SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Docker and PCI-DSS – Lessons learned in
a security sensitive environment
Dr. Udo Seidel
Chief Architect & Digital Evangelist
Agenda
PCI-DSS
2.2.2
5.2
8.1.3
10.2.2
Lessons Learned
SecOps
Security Architekt
KISS
...
Introduction
About Udo
About Amadeus
Behind the scenes
The overall trigger
Here comes docker
Framework details
Introduction
About Udo and Amadeus
About me :-)
● Teacher of mathematics and physics
● PhD in experimental physics
● Started with Linux in 1996
● With Amadeus since 2006
● Before:
– Linux/UNIX trainer
– Solution Engineer in HPC and CAx environment
● Now: Architecture & Technical Governance aka CTO
Behind the scenes
More details about our Docker journey
The overall trigger
● Customer project
– New customer
– New requirements
– New chances and challenges
● Changes on Amadeus side
– Personnel changes
– Digitalization
– Externally driven
Here comes docker
● Huge topic at Red Hat Summit: April 2014
● Internal discussions
– 'Native' joint interest of OPS and DEV
– DEV & OPS Architects: April 2014
– Introduction to project architecture: Summer 2014
● Why?
– The 'usual suspects'
– Solution of traditional OPS-DEV challenge
● Application patch management
● Administrative access
Framework details
● Technical
– Openstack as IaaS
● 3 installations
● Vmware based
– Management
● Orchestration via Openshift
● Teaming up with Red Hat
● Security
– Internal
● Corporate Office
● Global Operations Office
● SOC
● Community
– External
● PCI-DSS
● SSAE-16
● ISO 27001
PCI-DSS
● Payment Card Industry – Data Security Standard
● VISA, MasterCard, American Express, …
● Administration via Council
● 6 Control objectives
– Build and maintain secure network
– Protect cardholder data
– Maintain a vulnerability management
program
– Implement strong access control
measures
– Regularly monitor and test networks
– Maintain an information security policy
● Current version: 3.1 (115 pages)
Some of the hick-ups
The hypervisor is insecure!
Physical separation rules!
Who is responsible for firewall policies?
Who is responsible for network topology?
PCI-DSS
Some case studies
Before you start
Don't overcomplicate things.
Re-use what is already there.
It might be easier than you think.
Requirement 2.2.2
Enable only necessary services, protocols, daemons, etc., as required for
the function of the system.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– Even better due to separation of software, processes, ..
Requirement 2.2.2 - Amadeus
Enable only necessary services, protocols, daemons, etc., as required for
the function of the system.
● See previous slide :-)
● Grouping of Containers
– Openshift Pods
– Smalles Deployable Unit
– Application Unit (Component)
Requirement 5.2
Ensure that all anti-virus mechanisms are maintained as follows: Are kept
current, Perform periodic scans, Generate audit logs which are retained per
PCI DSS Requirement 10.7.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– No real change to world without Docker
Requirement 5.2 - Amadeus
Ensure that all anti-virus mechanisms are maintained as follows: Are kept
current, Perform periodic scans, Generate audit logs which are retained per
PCI DSS Requirement 10.7.
● See previous slide :-)
● Scanning discussion
– Scan engine towards Container - internal
– Container towards Scan engine - external
Requirement 8.1.3
Immediately revoke access for any terminated users.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Avoid personal users
– Review of Docker file and software source
● Overall
– Even better due separation of software, processes, ..
– Big Plus: 'Hands-off'
Requirement 8.1.3 - Amadeus
Immediately revoke access for any terminated users.
● See previous slides :-)
● Jump server for access
– Personal users via directory service
– Only place with personal users
● Application users
– Container and Host level
– Special treatment ..anyway
– Shell to be removed (soon)
Requirement 10.2.2
Implement automated audit trails for all system components to reconstruct
all actions taken by any individual with root or administrative privileges.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– Even better due separation of software, processes, ..
– Big Plus: 'Hands-off'
Requirement 10.2.2 - Amadeus
Implement automated audit trails for all system components to reconstruct
all actions taken by any individual with root or administrative privileges.
● See … (you should be able to complete it yourself)
● Jumpserver only for these activities
– Questions similar to scanning
– Access secured via SSH keys
Amadeus Big Picture
Amadeus PCI-DSS (8.1.3/10.2.2)
Amadeus PCI-DSS (2.2.2/5.2)
Additional Amadeus inside
● Patching via re-creation
● Self-build Docker registry
● Definitive Media Library
– Source of truth
– Connection to Software Factory
● Different security/network zones
– External separation via Loadbalancer
– Internal via Openshift placement rules
● Encryption for data at
– Flight (SSH, TSL)
– Rest (HSM)
Lessons learned
The information you were coming here
General advice
Don't overcomplicate things.
Re-use what is already there.
People before technology!
Security Architect
● Dedicated role/responsibility
● Technical and soft skills
● Sufficient standing
● Internally
● Externally
Early involvement
● Business goal
● Win-win situation
● Give and take
Common language
● Internal education
● External consultancy
● Vendors
● Customers
● Re-use existing dictionaries
SecOps
● Member of DevOps team
● Remember: Security Champions for OPS
● Communication link to security organization
KISS
● Helicopter view for solution finding
● Always different solutions available
Team up
● Internally
● DevOps and security organisation
● DevOps and line organisation
● Externally
● Vendors
● Community
● Partners
Added value
Mobility
Abstraction/Separation
Ease to use
Summary
30+ slides condensed in one … or two
Take-Away
● Don't underestimate non-technical side
● Don't forget what you already have
● 'Walk&talk' a lot
Outlook
● Journey to be continued
● 'Porting' of other Amadeus applications
● Domino effect
—Louis Pasteur
“Fortune favors the
prepared mind.”
3
4
Thank you!
Dr. Udo Seidel
@useidel
useidel@amadeus.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Effective Data Pipelines with Docker & Jenkins - Brian Donaldson
Effective Data Pipelines with Docker & Jenkins - Brian DonaldsonEffective Data Pipelines with Docker & Jenkins - Brian Donaldson
Effective Data Pipelines with Docker & Jenkins - Brian Donaldson
 
How to be successful running Docker in Production
How to be successful running Docker in ProductionHow to be successful running Docker in Production
How to be successful running Docker in Production
 
DCSF19 How Docker Simplifies Kubernetes for the Masses
DCSF19 How Docker Simplifies Kubernetes for the Masses  DCSF19 How Docker Simplifies Kubernetes for the Masses
DCSF19 How Docker Simplifies Kubernetes for the Masses
 
Networking Overview for Docker Platform
Networking Overview for Docker PlatformNetworking Overview for Docker Platform
Networking Overview for Docker Platform
 
DCSF19 CMD and Conquer: Containerizing the Monolith
DCSF19 CMD and Conquer: Containerizing the Monolith  DCSF19 CMD and Conquer: Containerizing the Monolith
DCSF19 CMD and Conquer: Containerizing the Monolith
 
Windows Server and Docker - The Internals Behind Bringing Docker and Containe...
Windows Server and Docker - The Internals Behind Bringing Docker and Containe...Windows Server and Docker - The Internals Behind Bringing Docker and Containe...
Windows Server and Docker - The Internals Behind Bringing Docker and Containe...
 
Docker and the Linux Kernel
Docker and the Linux KernelDocker and the Linux Kernel
Docker and the Linux Kernel
 
Docker Security and Content Trust
Docker Security and Content TrustDocker Security and Content Trust
Docker Security and Content Trust
 
The Dockerfile Explosion and the Need for Higher Level Tools by Gareth Rushgrove
The Dockerfile Explosion and the Need for Higher Level Tools by Gareth RushgroveThe Dockerfile Explosion and the Need for Higher Level Tools by Gareth Rushgrove
The Dockerfile Explosion and the Need for Higher Level Tools by Gareth Rushgrove
 
Docker 101 Checonf 2016
Docker 101 Checonf 2016Docker 101 Checonf 2016
Docker 101 Checonf 2016
 
Online Meetup: What's new in docker 1.13.0
Online Meetup: What's new in docker 1.13.0 Online Meetup: What's new in docker 1.13.0
Online Meetup: What's new in docker 1.13.0
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
 
Windows Server Containers- How we hot here and architecture deep dive
Windows Server Containers- How we hot here and architecture deep diveWindows Server Containers- How we hot here and architecture deep dive
Windows Server Containers- How we hot here and architecture deep dive
 
Docker serverless v1.0
Docker serverless v1.0Docker serverless v1.0
Docker serverless v1.0
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker Security
 
Docker Security Deep Dive by Ying Li and David Lawrence
Docker Security Deep Dive by Ying Li and David LawrenceDocker Security Deep Dive by Ying Li and David Lawrence
Docker Security Deep Dive by Ying Li and David Lawrence
 
Docker Introduction
Docker IntroductionDocker Introduction
Docker Introduction
 
runC: The little engine that could (run Docker containers) by Docker Captain ...
runC: The little engine that could (run Docker containers) by Docker Captain ...runC: The little engine that could (run Docker containers) by Docker Captain ...
runC: The little engine that could (run Docker containers) by Docker Captain ...
 
Docker for Ops - Scott Coulton, Puppet
Docker for Ops - Scott Coulton, PuppetDocker for Ops - Scott Coulton, Puppet
Docker for Ops - Scott Coulton, Puppet
 
Docker introduction
Docker introductionDocker introduction
Docker introduction
 

Andere mochten auch

Drupal workshop ist 2014
Drupal workshop ist 2014Drupal workshop ist 2014
Drupal workshop ist 2014
Ricardo Amaro
 
Drupalcamp es 2013 drupal with lxc docker and vagrant
Drupalcamp es 2013  drupal with lxc docker and vagrant Drupalcamp es 2013  drupal with lxc docker and vagrant
Drupalcamp es 2013 drupal with lxc docker and vagrant
Ricardo Amaro
 

Andere mochten auch (20)

DockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker Brings
DockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker BringsDockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker Brings
DockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker Brings
 
DockerCon EU 2015: Docker Monitoring
DockerCon EU 2015: Docker MonitoringDockerCon EU 2015: Docker Monitoring
DockerCon EU 2015: Docker Monitoring
 
Docker Security workshop slides
Docker Security workshop slidesDocker Security workshop slides
Docker Security workshop slides
 
A Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container PlatformsA Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container Platforms
 
Docker Networking: Control plane and Data plane
Docker Networking: Control plane and Data planeDocker Networking: Control plane and Data plane
Docker Networking: Control plane and Data plane
 
Docker by Example - Basics
Docker by Example - Basics Docker by Example - Basics
Docker by Example - Basics
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
Docker & Apcera Better Together
Docker & Apcera Better TogetherDocker & Apcera Better Together
Docker & Apcera Better Together
 
Running the Oracle SOA Suite Environment in a Docker Container
Running the Oracle SOA Suite Environment in a Docker ContainerRunning the Oracle SOA Suite Environment in a Docker Container
Running the Oracle SOA Suite Environment in a Docker Container
 
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Containers, docker, and security: state of the union (Bay Area Infracoders Me...Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
 
Docker From Scratch
Docker From ScratchDocker From Scratch
Docker From Scratch
 
Building a REST API Microservice for the DevNet API Scavenger Hunt
Building a REST API Microservice for the DevNet API Scavenger HuntBuilding a REST API Microservice for the DevNet API Scavenger Hunt
Building a REST API Microservice for the DevNet API Scavenger Hunt
 
Docker containers & the Future of Drupal testing
Docker containers & the Future of Drupal testing Docker containers & the Future of Drupal testing
Docker containers & the Future of Drupal testing
 
How To Train Your APIs
How To Train Your APIsHow To Train Your APIs
How To Train Your APIs
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architecture
 
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
 
Drupal workshop ist 2014
Drupal workshop ist 2014Drupal workshop ist 2014
Drupal workshop ist 2014
 
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Introduction to Infrastructure as Code & Automation / Introduction to ChefIntroduction to Infrastructure as Code & Automation / Introduction to Chef
Introduction to Infrastructure as Code & Automation / Introduction to Chef
 
Drupalcamp es 2013 drupal with lxc docker and vagrant
Drupalcamp es 2013  drupal with lxc docker and vagrant Drupalcamp es 2013  drupal with lxc docker and vagrant
Drupalcamp es 2013 drupal with lxc docker and vagrant
 
DATA CENTER
DATA CENTER DATA CENTER
DATA CENTER
 

Ähnlich wie DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment

Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 

Ähnlich wie DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment (20)

Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
Installation of EM 12c
Installation of EM 12cInstallation of EM 12c
Installation of EM 12c
 
OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...
 
Oracle E-Business Suite R12.2.5 on Database 12c: Install, Patch and Administer
Oracle E-Business Suite R12.2.5 on Database 12c: Install, Patch and AdministerOracle E-Business Suite R12.2.5 on Database 12c: Install, Patch and Administer
Oracle E-Business Suite R12.2.5 on Database 12c: Install, Patch and Administer
 
Introduction to Docker and Monitoring with InfluxData
Introduction to Docker and Monitoring with InfluxDataIntroduction to Docker and Monitoring with InfluxData
Introduction to Docker and Monitoring with InfluxData
 
Container Monitoring with Sysdig
Container Monitoring with SysdigContainer Monitoring with Sysdig
Container Monitoring with Sysdig
 
How (and why) to roll your own Docker SaaS
How (and why) to roll your own Docker SaaSHow (and why) to roll your own Docker SaaS
How (and why) to roll your own Docker SaaS
 
Oracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdfOracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdf
 
Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned  Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned
 
Automating the consumption of Eclipse for internal use
Automating the consumption of Eclipse for internal useAutomating the consumption of Eclipse for internal use
Automating the consumption of Eclipse for internal use
 
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
 
Open shift and docker - october,2014
Open shift and docker - october,2014Open shift and docker - october,2014
Open shift and docker - october,2014
 
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
 
Docker dev ops for cd meetup 12-14
Docker dev ops for cd meetup 12-14Docker dev ops for cd meetup 12-14
Docker dev ops for cd meetup 12-14
 
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
 
Drupal 8 DevOps . Profile and SQL flows.
Drupal 8 DevOps . Profile and SQL flows.Drupal 8 DevOps . Profile and SQL flows.
Drupal 8 DevOps . Profile and SQL flows.
 
WSO2Con USA 2015: Revolutionizing WSO2 PaaS with Kubernetes & App Factory
WSO2Con USA 2015: Revolutionizing WSO2 PaaS with Kubernetes & App FactoryWSO2Con USA 2015: Revolutionizing WSO2 PaaS with Kubernetes & App Factory
WSO2Con USA 2015: Revolutionizing WSO2 PaaS with Kubernetes & App Factory
 
Experts Live Europe 2017 - Why you should care about Docker - an introduction
Experts Live Europe 2017 - Why you should care about Docker - an introductionExperts Live Europe 2017 - Why you should care about Docker - an introduction
Experts Live Europe 2017 - Why you should care about Docker - an introduction
 
(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment
 
Prometheus and Docker (Docker Galway, November 2015)
Prometheus and Docker (Docker Galway, November 2015)Prometheus and Docker (Docker Galway, November 2015)
Prometheus and Docker (Docker Galway, November 2015)
 

Mehr von Docker, Inc.

Build & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWSBuild & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 
Build & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWSBuild & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 

Mehr von Docker, Inc. (20)

Containerize Your Game Server for the Best Multiplayer Experience
Containerize Your Game Server for the Best Multiplayer Experience Containerize Your Game Server for the Best Multiplayer Experience
Containerize Your Game Server for the Best Multiplayer Experience
 
How to Improve Your Image Builds Using Advance Docker Build
How to Improve Your Image Builds Using Advance Docker BuildHow to Improve Your Image Builds Using Advance Docker Build
How to Improve Your Image Builds Using Advance Docker Build
 
Build & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWSBuild & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWS
 
Securing Your Containerized Applications with NGINX
Securing Your Containerized Applications with NGINXSecuring Your Containerized Applications with NGINX
Securing Your Containerized Applications with NGINX
 
How To Build and Run Node Apps with Docker and Compose
How To Build and Run Node Apps with Docker and ComposeHow To Build and Run Node Apps with Docker and Compose
How To Build and Run Node Apps with Docker and Compose
 
Hands-on Helm
Hands-on Helm Hands-on Helm
Hands-on Helm
 
Distributed Deep Learning with Docker at Salesforce
Distributed Deep Learning with Docker at SalesforceDistributed Deep Learning with Docker at Salesforce
Distributed Deep Learning with Docker at Salesforce
 
The First 10M Pulls: Building The Official Curl Image for Docker Hub
The First 10M Pulls: Building The Official Curl Image for Docker HubThe First 10M Pulls: Building The Official Curl Image for Docker Hub
The First 10M Pulls: Building The Official Curl Image for Docker Hub
 
Monitoring in a Microservices World
Monitoring in a Microservices WorldMonitoring in a Microservices World
Monitoring in a Microservices World
 
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
 
Predicting Space Weather with Docker
Predicting Space Weather with DockerPredicting Space Weather with Docker
Predicting Space Weather with Docker
 
Become a Docker Power User With Microsoft Visual Studio Code
Become a Docker Power User With Microsoft Visual Studio CodeBecome a Docker Power User With Microsoft Visual Studio Code
Become a Docker Power User With Microsoft Visual Studio Code
 
How to Use Mirroring and Caching to Optimize your Container Registry
How to Use Mirroring and Caching to Optimize your Container RegistryHow to Use Mirroring and Caching to Optimize your Container Registry
How to Use Mirroring and Caching to Optimize your Container Registry
 
Monolithic to Microservices + Docker = SDLC on Steroids!
Monolithic to Microservices + Docker = SDLC on Steroids!Monolithic to Microservices + Docker = SDLC on Steroids!
Monolithic to Microservices + Docker = SDLC on Steroids!
 
Kubernetes at Datadog Scale
Kubernetes at Datadog ScaleKubernetes at Datadog Scale
Kubernetes at Datadog Scale
 
Labels, Labels, Labels
Labels, Labels, Labels Labels, Labels, Labels
Labels, Labels, Labels
 
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment ModelUsing Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
 
Build & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWSBuild & Deploy Multi-Container Applications to AWS
Build & Deploy Multi-Container Applications to AWS
 
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
 
Developing with Docker for the Arm Architecture
Developing with Docker for the Arm ArchitectureDeveloping with Docker for the Arm Architecture
Developing with Docker for the Arm Architecture
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment

  • 1. Docker and PCI-DSS – Lessons learned in a security sensitive environment Dr. Udo Seidel Chief Architect & Digital Evangelist
  • 2. Agenda PCI-DSS 2.2.2 5.2 8.1.3 10.2.2 Lessons Learned SecOps Security Architekt KISS ... Introduction About Udo About Amadeus Behind the scenes The overall trigger Here comes docker Framework details
  • 4. About me :-) ● Teacher of mathematics and physics ● PhD in experimental physics ● Started with Linux in 1996 ● With Amadeus since 2006 ● Before: – Linux/UNIX trainer – Solution Engineer in HPC and CAx environment ● Now: Architecture & Technical Governance aka CTO
  • 5.
  • 6. Behind the scenes More details about our Docker journey
  • 7. The overall trigger ● Customer project – New customer – New requirements – New chances and challenges ● Changes on Amadeus side – Personnel changes – Digitalization – Externally driven
  • 8. Here comes docker ● Huge topic at Red Hat Summit: April 2014 ● Internal discussions – 'Native' joint interest of OPS and DEV – DEV & OPS Architects: April 2014 – Introduction to project architecture: Summer 2014 ● Why? – The 'usual suspects' – Solution of traditional OPS-DEV challenge ● Application patch management ● Administrative access
  • 9. Framework details ● Technical – Openstack as IaaS ● 3 installations ● Vmware based – Management ● Orchestration via Openshift ● Teaming up with Red Hat ● Security – Internal ● Corporate Office ● Global Operations Office ● SOC ● Community – External ● PCI-DSS ● SSAE-16 ● ISO 27001
  • 10. PCI-DSS ● Payment Card Industry – Data Security Standard ● VISA, MasterCard, American Express, … ● Administration via Council ● 6 Control objectives – Build and maintain secure network – Protect cardholder data – Maintain a vulnerability management program – Implement strong access control measures – Regularly monitor and test networks – Maintain an information security policy ● Current version: 3.1 (115 pages)
  • 11. Some of the hick-ups The hypervisor is insecure! Physical separation rules! Who is responsible for firewall policies? Who is responsible for network topology?
  • 13. Before you start Don't overcomplicate things. Re-use what is already there. It might be easier than you think.
  • 14. Requirement 2.2.2 Enable only necessary services, protocols, daemons, etc., as required for the function of the system. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – Even better due to separation of software, processes, ..
  • 15. Requirement 2.2.2 - Amadeus Enable only necessary services, protocols, daemons, etc., as required for the function of the system. ● See previous slide :-) ● Grouping of Containers – Openshift Pods – Smalles Deployable Unit – Application Unit (Component)
  • 16. Requirement 5.2 Ensure that all anti-virus mechanisms are maintained as follows: Are kept current, Perform periodic scans, Generate audit logs which are retained per PCI DSS Requirement 10.7. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – No real change to world without Docker
  • 17. Requirement 5.2 - Amadeus Ensure that all anti-virus mechanisms are maintained as follows: Are kept current, Perform periodic scans, Generate audit logs which are retained per PCI DSS Requirement 10.7. ● See previous slide :-) ● Scanning discussion – Scan engine towards Container - internal – Container towards Scan engine - external
  • 18. Requirement 8.1.3 Immediately revoke access for any terminated users. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Avoid personal users – Review of Docker file and software source ● Overall – Even better due separation of software, processes, .. – Big Plus: 'Hands-off'
  • 19. Requirement 8.1.3 - Amadeus Immediately revoke access for any terminated users. ● See previous slides :-) ● Jump server for access – Personal users via directory service – Only place with personal users ● Application users – Container and Host level – Special treatment ..anyway – Shell to be removed (soon)
  • 20. Requirement 10.2.2 Implement automated audit trails for all system components to reconstruct all actions taken by any individual with root or administrative privileges. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – Even better due separation of software, processes, .. – Big Plus: 'Hands-off'
  • 21. Requirement 10.2.2 - Amadeus Implement automated audit trails for all system components to reconstruct all actions taken by any individual with root or administrative privileges. ● See … (you should be able to complete it yourself) ● Jumpserver only for these activities – Questions similar to scanning – Access secured via SSH keys
  • 25. Additional Amadeus inside ● Patching via re-creation ● Self-build Docker registry ● Definitive Media Library – Source of truth – Connection to Software Factory ● Different security/network zones – External separation via Loadbalancer – Internal via Openshift placement rules ● Encryption for data at – Flight (SSH, TSL) – Rest (HSM)
  • 26. Lessons learned The information you were coming here
  • 27. General advice Don't overcomplicate things. Re-use what is already there. People before technology!
  • 28. Security Architect ● Dedicated role/responsibility ● Technical and soft skills ● Sufficient standing ● Internally ● Externally Early involvement ● Business goal ● Win-win situation ● Give and take Common language ● Internal education ● External consultancy ● Vendors ● Customers ● Re-use existing dictionaries
  • 29. SecOps ● Member of DevOps team ● Remember: Security Champions for OPS ● Communication link to security organization KISS ● Helicopter view for solution finding ● Always different solutions available Team up ● Internally ● DevOps and security organisation ● DevOps and line organisation ● Externally ● Vendors ● Community ● Partners
  • 31. Summary 30+ slides condensed in one … or two
  • 32. Take-Away ● Don't underestimate non-technical side ● Don't forget what you already have ● 'Walk&talk' a lot
  • 33. Outlook ● Journey to be continued ● 'Porting' of other Amadeus applications ● Domino effect
  • 34. —Louis Pasteur “Fortune favors the prepared mind.” 3 4
  • 35. Thank you! Dr. Udo Seidel @useidel useidel@amadeus.com