Metadata Ports, Volumes, Devices, Processes Delivery Aware Network Restrictions Delivery Aware Anomaly Detection Delivery Aware Deception Dev/Devops Team

19 Staging Architectural Diagram (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Development Production Updates Security Alerts / Patches Maintenance Security Operation Team Set Policy Handle Notifications Isolation Network Set Policy Handle Notifications Dev/Devops Team Set Policy Pre-Checkin Review Code Analysis User Behavior Analytics Identity Handle Notifications Set Policy Host Configuration Compliance Platform/Host Dev/Devops Team Development Team “IT” Operation Team Dev/Devops/ IT Team MS Delivery Review CVE checks, Signing, Base Image, Other Metadata Ports, Volumes, Devices, Processes Delivery Aware Network Restrictions Delivery Aware Anomaly Detection Delivery Aware Deception Dev/Devops Team Fuzzing, Sandboxing Delivery Aware Pen-Tests

20 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Three Common Pitfalls Battle Tested

21 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies  Adjust per micro-service Adjust per R&D team / Org / Application Group. Three Common Pitfalls Battle Tested

22 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies  Adjust per micro-service Adjust per R&D team / Org / Application Group. Delivery hygiene  Monitoring only in production Monitor early in CI/CD and in production Three Common Pitfalls Battle Tested

23 (NOTE: PASTE IN PHOTO AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP) Compliance Policies  Adjust per micro-service Adjust per R&D team / Org / Application Group. Delivery hygiene  Monitoring only in production Monitor early in CI/CD and in production Active Threat Protection  Trust your “application / next-gen firewall” Use “delivery aware” active threat protection Three Common Pitfalls Battle Tested

24 Thank you!


Download ppt "Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)"

Similar presentations


Ads by Google