SlideShare ist ein Scribd-Unternehmen logo
1 von 104
Security is Dead.
Long Live Rugged DevOps:
IT at Ludicrous Speed…


Joshua Corman & Gene Kim
SecureWorld Boston
March 28, 2012



Session ID:
About Joshua Corman
      Director of Security Intelligence for Akamai Technologies
         Former Research Director, Enterprise Security [The 451 Group]
         Former Principal Security Strategist [IBM ISS]

      Industry:
           Expert Faculty: The Institute for Applied Network Security (IANS)
           2009 NetworkWorld Top 10 Tech People to Know
           Co-Founder of “Rugged Software” www.ruggedsoftware.org
           BLOG: www.cognitivedissidents.com

      Things I’ve been researching:
           Compliance vs Security
           Disruptive Security for Disruptive Innovations
           Chaotic Actors
           Espionage
           Security Metrics

2
About Gene Kim
      Researcher, Author

      Industry:
         Invented and founded Tripwire, CTO (1997-2010)
         Co-author: “Visible Ops Handbook”(2006), “Visible Ops Security” (2008)
         Co-author: “When IT Fails: The Novel,” “The DevOps Cookbook” (Coming
          May 2012)

      Things I’ve been researching:
         Benchmarked 1300+ IT organizations to test effectiveness of IT controls vs.
          IT performance
         DevOps, Rugged DevOps
         Scoping PCI Cardholder Data Environment




3
Where Did The High Performers Come From?
The Downward Spiral
 Operations Sees…                            Dev Sees…
  Fragile applications are prone to          More urgent, date-driven projects
   failure                                     put into the queue
  Long time required to figure out “which    Even more fragile code (less
   bit got flipped”                            secure) put into production
  Detective control is a salesperson         More releases have increasingly
                                               “turbulent installs”
  Too much time required to restore
   service                                    Release cycles lengthen to
                                               amortize “cost of deployments”
  Too much firefighting and unplanned
   work                                       Failing bigger deployments more
                                               difficult to diagnose
  Urgent security rework and
   remediation                                Most senior and constrained IT
                                               ops resources have less time to
  Planned project work cannot complete        fix underlying process problems
  Frustrated customers leave                 Ever increasing backlog of work
  Market share goes down                      that cold help the business win
  Business misses Wall Street                Ever increasing amount of
   commitments                                 tension between IT Ops,
                                               Development, Design…
  Business makes even larger promises
   to Wall Street
                     These aren’t IT or Infosec problems…
                        These are business problems!
My Mission: Figure Out How Break The IT Core
    Chronic Conflict

     Every IT organization is pressured to
      simultaneously:
       Respond more quickly to urgent business needs
       Provide stable, secure and predictable IT service




                  Words often used to describe process improvement:
       “hysterical, irrelevant, bureaucratic, bottleneck, difficult to understand, not
      aligned with the business, immature, shrill, perpetually focused on irrelevant
                                    technical minutiae…”



           Source: The authors acknowledge Dr. Eliyahu Goldratt, creator of the Theory of Constraints and author of The Goal, has
6          written extensively on the theory and practice of identifying and resolving core, chronic conflicts.
Good News: It Can Be Done

Bad News: You Can’t Do It Alone
Ops
QA And Test




 Source: Flickr: vandyll
Development
Infosec
Product Management And Design




 Source: Flickr: birdsandanchors
Agenda
 Problem statement
 What is Rugged?
 What is DevOps?
 How do you do Rugged DevOps?
 Things you can do right away




                       13
Potentially Unfamiliar Words You Will See
 Kanban
 Andon cord
 Sprints
 Rugged
 DevOps
 Bottleneck
 Systems thinking
 Controls reliance


                      14
Problem Statement




        15
Ludicrous Speed?




                   16
Ludicrous Speed




                  17
Ludicrous Speed!




                   18
Ludicrous Fail?!




                   19
What Is DevOps?




         20
Source: John Allspaw
Source: John Allspaw
Source: John Allspaw
Source: John Allspaw
Source: Theo Schlossnagle
Source: Theo Schlossnagle
Source: Theo Schlossnagle
Source: John Jenkins, Amazon.com
What Is Rugged?




         30
Rugged Software Development
Joshua Corman, David Rice, Jeff Williams
2010
RUGGED SOFTWARE
…so software not only needs to be…
FAST
AGILE
Are You Rugged?
HARSH
UNFRIENDLY
THE MANIFESTO
I recognize that my code will be used in ways I
cannot anticipate, in ways it was not designed,
   and for longer than it was ever intended.
www.ruggedsoftware.org
                         CrossTalk
http://www.crosstalkonline.org/issues/marchapril-2011.html
What Is Rugged DevOps?




         46
Source: James Wickett
Source: James Wickett
Survival Guide/Pyramid




          www.ruggedsoftware.org

         Defensible Infrastructure
Survival Guide/Pyramid




           Operational Discipline

         Defensible Infrastructure
Survival Guide/Pyramid




           Situational Awareness

           Operational Discipline

         Defensible Infrastructure
Survival Guide/Pyramid

           Countermeasures

         Situational Awareness

         Operational Discipline

        Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Zombie Proof Housing
http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house



                                                                                      Countermeasure
                                                                                             s

                                                                                   Situational Awareness

                                                                                   Operational Discipline

                                                                                  Defensible Infrastructure
Source: James Wickett
How Do You Do
Rugged DevOps?




        64
The Prescriptive DevOps Cookbook

                    “DevOps Cookbook” Authors
                       Patrick DeBois, Mike Orzen,
                        John Willis

                    Goals
                       Codify how to start and finish
                        DevOps transformations
                       How does Development, IT
                        Operations and Infosec
                        become dependable partners
                       Describe in detail how to
                        replicate the transformations
                        describe in “When IT Fails: The
                        Novel”
The First Way:
Systems Thinking
The First Way:
Systems Thinking (Left To Right)

 Never pass defects to downstream work centers
 Never allow local optimization to create global
  degradation
 Increase flow: elevate bottlenecks, reduce WIP,
  throttle release of work, reduce batch sizes
Definition: Agile Sprints
 The basic unit of development in Agile Scrums,
  typically between one week and one month
 At the end of each sprint, team should have
  potentially deliverable product




        Aha Moment: shipping product implies not just code –
                    it’s the environment, too!
                                68
Help Dev And Ops Build Code And
Environments

 Dev and Ops work together in Sprint 0 and 1 to
  create code and environments
   Create environment that Dev deploys into
   Create downstream environments: QA, Staging,
    Production
   Create testable migration procedures from Dev all the
    way to production
 Integrate Infosec and QA into daily sprint
  activities
The First Way:
Systems Thinking: Infosec

 Get a seat at the table
   DevOps programs are typically led by Dev, QA, IT
    Operations and Product Management
 Add value at every step in the flow of work
   See the end-to-end value flow
   Shorten and amplify feedback loops
   Help break silos (e.g., server, networking, database)
The First Way:
Systems Thinking: Infosec Insurgency
 Have infosec attend the daily Agile standups
    Gain awareness of what the team is working on
 Find the automated infrastructure project team
  (e.g., puppet, chef)
    Provide hardening guidance
    Integrate and extend their production configuration
     monitoring
 Find where code packaging is performed
    Integrate security testing pre- and post-deployment
 Integrate into continuous integration and release
  process
    Add security test scripts to automated test library
The First Way:
Outcomes
 Determinism in the release process
 Continuation of the Agile and CI/CR processes
 Creating single repository for code and environments
 Packaging responsibility moves to development
 Consistent Dev, QA, Int, and Staging environments, all
  properly built before deployment begins
 Decrease cycle time
    Reduce deployment times from 6 hours to 45 minutes
    Refactor deployment process that had 1300+ steps
     spanning 4 weeks
 Faster release cadence
The Second Way:
Amplify Feedback Loops
The Second Way:
Amplify Feedback Loops (Right to Left)

 Protect the integrity of the entire system of work,
  versus completion of tasks
 Expose visual data so everyone can see how
  their decisions affect the entire system
Definition: Andon Cord




                   75
Integrate Ops Into Dev
 Embed Ops person into Dev structure
   Describes non-functional requirements, use cases
    and stories from Ops
   Responsible for improving “quality at the source”
    (e.g., reducing technical debt, fix known problems,
    etc.)
   Has special responsibility for pulling the Andon cord
Integrate Dev Into Ops
 MobBrowser case study: “Waking up developers
  at 3am is a great feedback loop: defects get
  fixed very quickly”

 Goal is to get Dev closer to the customer
   Infosec can help determine when it’s too close (and
    when SOD is a requirement)
Keep Shrinking Batch Sizes
 Waterfall projects often have cycle time of one
  year
 Sprints have cycle time of 1 or 2 weeks
 When IT Operations work is sufficiently fast and
  cheap, we may decide to decouple deployments
  from sprint boundaries (e.g., Kanbans)
Definition: Kanban Board
 Signaling tool to reduce WIP and increase flow




                        79
The Second Way:
Amplify Feedback Loops: Infosec Insurgency
 Extend criteria of what changes/deploys cannot be
  made without triggering full retest
 Create reusable Infosec use and abuse stories that
  can be added to every project
    “Handle peak traffic of 4MM users and constant 4-6
     Gb/sec Anonymous DDoS attacks”
 Integrate Infosec and IR into the Ops/Dev escalation
  processes (e.g., RACI)
 Pre-enable, shield streamline successful audits
    Document separation of duty and compensating controls
    Don’t let them disrupt the work
The Second Way:
Outcomes
 Andon cords that stop the production line
 Kanban to control work
 Project freeze to reduce work in process
 Eradicating “quick fixes” that circumvent the process
 Ops user stories are part of the Agile planning
  process
 Better build and deployment systems
 More stable environment
 Happier and more productive staff
The Third Way:
Culture Of Continual Experimentation And
Learning
The Third Way:
Culture Of Continual Experimentation And
Learning

 Foster a culture that rewards:
   Experimentation (taking risks) and learning from
    failure
   Repetition is the prerequisite to mastery
 Why?
   You need a culture that keeps pushing into the danger
    zone
   And have the habits that enable you to survive in the
    danger zone
Help IT Operations…

                         “The best way to avoid failure is
                          to fail constantly”
                         Harden the production
                          environment
                         Have scheduled drills to “crash
                          the data center”
                         Create your “chaos monkeys” to
                          introduce faults into the system
                          (e.g., randomly kill processes,
                          take out servers, etc.)
                         Rehearse and improve
                          responding to unplanned work
                              NetFlix: Hardened AWS service

                              StackOverflow
                              Amazon firedrills (Jesse Allspaw)
                              The Monkey (Mac)
You Don’t Choose Chaos Monkey…
Chaos Monkey Chooses You
Help Product Management…




 Lesson: Allocate 20% of Dev cycles to paying down
                   technical debt
The Third Way:
Culture Of Continual Experimentation And
Learning: Infosec
 Add Infosec fixes to the Agile backlog
    Make technical debt visible
    Help prioritize work against features and other non-functional requirements
 Weaponize the Security Monkey
    Evil/Fuzzy/Chaotic Monkey
    Eridicate SQLi and XSS defects in our lifetime
 Let loose the Security Monkies and the Simian Army
 Eliminate needless complexity
 Become the standard bearer: 20% of Dev cycles spent on
  non-functional requirements
 Take work out of the system
 Keep decreasing cycle time: it increases work that the system
  can achieve
The Third Way:
Outcomes
 15 minutes/daily spent on improving daily work
 Continual reduction of unplanned work
 More cycles for planned work
 Projects completed to pay down technical debt and
  increase flow
 Elimination of needless complexity
 More resilient code and environments
 Balancing nimbleness and practiced repetition
 Enabling wider range of risk/reward balance
The Upward Spiral




                    89
What Does Rugged DevOps
Feel Like?




        90
Case Studies And Early Indicators
 Almost every major Internet online services
  company
 VERACODE Rapid SaaS Fix Blog Post
   http://www.veracode.com/blog/2012/01/vulnerability-
    response-done-right/
 Pervasive Monitoring
   Analytics at LinkedIn viewed by CEO daily:
    LinkedIn Engineering: “The Birth Of inGraphs: Eric
    The Intern”
Applying RuggedDevOps




        93
The Downward Spiral
 Operations Sees…                            Dev Sees…
  Fragile applications are prone to          More urgent, date-driven projects
   failure                                     put into the queue
  Long time required to figure out “which    Even more fragile code (less
   bit got flipped”                            secure) put into production
  Detective control is a salesperson         More releases have increasingly
                                               “turbulent installs”
  Too much time required to restore
   service                                    Release cycles lengthen to
                                               amortize “cost of deployments”
  Too much firefighting and unplanned
   work                                       Failing bigger deployments more
                                               difficult to diagnose
  Urgent security rework and
   remediation                                Most senior and constrained IT
                                               ops resources have less time to
  Planned project work cannot complete        fix underlying process problems
  Frustrated customers leave                 Ever increasing backlog of work
  Market share goes down                      that cold help the business win
  Business misses Wall Street                Ever increasing amount of
   commitments                                 tension between IT Ops,
                                               Development, Design…
  Business makes even larger promises
   to Wall Street
                     These aren’t IT or Infosec problems…
                        These are business problems!
When IT Fails: The Novel and The DevOps
  Cookbook


                               Coming in July 2012


                               “In the tradition of the best MBA case studies, this
                                book should be mandatory reading for business
                                and IT graduates alike.” -Paul Muller, VP
                                Software Marketing, Hewlett-Packard

                               “The greatest IT management book of our
Gene Kim, Tripwire founder,
                                generation.” –Branden Williams, CTO
Visible Ops co-author           Marketing, RSA
When IT Fails: The Novel and The DevOps
  Cookbook


                               Coming in July 2012

                               If you would like the “Top 10 Things You
                                Need To Know About DevOps,” sample
                                chapters and updates on the book:

                                Sign up at http://itrevolution.com
Gene Kim, Tripwire founder,
                                Email genek@realgenekim.me
Visible Ops co-author           Give me your business card
To Join The Movement
 Our goal is to affect the lives of one million IT
  workers by 2017

 If you would like the “Top 10 Things You Need To
  Know About DevOps,” sample chapters and
  updates on the book:
  Sign up at http://itrevolution.com
  Email genek@realgenekim.me
  Give me your business card
Thank You




        98
Appendix




           99
Resources
 From the IT Process Institute
  www.itpi.org
    Both Visible Ops Handbooks
    ITPI IT Controls Performance Study

 Rugged Software by Corman, et al:
  http://ruggedsoftware.org
 “Continuous Delivery: Reliable Software
  Releases through Build, Test, and
  Deployment Automation” by
  Humble, Farley
 Follow us…
    @JoshCorman, @RealGeneKim
    mailto:genek@realgenekim.me
    http://realgenekim.me/blog
Common Traits of High Performers
Culture of…
Change management
   Integration of IT operations/security via problem/change management
   Processes that serve both organizational needs and business objectives
   Highest rate of effective change

Causality
   Highest service levels (MTTR, MTBF)
   Highest first fix rate (unneeded rework)

Compliance and continual reduction of
operational variance
   Production configurations
   Highest level of pre-production staffing
   Effective pre-production controls
   Effective pairing of preventive and detective controls

                               Source: IT Process Institute
Visible Ops: Playbook of High Performers
 The IT Process Institute has been
  studying high-performing
  organizations since 1999
   What is common to all the high
    performers?
   What is different between them and
    average and low performers?
   How did they become great?
 Answers have been codified in the
  Visible Ops Methodology
 The “Visible Ops Handbook” is
  available from the ITPI
                                         www.ITPI.org
IT Operations Increases Process Rigor
 Standardize deployment
 Standardize unplanned work: make it repeatable
 Modify first response: ensure constrained
  resources have all data at hand to diagnose
 Elevate preventive activities to reduce incidents
Help Development…
 Help them see downstream effects
   Unplanned work comes at the expense of planned
    work
   Technical debt retards feature throughput
   Environment matters as much as the code
 Allocate time for fault modeling, asking “what
  could go wrong?” and implementing
  countermeasures
Help QA…
 Ensure test plans cover not only code
  functionality, but also:
   Suitability of the environment the code runs in
   The end-to-end deployment process
 Help find variance…
   Functionality, performance, configuration
   Duration, wait time and handoff errors, rework, …

Weitere ähnliche Inhalte

Was ist angesagt?

How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
Gene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
Gene Kim
 
Mary Poppendieck: Agile under contract
Mary Poppendieck: Agile under contractMary Poppendieck: Agile under contract
Mary Poppendieck: Agile under contract
Agile Lietuva
 
2009 06 01 The Lean Startup Texas Edition
2009 06 01 The Lean Startup Texas Edition2009 06 01 The Lean Startup Texas Edition
2009 06 01 The Lean Startup Texas Edition
Eric Ries
 

Was ist angesagt? (20)

2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops final
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
When IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy WebinarWhen IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy Webinar
 
Mary Poppendieck: The Aware Organization - Lean IT Summit 2014
Mary Poppendieck: The Aware Organization - Lean IT Summit 2014Mary Poppendieck: The Aware Organization - Lean IT Summit 2014
Mary Poppendieck: The Aware Organization - Lean IT Summit 2014
 
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
 
The History of DevOps (and what you need to do about it)
The History of DevOps (and what you need to do about it)The History of DevOps (and what you need to do about it)
The History of DevOps (and what you need to do about it)
 
Mary Poppendieck: Agile under contract
Mary Poppendieck: Agile under contractMary Poppendieck: Agile under contract
Mary Poppendieck: Agile under contract
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
ROOTS2011 Continuous Delivery
ROOTS2011 Continuous DeliveryROOTS2011 Continuous Delivery
ROOTS2011 Continuous Delivery
 
2009 06 01 The Lean Startup Texas Edition
2009 06 01 The Lean Startup Texas Edition2009 06 01 The Lean Startup Texas Edition
2009 06 01 The Lean Startup Texas Edition
 
Discovery delivery agiletour-xian
Discovery delivery agiletour-xianDiscovery delivery agiletour-xian
Discovery delivery agiletour-xian
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 

Andere mochten auch

MDFF_Guidelines_Print version_FINAL_Low Res
MDFF_Guidelines_Print version_FINAL_Low ResMDFF_Guidelines_Print version_FINAL_Low Res
MDFF_Guidelines_Print version_FINAL_Low Res
ivanidrovo
 
A study of studies suzanne gibbons
A study of studies   suzanne gibbonsA study of studies   suzanne gibbons
A study of studies suzanne gibbons
sgibbon1
 
A study of studies suzanne gibbons
A study of studies   suzanne gibbonsA study of studies   suzanne gibbons
A study of studies suzanne gibbons
sgibbon1
 
Proactol Afiliate Presentation
Proactol Afiliate PresentationProactol Afiliate Presentation
Proactol Afiliate Presentation
MoreNiche
 

Andere mochten auch (18)

Euclid Network
Euclid NetworkEuclid Network
Euclid Network
 
Skills expo v03
Skills expo v03Skills expo v03
Skills expo v03
 
3. turning 1st referrals into sales with q&a
3. turning 1st referrals into sales with q&a3. turning 1st referrals into sales with q&a
3. turning 1st referrals into sales with q&a
 
MDFF_Guidelines_Print version_FINAL_Low Res
MDFF_Guidelines_Print version_FINAL_Low ResMDFF_Guidelines_Print version_FINAL_Low Res
MDFF_Guidelines_Print version_FINAL_Low Res
 
A study of studies suzanne gibbons
A study of studies   suzanne gibbonsA study of studies   suzanne gibbons
A study of studies suzanne gibbons
 
A study of studies suzanne gibbons
A study of studies   suzanne gibbonsA study of studies   suzanne gibbons
A study of studies suzanne gibbons
 
Lifehacking in het onderwijs
Lifehacking in het onderwijsLifehacking in het onderwijs
Lifehacking in het onderwijs
 
Lembar asistensi pbl
Lembar asistensi pblLembar asistensi pbl
Lembar asistensi pbl
 
Flamenco
FlamencoFlamenco
Flamenco
 
Proactol Afiliate Presentation
Proactol Afiliate PresentationProactol Afiliate Presentation
Proactol Afiliate Presentation
 
Kenett On Information NYU-Poly 2013
Kenett On Information NYU-Poly 2013Kenett On Information NYU-Poly 2013
Kenett On Information NYU-Poly 2013
 
Osi pi oracle ems 9-9-15
Osi pi oracle ems 9-9-15Osi pi oracle ems 9-9-15
Osi pi oracle ems 9-9-15
 
Adventure Friends
Adventure FriendsAdventure Friends
Adventure Friends
 
Вы управляете проектом или проект управляет вами?
Вы управляете проектом или проект управляет вами?Вы управляете проектом или проект управляет вами?
Вы управляете проектом или проект управляет вами?
 
Portable Air Conditioner
Portable Air ConditionerPortable Air Conditioner
Portable Air Conditioner
 
Introducing Euclid Network2
Introducing Euclid Network2Introducing Euclid Network2
Introducing Euclid Network2
 
Working for Dedevan
Working for DedevanWorking for Dedevan
Working for Dedevan
 
Tugas Transmisi Daya Listrik
Tugas Transmisi Daya ListrikTugas Transmisi Daya Listrik
Tugas Transmisi Daya Listrik
 

Ähnlich wie SecureWorld: Security is Dead, Rugged DevOps 1f

Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
W Fred Seigneur
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
Albert Hui
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
Seema Sheth-Voss
 
4 b. thomas whipp presentation
4 b. thomas whipp presentation4 b. thomas whipp presentation
4 b. thomas whipp presentation
CFG
 
Sparkling Logic presents Agile Knowledge Elicitation
Sparkling Logic presents Agile Knowledge ElicitationSparkling Logic presents Agile Knowledge Elicitation
Sparkling Logic presents Agile Knowledge Elicitation
Carole-Ann Matignon
 

Ähnlich wie SecureWorld: Security is Dead, Rugged DevOps 1f (20)

Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous SpeedSecurity is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Farewell to the Security Sandwich
Farewell to the Security SandwichFarewell to the Security Sandwich
Farewell to the Security Sandwich
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
4 b. thomas whipp presentation
4 b. thomas whipp presentation4 b. thomas whipp presentation
4 b. thomas whipp presentation
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Four level teaching approach in Security market
Four level teaching approach in Security marketFour level teaching approach in Security market
Four level teaching approach in Security market
 
Sparkling Logic presents Agile Knowledge Elicitation
Sparkling Logic presents Agile Knowledge ElicitationSparkling Logic presents Agile Knowledge Elicitation
Sparkling Logic presents Agile Knowledge Elicitation
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 

Mehr von Gene Kim

The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
Gene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
Gene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
Gene Kim
 
DevOps Kanban Meet Up 3/22/12
DevOps Kanban Meet Up 3/22/12DevOps Kanban Meet Up 3/22/12
DevOps Kanban Meet Up 3/22/12
Gene Kim
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim
Gene Kim
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
Gene Kim
 

Mehr von Gene Kim (13)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
DevOps Kanban Meet Up 3/22/12
DevOps Kanban Meet Up 3/22/12DevOps Kanban Meet Up 3/22/12
DevOps Kanban Meet Up 3/22/12
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

SecureWorld: Security is Dead, Rugged DevOps 1f

  • 1. Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed… Joshua Corman & Gene Kim SecureWorld Boston March 28, 2012 Session ID:
  • 2. About Joshua Corman  Director of Security Intelligence for Akamai Technologies  Former Research Director, Enterprise Security [The 451 Group]  Former Principal Security Strategist [IBM ISS]  Industry:  Expert Faculty: The Institute for Applied Network Security (IANS)  2009 NetworkWorld Top 10 Tech People to Know  Co-Founder of “Rugged Software” www.ruggedsoftware.org  BLOG: www.cognitivedissidents.com  Things I’ve been researching:  Compliance vs Security  Disruptive Security for Disruptive Innovations  Chaotic Actors  Espionage  Security Metrics 2
  • 3. About Gene Kim  Researcher, Author  Industry:  Invented and founded Tripwire, CTO (1997-2010)  Co-author: “Visible Ops Handbook”(2006), “Visible Ops Security” (2008)  Co-author: “When IT Fails: The Novel,” “The DevOps Cookbook” (Coming May 2012)  Things I’ve been researching:  Benchmarked 1300+ IT organizations to test effectiveness of IT controls vs. IT performance  DevOps, Rugged DevOps  Scoping PCI Cardholder Data Environment 3
  • 4. Where Did The High Performers Come From?
  • 5. The Downward Spiral Operations Sees… Dev Sees…  Fragile applications are prone to  More urgent, date-driven projects failure put into the queue  Long time required to figure out “which  Even more fragile code (less bit got flipped” secure) put into production  Detective control is a salesperson  More releases have increasingly “turbulent installs”  Too much time required to restore service  Release cycles lengthen to amortize “cost of deployments”  Too much firefighting and unplanned work  Failing bigger deployments more difficult to diagnose  Urgent security rework and remediation  Most senior and constrained IT ops resources have less time to  Planned project work cannot complete fix underlying process problems  Frustrated customers leave  Ever increasing backlog of work  Market share goes down that cold help the business win  Business misses Wall Street  Ever increasing amount of commitments tension between IT Ops, Development, Design…  Business makes even larger promises to Wall Street These aren’t IT or Infosec problems… These are business problems!
  • 6. My Mission: Figure Out How Break The IT Core Chronic Conflict  Every IT organization is pressured to simultaneously:  Respond more quickly to urgent business needs  Provide stable, secure and predictable IT service Words often used to describe process improvement: “hysterical, irrelevant, bureaucratic, bottleneck, difficult to understand, not aligned with the business, immature, shrill, perpetually focused on irrelevant technical minutiae…” Source: The authors acknowledge Dr. Eliyahu Goldratt, creator of the Theory of Constraints and author of The Goal, has 6 written extensively on the theory and practice of identifying and resolving core, chronic conflicts.
  • 7. Good News: It Can Be Done Bad News: You Can’t Do It Alone
  • 8. Ops
  • 9. QA And Test Source: Flickr: vandyll
  • 12. Product Management And Design Source: Flickr: birdsandanchors
  • 13. Agenda  Problem statement  What is Rugged?  What is DevOps?  How do you do Rugged DevOps?  Things you can do right away 13
  • 14. Potentially Unfamiliar Words You Will See  Kanban  Andon cord  Sprints  Rugged  DevOps  Bottleneck  Systems thinking  Controls reliance 14
  • 23.
  • 29. Source: John Jenkins, Amazon.com
  • 31. Rugged Software Development Joshua Corman, David Rice, Jeff Williams 2010
  • 32.
  • 33.
  • 35. …so software not only needs to be…
  • 36. FAST
  • 37. AGILE
  • 39. HARSH
  • 42.
  • 43. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended.
  • 44.
  • 45. www.ruggedsoftware.org CrossTalk http://www.crosstalkonline.org/issues/marchapril-2011.html
  • 46. What Is Rugged DevOps? 46
  • 49.
  • 50. Survival Guide/Pyramid www.ruggedsoftware.org Defensible Infrastructure
  • 51. Survival Guide/Pyramid Operational Discipline Defensible Infrastructure
  • 52. Survival Guide/Pyramid Situational Awareness Operational Discipline Defensible Infrastructure
  • 53. Survival Guide/Pyramid Countermeasures Situational Awareness Operational Discipline Defensible Infrastructure
  • 54. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 55. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 56. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 57. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 58. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 59. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 60. Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house Countermeasure s Situational Awareness Operational Discipline Defensible Infrastructure
  • 62.
  • 63. How Do You Do Rugged DevOps? 64
  • 64. The Prescriptive DevOps Cookbook  “DevOps Cookbook” Authors  Patrick DeBois, Mike Orzen, John Willis  Goals  Codify how to start and finish DevOps transformations  How does Development, IT Operations and Infosec become dependable partners  Describe in detail how to replicate the transformations describe in “When IT Fails: The Novel”
  • 66. The First Way: Systems Thinking (Left To Right)  Never pass defects to downstream work centers  Never allow local optimization to create global degradation  Increase flow: elevate bottlenecks, reduce WIP, throttle release of work, reduce batch sizes
  • 67. Definition: Agile Sprints  The basic unit of development in Agile Scrums, typically between one week and one month  At the end of each sprint, team should have potentially deliverable product Aha Moment: shipping product implies not just code – it’s the environment, too! 68
  • 68. Help Dev And Ops Build Code And Environments  Dev and Ops work together in Sprint 0 and 1 to create code and environments  Create environment that Dev deploys into  Create downstream environments: QA, Staging, Production  Create testable migration procedures from Dev all the way to production  Integrate Infosec and QA into daily sprint activities
  • 69. The First Way: Systems Thinking: Infosec  Get a seat at the table  DevOps programs are typically led by Dev, QA, IT Operations and Product Management  Add value at every step in the flow of work  See the end-to-end value flow  Shorten and amplify feedback loops  Help break silos (e.g., server, networking, database)
  • 70. The First Way: Systems Thinking: Infosec Insurgency  Have infosec attend the daily Agile standups  Gain awareness of what the team is working on  Find the automated infrastructure project team (e.g., puppet, chef)  Provide hardening guidance  Integrate and extend their production configuration monitoring  Find where code packaging is performed  Integrate security testing pre- and post-deployment  Integrate into continuous integration and release process  Add security test scripts to automated test library
  • 71. The First Way: Outcomes  Determinism in the release process  Continuation of the Agile and CI/CR processes  Creating single repository for code and environments  Packaging responsibility moves to development  Consistent Dev, QA, Int, and Staging environments, all properly built before deployment begins  Decrease cycle time  Reduce deployment times from 6 hours to 45 minutes  Refactor deployment process that had 1300+ steps spanning 4 weeks  Faster release cadence
  • 72. The Second Way: Amplify Feedback Loops
  • 73. The Second Way: Amplify Feedback Loops (Right to Left)  Protect the integrity of the entire system of work, versus completion of tasks  Expose visual data so everyone can see how their decisions affect the entire system
  • 75. Integrate Ops Into Dev  Embed Ops person into Dev structure  Describes non-functional requirements, use cases and stories from Ops  Responsible for improving “quality at the source” (e.g., reducing technical debt, fix known problems, etc.)  Has special responsibility for pulling the Andon cord
  • 76. Integrate Dev Into Ops  MobBrowser case study: “Waking up developers at 3am is a great feedback loop: defects get fixed very quickly”  Goal is to get Dev closer to the customer  Infosec can help determine when it’s too close (and when SOD is a requirement)
  • 77. Keep Shrinking Batch Sizes  Waterfall projects often have cycle time of one year  Sprints have cycle time of 1 or 2 weeks  When IT Operations work is sufficiently fast and cheap, we may decide to decouple deployments from sprint boundaries (e.g., Kanbans)
  • 78. Definition: Kanban Board  Signaling tool to reduce WIP and increase flow 79
  • 79. The Second Way: Amplify Feedback Loops: Infosec Insurgency  Extend criteria of what changes/deploys cannot be made without triggering full retest  Create reusable Infosec use and abuse stories that can be added to every project  “Handle peak traffic of 4MM users and constant 4-6 Gb/sec Anonymous DDoS attacks”  Integrate Infosec and IR into the Ops/Dev escalation processes (e.g., RACI)  Pre-enable, shield streamline successful audits  Document separation of duty and compensating controls  Don’t let them disrupt the work
  • 80. The Second Way: Outcomes  Andon cords that stop the production line  Kanban to control work  Project freeze to reduce work in process  Eradicating “quick fixes” that circumvent the process  Ops user stories are part of the Agile planning process  Better build and deployment systems  More stable environment  Happier and more productive staff
  • 81. The Third Way: Culture Of Continual Experimentation And Learning
  • 82. The Third Way: Culture Of Continual Experimentation And Learning  Foster a culture that rewards:  Experimentation (taking risks) and learning from failure  Repetition is the prerequisite to mastery  Why?  You need a culture that keeps pushing into the danger zone  And have the habits that enable you to survive in the danger zone
  • 83. Help IT Operations…  “The best way to avoid failure is to fail constantly”  Harden the production environment  Have scheduled drills to “crash the data center”  Create your “chaos monkeys” to introduce faults into the system (e.g., randomly kill processes, take out servers, etc.)  Rehearse and improve responding to unplanned work  NetFlix: Hardened AWS service  StackOverflow  Amazon firedrills (Jesse Allspaw)  The Monkey (Mac)
  • 84. You Don’t Choose Chaos Monkey… Chaos Monkey Chooses You
  • 85. Help Product Management… Lesson: Allocate 20% of Dev cycles to paying down technical debt
  • 86. The Third Way: Culture Of Continual Experimentation And Learning: Infosec  Add Infosec fixes to the Agile backlog  Make technical debt visible  Help prioritize work against features and other non-functional requirements  Weaponize the Security Monkey  Evil/Fuzzy/Chaotic Monkey  Eridicate SQLi and XSS defects in our lifetime  Let loose the Security Monkies and the Simian Army  Eliminate needless complexity  Become the standard bearer: 20% of Dev cycles spent on non-functional requirements  Take work out of the system  Keep decreasing cycle time: it increases work that the system can achieve
  • 87. The Third Way: Outcomes  15 minutes/daily spent on improving daily work  Continual reduction of unplanned work  More cycles for planned work  Projects completed to pay down technical debt and increase flow  Elimination of needless complexity  More resilient code and environments  Balancing nimbleness and practiced repetition  Enabling wider range of risk/reward balance
  • 89. What Does Rugged DevOps Feel Like? 90
  • 90.
  • 91. Case Studies And Early Indicators  Almost every major Internet online services company  VERACODE Rapid SaaS Fix Blog Post  http://www.veracode.com/blog/2012/01/vulnerability- response-done-right/  Pervasive Monitoring  Analytics at LinkedIn viewed by CEO daily: LinkedIn Engineering: “The Birth Of inGraphs: Eric The Intern”
  • 93. The Downward Spiral Operations Sees… Dev Sees…  Fragile applications are prone to  More urgent, date-driven projects failure put into the queue  Long time required to figure out “which  Even more fragile code (less bit got flipped” secure) put into production  Detective control is a salesperson  More releases have increasingly “turbulent installs”  Too much time required to restore service  Release cycles lengthen to amortize “cost of deployments”  Too much firefighting and unplanned work  Failing bigger deployments more difficult to diagnose  Urgent security rework and remediation  Most senior and constrained IT ops resources have less time to  Planned project work cannot complete fix underlying process problems  Frustrated customers leave  Ever increasing backlog of work  Market share goes down that cold help the business win  Business misses Wall Street  Ever increasing amount of commitments tension between IT Ops, Development, Design…  Business makes even larger promises to Wall Street These aren’t IT or Infosec problems… These are business problems!
  • 94. When IT Fails: The Novel and The DevOps Cookbook  Coming in July 2012  “In the tradition of the best MBA case studies, this book should be mandatory reading for business and IT graduates alike.” -Paul Muller, VP Software Marketing, Hewlett-Packard  “The greatest IT management book of our Gene Kim, Tripwire founder, generation.” –Branden Williams, CTO Visible Ops co-author Marketing, RSA
  • 95. When IT Fails: The Novel and The DevOps Cookbook  Coming in July 2012  If you would like the “Top 10 Things You Need To Know About DevOps,” sample chapters and updates on the book: Sign up at http://itrevolution.com Gene Kim, Tripwire founder, Email genek@realgenekim.me Visible Ops co-author Give me your business card
  • 96. To Join The Movement  Our goal is to affect the lives of one million IT workers by 2017  If you would like the “Top 10 Things You Need To Know About DevOps,” sample chapters and updates on the book: Sign up at http://itrevolution.com Email genek@realgenekim.me Give me your business card
  • 97. Thank You 98
  • 98. Appendix 99
  • 99. Resources  From the IT Process Institute www.itpi.org  Both Visible Ops Handbooks  ITPI IT Controls Performance Study  Rugged Software by Corman, et al: http://ruggedsoftware.org  “Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation” by Humble, Farley  Follow us…  @JoshCorman, @RealGeneKim  mailto:genek@realgenekim.me  http://realgenekim.me/blog
  • 100. Common Traits of High Performers Culture of… Change management  Integration of IT operations/security via problem/change management  Processes that serve both organizational needs and business objectives  Highest rate of effective change Causality  Highest service levels (MTTR, MTBF)  Highest first fix rate (unneeded rework) Compliance and continual reduction of operational variance  Production configurations  Highest level of pre-production staffing  Effective pre-production controls  Effective pairing of preventive and detective controls Source: IT Process Institute
  • 101. Visible Ops: Playbook of High Performers  The IT Process Institute has been studying high-performing organizations since 1999  What is common to all the high performers?  What is different between them and average and low performers?  How did they become great?  Answers have been codified in the Visible Ops Methodology  The “Visible Ops Handbook” is available from the ITPI www.ITPI.org
  • 102. IT Operations Increases Process Rigor  Standardize deployment  Standardize unplanned work: make it repeatable  Modify first response: ensure constrained resources have all data at hand to diagnose  Elevate preventive activities to reduce incidents
  • 103. Help Development…  Help them see downstream effects  Unplanned work comes at the expense of planned work  Technical debt retards feature throughput  Environment matters as much as the code  Allocate time for fault modeling, asking “what could go wrong?” and implementing countermeasures
  • 104. Help QA…  Ensure test plans cover not only code functionality, but also:  Suitability of the environment the code runs in  The end-to-end deployment process  Help find variance…  Functionality, performance, configuration  Duration, wait time and handoff errors, rework, …

Hinweis der Redaktion

  1. How each side Actively impedes the achievement of each other’s goals.
  2. Who are they auditing? IT operations.I love IT operatoins. Why? Because when the developers screw up, the only people who can save the day are the IT operations people. Memory leak? No problem, we’ll do hourly reboots until you figure that out.Who here is from IT operations?Bad day:Not as prepared for the audit as they thoughtSpending 30% of their time scrambling, generating presentation for auditorsOr an outage, and the developer is adamant that they didn’t make the change – they’re saying, “it must be the security guys – they’re always causing outages”Or, there’s 50 systems behind the load balancer, and six systems are acting funny – what different, and who made them differentOr every server is like a snowflake, each having their own personalityWe as Tripwire practitioners can help them make sure changes are made visible, authorized, deployed completely and accurately, find differencesCreate and enforce a culture of change management and causality
  3. Who’s introducing variance? Well, it’s often these guys. Show me a developer who isn’t causing an outage, I’ll show you one who is on vacation.Primary measurement is deploy features quickly – get to market.I’ve worked with two of the five largest Internet companies (Google, Microsoft, Yahoo, AOL, Amazon), and I now believe that the biggest differentiator to great time to market is great operations:Bad day: We do 6 weeks of testing, but deployment still fails. Why? QA environment doesn’t match productionOr there’s a failure in testing, and no one can agree whether it’s a code failure or an environment failureOr changes are made in QA, but no one wrote them down, so they didn’t get replicated downstream in productionBelieve it or not, we as Tripwire practitioners can even help them – make sure environments are available when we need them, that they’re properly configured correctly the first time, document all the changes, replicate them downstream
  4. So who are all these constituencies that we can help, and increase our relevance as Tripwire practitioners and champions?How many people here are in infosec?Goal: protect critical systems and dataSafeguard organizational commitmentsPrevent security breaches, help quickly detect and recover from themBad day: no security standardsNo one is complyingYes, we’re 3 years behind. “Whaddyagonna do about it?”Vs. we (Tripwire owner) can become more relevant and add value by help infosec by leveraging all the configuration guidance out thereMeasure variance between produciton and those known good statesTrust and verify that when management says, we’ve trued up the configurations, they’ve actually done itWhy? Now, more than ever, there are an ever increasing amount of regulatory and contractual requirements to protect systems and data
  5. Tell story of Amazon, Netflix: they care about, availability, securityIt’s not a push, it’s a pull – they’re looking for our help (#1 concern: fear of disintermediation and being marginalized)
  6. At RSA 2009, Josh Corman, Jeff Williams, and David Rice were chatting at the Greylock cocktail party.
  7. So software not only need
  8. …fast, and…
  9. …agile, but it also needs to be…
  10. …rugged. Capable of withstanding…
  11. …the harshest conditions…
  12. …and most unfriendly environments…
  13. [ text ] My personal goal is to prescriptively define 1) what does Dev need to do to become a reliable partner, 2) what does IT Operations need to do to become a realiable partner, and then 3) how do they work together to deliver unbelievable value to the business.Of course, the goal is more than happy coexistence. It’s to replicate the Etsy and LinkedIn stories:Increase the rate of features that we can put into production, while simultaneously maintaining the reliability, stability, security and survivability of the production environment.
  14. This story is about how Bill, the thoughtful and methodical VP IT Operations, who saves some of the largest problems of the company. It’s a story about a Visible Ops and DevOps style transformation. It’s how Bill saves the company, helping it achieves their project goals, operational goals, security and compliance goals.And Steve the CEO realizes that Bill, the lowly VP of IT Operations, is the person who saved the company.
  15. How each side Actively impedes the achievement of each other’s goals.