SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Platform Security
IRL
Chris Rutter
Java Developer > Security Champion >
Security Architect > Security Tech Lead
Payments, Banking & Government Transformations
Lead Security Engineer @ Clearbank
choss@outlook.com
Chris Rutter
Tips and techniques learned building security at scale on a
large software platform
General concepts for thinking about modern security
Benefits of approaches such as standardisation and
convention
Talk Aims
An integration oriented design approach emphasizing systematic reuse, for
developing complex products based upon platforms and compatible hardware
and software virtual components, intended to reduce development risks,
costs and time to market
+ Reduce security risks
Platform Based Architecture
https://en.wikipedia.org/wiki/Platform-based_design
Platform Based Architecture
Large Government Department
● 60 Development Pizza teams
● 1700 Total employees
● 1000 microservices
● 6 Platform Teams
● 1 Platform Security Team (4 people)
Lessons & Techniques
● Lead who understands security and tech
● Product owner who understands value and business impact
● Floating engineering resources
Security Team Structure
Platform Security Team Mandate
● Build security into platform development workflows
● Improve Access Management on platform
● Improve operational security capability of platform
● Help coordinate Live vulnerabilities and incidents
● Improve app team development security
● Own and push platform-wide security initiatives
Scalable and Valuable Security
Vulnerable Dependencies
Understand Mitigation Flow
Traditional Approach
X 50
Traditional Approach
● Investigation of each finding takes approx 30-60 mins
● Buy licences and on-board 50 champions to use tool
● Security team consulting with 50 teams
● Investigation robustness difficult to standardise
● Shifting Left
● Giving ownership to engineers
Practical Approach
POC scanning 10 teams
Focus on Shared Libs
● Platform Security
○ Scan
○ Investigate
○ Triage
● Platform Applications Team
○ Build updated shared libraries
○ Test
○ Publish new version
Jackson Deserialization Vulnerability (CVE 2017-7525):
Introduction: This vulnerability takes advantage of the ability of an attacker to force a server
to deserialize a compromised class which is known to be on a large number of class paths
and inject malicious input which can result in code execution.
Am I Vulnerable?: You are vulnerable if you use polymorphic typing feature anywhere in
your code. This can be configured in a few ways: @JsonTypeInfo, @JsonSubTypes or
mapper.enableDefaultTyping()
How can I remediate?: You must ensure that you globally configure ObjectMapper
disableDefaultTyping() and have no instances of @JsonTypeInfo, @JsonSubTypes
Sensible & Specific Remediation Advice
Basic Code Scanning Engine
Vulnerability Search Terms
XXE XMLInputFactory, TransformerFactory,
SchemaFactory, SAXTransformerFactory,
XMLReader
Jackson Deserialization @JsonTypeInfo, @JsonSubTypes,
mapper.enableDefaultTyping()
Logback ServerSocketReceiver
Block Releases After Timeframe
● In-depth analysis by security engineer for accurate diagnosis
● Upgrade path can scale out and is easily Enforced
● Small implementation effort, low load on security team, low
cost of scanning tool
● Lots of engineer time saved by centralising investigations
● 80% of value for 20% of the resources
Benefits
● Shift left but only if valuable and manageable
● Ensure shared functionality is centralised, then it can be
scanned less times and investigated more thouroughly
● Understand and test the full remediation flow
● Focus on value over comprehensiveness, how much risk
reduced for effort? Fight this fight with Auditors!
● Implement in value iterations like any other project
General Scanning Tool Concepts
● Granular database users for each application
● Controls around their scope of access and permissions
● Frictionless process to on-board new application
Granular Database Access Management
Access Management Requirements
● App is created and requires access to a database cluster
● App permissions must be defined (which DBs, tables etc.)
● Users created in DB and credentials stored securely
● Credentials provided to applications on deployment
● Permissions altered if data model changes
Granular Database Access Management
Traditional Approach #1 ● Manual DB & User creation via
ticket
● Manual security review
● Manual storage of creds in
secrets manager
Slow & Tedious
Prone to error
Encourages larger DBs and wider
roles
Traditional Approach
● Extremely slow and involved process
● Requires full-time team of DBAs
● Encourages wider roles and larger DBs
● Significant chance of manual error
● Comprehensive review of all permissions
● Defined ownership of database management
Traditional Approach #2
https://imgflip.com/i/4gst9e
Standardise App Creation
Automate App Creation Lifecycle
Standardise Deployment Descriptors
Cater For Exceptions
● Legacy Apps
● True Snowflakes
● Automatically Applied
● Managed via PR
● Approval group on PR
Benefits
● All access by namespace convention
● Fast and automatic provisioning, new app could go to prod instantly
● Security controls built in, free and pre-approved
● Can be used to automate:
○ Scaffolding with application libraries
○ IAM access to Cloud PaaS resources
○ Deployment pipeline creation
○ DockerFile Creation
● Still allows for legacy or non-compliant patterns but makes this harder
Concepts
● Automate app creation lifecycle
● Standardise architectural patterns
● Provision apps to be secure by default
● Mechanism built and owned by platform teams
● Codified exceptions for legitimate use cases / legacy
Tiger Team Platform Project
● Cross cutting projects can be very slow
● A lot of time spent managing big bang migrations
● Pockets of knowledge
Tiger Team
● Architect for design continuity
● Engineers rotating from all necessary platform teams
Tiger Project Plan
● Small iterations through to production, cutting down on intra-team
backlog slow down, minimising big bang migrations and flushing out
integration issues
Traditional Security Review Approach
● Pen Test or architectural review at end of project
● No security input during development
● Project can not be released in iterations which will massively slow down
project / integration Review / Pen Test
Iterative Just-In-Time Approach
Review
/ Re-modelThreat Model
Review
/ Re-model
Finalise Review
Iterative Just-In-Time Approach
● Cross-team project to migrate to a new container hosting solution
Iterative Threat Model
● Iteration 1
New dummy service in private zone, no internet connection and no database
access
Network controls must be in place to isolate new apps from production.
Access controls in place so new deployer cannot deploy to existing prod
● Iteration 2
Dummy service with vpn-locked down internet access, no database access
VPN Whitelist must be securely implemented
● Iteration 3
Dummy service with vpn-locked down internet access and access to database
holding non-sensitive public data
Database credentials must be protected and no access given to other databases
Benefits
● Support much faster delivery of cross-cutting improvement projects
● Security team involved in entire project, understanding domain from the
outset
● System has security built-in from initial design
● Security considered an enabler
● Avoid expensive fixes based on late pen test or security review
Conclusions
● Standardisation and convention is the easiest and cheapest way to scale
securely
● Understand what your teams share, and what they truly need to
customise
● Create platform teams with concrete ownership to build and own cross-
cutting functionality (including security)
● Don’t be scared to take the 80%
● Use Cross-functional virtual teams to build faster and more securely
● Use just-in-time threat modelling to support rapid delivery

Weitere ähnliche Inhalte

Was ist angesagt?

Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application VulnerabilitiesPreetish Panda
 
OWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risksOWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risksKun-Da Wu
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practicesScott Hurrey
 
Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Andrea Hauser
 
Security Testing
Security TestingSecurity Testing
Security TestingKiran Kumar
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingRana Khalil
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouKevin Fealey
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assuranceTjylen Veselyj
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Finacle - Secure Coding Practices
Finacle - Secure Coding PracticesFinacle - Secure Coding Practices
Finacle - Secure Coding PracticesInfosys Finacle
 
OWASP API Security Top 10 Examples
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples42Crunch
 
Web Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWeb Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWebsecurify
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Security Innovation
 

Was ist angesagt? (20)

Web security and OWASP
Web security and OWASPWeb security and OWASP
Web security and OWASP
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
 
Web attacks
Web attacksWeb attacks
Web attacks
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
OWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risksOWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risks
 
Security testing
Security testingSecurity testing
Security testing
 
Web application security
Web application securityWeb application security
Web application security
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Web Application Penetration Testing - 101
Web Application Penetration Testing - 101
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
 
Hack through Injections
Hack through InjectionsHack through Injections
Hack through Injections
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Finacle - Secure Coding Practices
Finacle - Secure Coding PracticesFinacle - Secure Coding Practices
Finacle - Secure Coding Practices
 
OWASP API Security Top 10 Examples
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
 
Web Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWeb Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security Toolkit
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
 

Ähnlich wie Platform Security IRL: Busting Buzzwords & Building Better

Avoiding the security brick
Avoiding the security brickAvoiding the security brick
Avoiding the security brickEqual Experts
 
20160422 Speedy Framework Enterprise Application Development Platform
20160422 Speedy Framework Enterprise Application Development Platform20160422 Speedy Framework Enterprise Application Development Platform
20160422 Speedy Framework Enterprise Application Development PlatformHarezmi IT Solutions
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOpsSetu Parimi
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
Cncf checkov and bridgecrew
Cncf checkov and bridgecrewCncf checkov and bridgecrew
Cncf checkov and bridgecrewLibbySchulze
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOpsMichael Floyd
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Amazon Web Services
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure ArchitectureKarthikeyan VK
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjurconjur_inc
 
Datasheet ssh pluginforrd
Datasheet ssh pluginforrdDatasheet ssh pluginforrd
Datasheet ssh pluginforrdMidVision
 

Ähnlich wie Platform Security IRL: Busting Buzzwords & Building Better (20)

Avoiding the security brick
Avoiding the security brickAvoiding the security brick
Avoiding the security brick
 
20160422 Speedy Framework Enterprise Application Development Platform
20160422 Speedy Framework Enterprise Application Development Platform20160422 Speedy Framework Enterprise Application Development Platform
20160422 Speedy Framework Enterprise Application Development Platform
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
Cncf checkov and bridgecrew
Cncf checkov and bridgecrewCncf checkov and bridgecrew
Cncf checkov and bridgecrew
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOps
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
CV_RishabhDixit
CV_RishabhDixitCV_RishabhDixit
CV_RishabhDixit
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
resume4
resume4resume4
resume4
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure Architecture
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjur
 
Hacking DevOps
Hacking DevOpsHacking DevOps
Hacking DevOps
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Datasheet ssh pluginforrd
Datasheet ssh pluginforrdDatasheet ssh pluginforrd
Datasheet ssh pluginforrd
 

Mehr von Equal Experts

TRUST Framework Talk 2023-03-10.pptx
TRUST Framework Talk 2023-03-10.pptxTRUST Framework Talk 2023-03-10.pptx
TRUST Framework Talk 2023-03-10.pptxEqual Experts
 
Will it matter if your child cannot code?
Will it matter if your child cannot code?Will it matter if your child cannot code?
Will it matter if your child cannot code?Equal Experts
 
Software development practices & Infrastructure as Code - how well do they wo...
Software development practices & Infrastructure as Code - how well do they wo...Software development practices & Infrastructure as Code - how well do they wo...
Software development practices & Infrastructure as Code - how well do they wo...Equal Experts
 
A Whole Team Approach to Quality in Continuous Delivery - Lisa Crispin
A Whole Team Approach to Quality in Continuous Delivery - Lisa CrispinA Whole Team Approach to Quality in Continuous Delivery - Lisa Crispin
A Whole Team Approach to Quality in Continuous Delivery - Lisa CrispinEqual Experts
 
Secure Continuous Delivery
Secure Continuous DeliverySecure Continuous Delivery
Secure Continuous DeliveryEqual Experts
 
Smoothing the continuous delivery path a tale of two architectures - expert...
Smoothing the continuous delivery path   a tale of two architectures - expert...Smoothing the continuous delivery path   a tale of two architectures - expert...
Smoothing the continuous delivery path a tale of two architectures - expert...Equal Experts
 
Embracing collaborative chaos (April 2020) by Lyndsay Prewer
Embracing collaborative chaos (April 2020) by Lyndsay PrewerEmbracing collaborative chaos (April 2020) by Lyndsay Prewer
Embracing collaborative chaos (April 2020) by Lyndsay PrewerEqual Experts
 
Design Systems: Designing out Waste, Designing in Consistency
Design Systems: Designing out Waste, Designing in ConsistencyDesign Systems: Designing out Waste, Designing in Consistency
Design Systems: Designing out Waste, Designing in ConsistencyEqual Experts
 
Growing Together - software development in the Developing world
Growing Together - software development in the Developing worldGrowing Together - software development in the Developing world
Growing Together - software development in the Developing worldEqual Experts
 
Infrastructure - a journey from datacentres to cloud
Infrastructure - a journey from datacentres to cloudInfrastructure - a journey from datacentres to cloud
Infrastructure - a journey from datacentres to cloudEqual Experts
 
Data Science In Action: Prenatal Screening for Down Syndrome
Data Science In Action: Prenatal Screening for Down SyndromeData Science In Action: Prenatal Screening for Down Syndrome
Data Science In Action: Prenatal Screening for Down SyndromeEqual Experts
 
The essentials of the IT industry or What I wish I was taught about at Univer...
The essentials of the IT industry or What I wish I was taught about at Univer...The essentials of the IT industry or What I wish I was taught about at Univer...
The essentials of the IT industry or What I wish I was taught about at Univer...Equal Experts
 
Secrets of an agile transformation
Secrets of an agile transformationSecrets of an agile transformation
Secrets of an agile transformationEqual Experts
 
Obstacles of Digital Transformation Evolution
Obstacles of Digital Transformation EvolutionObstacles of Digital Transformation Evolution
Obstacles of Digital Transformation EvolutionEqual Experts
 
Embracing collaborative chaos
Embracing collaborative chaosEmbracing collaborative chaos
Embracing collaborative chaosEqual Experts
 
Organising for Continuous Delivery
Organising for Continuous DeliveryOrganising for Continuous Delivery
Organising for Continuous DeliveryEqual Experts
 
Cracking passwords via common topologies
Cracking passwords via common topologiesCracking passwords via common topologies
Cracking passwords via common topologiesEqual Experts
 
Inception Phases - Handling Complexity
Inception Phases - Handling ComplexityInception Phases - Handling Complexity
Inception Phases - Handling ComplexityEqual Experts
 
Smoothing the Continuous Delivery Path - A Tale of Two Teams
Smoothing the Continuous Delivery Path - A Tale of Two TeamsSmoothing the Continuous Delivery Path - A Tale of Two Teams
Smoothing the Continuous Delivery Path - A Tale of Two TeamsEqual Experts
 

Mehr von Equal Experts (20)

TRUST Framework Talk 2023-03-10.pptx
TRUST Framework Talk 2023-03-10.pptxTRUST Framework Talk 2023-03-10.pptx
TRUST Framework Talk 2023-03-10.pptx
 
Will it matter if your child cannot code?
Will it matter if your child cannot code?Will it matter if your child cannot code?
Will it matter if your child cannot code?
 
Software development practices & Infrastructure as Code - how well do they wo...
Software development practices & Infrastructure as Code - how well do they wo...Software development practices & Infrastructure as Code - how well do they wo...
Software development practices & Infrastructure as Code - how well do they wo...
 
A Whole Team Approach to Quality in Continuous Delivery - Lisa Crispin
A Whole Team Approach to Quality in Continuous Delivery - Lisa CrispinA Whole Team Approach to Quality in Continuous Delivery - Lisa Crispin
A Whole Team Approach to Quality in Continuous Delivery - Lisa Crispin
 
Secure Continuous Delivery
Secure Continuous DeliverySecure Continuous Delivery
Secure Continuous Delivery
 
Smoothing the continuous delivery path a tale of two architectures - expert...
Smoothing the continuous delivery path   a tale of two architectures - expert...Smoothing the continuous delivery path   a tale of two architectures - expert...
Smoothing the continuous delivery path a tale of two architectures - expert...
 
Embracing collaborative chaos (April 2020) by Lyndsay Prewer
Embracing collaborative chaos (April 2020) by Lyndsay PrewerEmbracing collaborative chaos (April 2020) by Lyndsay Prewer
Embracing collaborative chaos (April 2020) by Lyndsay Prewer
 
Design Systems: Designing out Waste, Designing in Consistency
Design Systems: Designing out Waste, Designing in ConsistencyDesign Systems: Designing out Waste, Designing in Consistency
Design Systems: Designing out Waste, Designing in Consistency
 
Growing Together - software development in the Developing world
Growing Together - software development in the Developing worldGrowing Together - software development in the Developing world
Growing Together - software development in the Developing world
 
Infrastructure - a journey from datacentres to cloud
Infrastructure - a journey from datacentres to cloudInfrastructure - a journey from datacentres to cloud
Infrastructure - a journey from datacentres to cloud
 
Data Science In Action: Prenatal Screening for Down Syndrome
Data Science In Action: Prenatal Screening for Down SyndromeData Science In Action: Prenatal Screening for Down Syndrome
Data Science In Action: Prenatal Screening for Down Syndrome
 
The essentials of the IT industry or What I wish I was taught about at Univer...
The essentials of the IT industry or What I wish I was taught about at Univer...The essentials of the IT industry or What I wish I was taught about at Univer...
The essentials of the IT industry or What I wish I was taught about at Univer...
 
Secrets of an agile transformation
Secrets of an agile transformationSecrets of an agile transformation
Secrets of an agile transformation
 
Obstacles of Digital Transformation Evolution
Obstacles of Digital Transformation EvolutionObstacles of Digital Transformation Evolution
Obstacles of Digital Transformation Evolution
 
Embracing collaborative chaos
Embracing collaborative chaosEmbracing collaborative chaos
Embracing collaborative chaos
 
Continuous Security
Continuous SecurityContinuous Security
Continuous Security
 
Organising for Continuous Delivery
Organising for Continuous DeliveryOrganising for Continuous Delivery
Organising for Continuous Delivery
 
Cracking passwords via common topologies
Cracking passwords via common topologiesCracking passwords via common topologies
Cracking passwords via common topologies
 
Inception Phases - Handling Complexity
Inception Phases - Handling ComplexityInception Phases - Handling Complexity
Inception Phases - Handling Complexity
 
Smoothing the Continuous Delivery Path - A Tale of Two Teams
Smoothing the Continuous Delivery Path - A Tale of Two TeamsSmoothing the Continuous Delivery Path - A Tale of Two Teams
Smoothing the Continuous Delivery Path - A Tale of Two Teams
 

Kürzlich hochgeladen

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Kürzlich hochgeladen (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Platform Security IRL: Busting Buzzwords & Building Better

  • 2. Java Developer > Security Champion > Security Architect > Security Tech Lead Payments, Banking & Government Transformations Lead Security Engineer @ Clearbank choss@outlook.com Chris Rutter
  • 3. Tips and techniques learned building security at scale on a large software platform General concepts for thinking about modern security Benefits of approaches such as standardisation and convention Talk Aims
  • 4. An integration oriented design approach emphasizing systematic reuse, for developing complex products based upon platforms and compatible hardware and software virtual components, intended to reduce development risks, costs and time to market + Reduce security risks Platform Based Architecture https://en.wikipedia.org/wiki/Platform-based_design
  • 6. Large Government Department ● 60 Development Pizza teams ● 1700 Total employees ● 1000 microservices ● 6 Platform Teams ● 1 Platform Security Team (4 people) Lessons & Techniques
  • 7. ● Lead who understands security and tech ● Product owner who understands value and business impact ● Floating engineering resources Security Team Structure
  • 8. Platform Security Team Mandate ● Build security into platform development workflows ● Improve Access Management on platform ● Improve operational security capability of platform ● Help coordinate Live vulnerabilities and incidents ● Improve app team development security ● Own and push platform-wide security initiatives Scalable and Valuable Security
  • 12. Traditional Approach ● Investigation of each finding takes approx 30-60 mins ● Buy licences and on-board 50 champions to use tool ● Security team consulting with 50 teams ● Investigation robustness difficult to standardise ● Shifting Left ● Giving ownership to engineers
  • 14. Focus on Shared Libs ● Platform Security ○ Scan ○ Investigate ○ Triage ● Platform Applications Team ○ Build updated shared libraries ○ Test ○ Publish new version
  • 15. Jackson Deserialization Vulnerability (CVE 2017-7525): Introduction: This vulnerability takes advantage of the ability of an attacker to force a server to deserialize a compromised class which is known to be on a large number of class paths and inject malicious input which can result in code execution. Am I Vulnerable?: You are vulnerable if you use polymorphic typing feature anywhere in your code. This can be configured in a few ways: @JsonTypeInfo, @JsonSubTypes or mapper.enableDefaultTyping() How can I remediate?: You must ensure that you globally configure ObjectMapper disableDefaultTyping() and have no instances of @JsonTypeInfo, @JsonSubTypes Sensible & Specific Remediation Advice
  • 16. Basic Code Scanning Engine Vulnerability Search Terms XXE XMLInputFactory, TransformerFactory, SchemaFactory, SAXTransformerFactory, XMLReader Jackson Deserialization @JsonTypeInfo, @JsonSubTypes, mapper.enableDefaultTyping() Logback ServerSocketReceiver
  • 17. Block Releases After Timeframe
  • 18. ● In-depth analysis by security engineer for accurate diagnosis ● Upgrade path can scale out and is easily Enforced ● Small implementation effort, low load on security team, low cost of scanning tool ● Lots of engineer time saved by centralising investigations ● 80% of value for 20% of the resources Benefits
  • 19. ● Shift left but only if valuable and manageable ● Ensure shared functionality is centralised, then it can be scanned less times and investigated more thouroughly ● Understand and test the full remediation flow ● Focus on value over comprehensiveness, how much risk reduced for effort? Fight this fight with Auditors! ● Implement in value iterations like any other project General Scanning Tool Concepts
  • 20. ● Granular database users for each application ● Controls around their scope of access and permissions ● Frictionless process to on-board new application Granular Database Access Management
  • 21. Access Management Requirements ● App is created and requires access to a database cluster ● App permissions must be defined (which DBs, tables etc.) ● Users created in DB and credentials stored securely ● Credentials provided to applications on deployment ● Permissions altered if data model changes Granular Database Access Management
  • 22. Traditional Approach #1 ● Manual DB & User creation via ticket ● Manual security review ● Manual storage of creds in secrets manager Slow & Tedious Prone to error Encourages larger DBs and wider roles
  • 23. Traditional Approach ● Extremely slow and involved process ● Requires full-time team of DBAs ● Encourages wider roles and larger DBs ● Significant chance of manual error ● Comprehensive review of all permissions ● Defined ownership of database management
  • 28. Cater For Exceptions ● Legacy Apps ● True Snowflakes ● Automatically Applied ● Managed via PR ● Approval group on PR
  • 29. Benefits ● All access by namespace convention ● Fast and automatic provisioning, new app could go to prod instantly ● Security controls built in, free and pre-approved ● Can be used to automate: ○ Scaffolding with application libraries ○ IAM access to Cloud PaaS resources ○ Deployment pipeline creation ○ DockerFile Creation ● Still allows for legacy or non-compliant patterns but makes this harder
  • 30. Concepts ● Automate app creation lifecycle ● Standardise architectural patterns ● Provision apps to be secure by default ● Mechanism built and owned by platform teams ● Codified exceptions for legitimate use cases / legacy
  • 31. Tiger Team Platform Project ● Cross cutting projects can be very slow ● A lot of time spent managing big bang migrations ● Pockets of knowledge
  • 32. Tiger Team ● Architect for design continuity ● Engineers rotating from all necessary platform teams
  • 33. Tiger Project Plan ● Small iterations through to production, cutting down on intra-team backlog slow down, minimising big bang migrations and flushing out integration issues
  • 34. Traditional Security Review Approach ● Pen Test or architectural review at end of project ● No security input during development ● Project can not be released in iterations which will massively slow down project / integration Review / Pen Test
  • 35. Iterative Just-In-Time Approach Review / Re-modelThreat Model Review / Re-model Finalise Review
  • 36. Iterative Just-In-Time Approach ● Cross-team project to migrate to a new container hosting solution
  • 37. Iterative Threat Model ● Iteration 1 New dummy service in private zone, no internet connection and no database access Network controls must be in place to isolate new apps from production. Access controls in place so new deployer cannot deploy to existing prod ● Iteration 2 Dummy service with vpn-locked down internet access, no database access VPN Whitelist must be securely implemented ● Iteration 3 Dummy service with vpn-locked down internet access and access to database holding non-sensitive public data Database credentials must be protected and no access given to other databases
  • 38. Benefits ● Support much faster delivery of cross-cutting improvement projects ● Security team involved in entire project, understanding domain from the outset ● System has security built-in from initial design ● Security considered an enabler ● Avoid expensive fixes based on late pen test or security review
  • 39. Conclusions ● Standardisation and convention is the easiest and cheapest way to scale securely ● Understand what your teams share, and what they truly need to customise ● Create platform teams with concrete ownership to build and own cross- cutting functionality (including security) ● Don’t be scared to take the 80% ● Use Cross-functional virtual teams to build faster and more securely ● Use just-in-time threat modelling to support rapid delivery

Hinweis der Redaktion

  1. Security usually last ones to the party
  2. Shifting left, each team finds out very quickly
  3. Most dependency issues are not actually vulnerable based on usage patterns, but that takes a lot of time. I’ve seen projects like this take years, as infosec teams attempt to manage all of the same results
  4. Remediate immediately if this is the case
  5. Build basic scanning engine for vulnerable usage patterns Can be ran by sec team / hosted in Jenkins or CodeBuild Central location for Regexes
  6. INTRODUCE DEPENDENCY CHECKING Most of the time wasted is investigation!
  7. INTRODUCE DEPENDENCY CHECKING Most of the time wasted is investigation!
  8. Most dependency issues are not actually vulnerable based on usage patterns, but that takes a lot of time. I’ve seen projects like this take years, as infosec teams attempt to manage all of the same results