SlideShare a Scribd company logo
1 of 55
Download to read offline
Security and shizzle

Monday, 11 November 13
Whom be this?
• Ben Hughes, security monkey at Etsy.
• Bullet point fanatic.
• Terrible at slides.
• Shout out to the Etsy security team.

@benjammingh
Monday, 11 November 13
It’s a tale of two halves
• Security, where did it all go wrong?
• Don’t go alone, take this!
• Security-devops-maybe-DBAs-too-

oh and-QA-sure-who-else?
• I quite like Etsy, here’s why.
@benjammingh
Monday, 11 November 13
Security, where did
it all go wrong?

@benjammingh
Monday, 11 November 13
Wait, but we bought a firewall!

@benjammingh
Monday, 11 November 13
They’re coming out of the walls

@benjammingh
Monday, 11 November 13
teh cloudz
• AWS logo goes here.
• Maybe not in AWS... (other cloudiness

vendors may be available)

@benjammingh
Monday, 11 November 13
But we’re secure, right?

@benjammingh
Monday, 11 November 13
But we’re secure, right?

@benjammingh
Monday, 11 November 13
The Watering hole attacks of Feb

@benjammingh
Monday, 11 November 13
Other than the occasional RCE/
SQLi or 0-day, companies just
aren’t getting breached directly
through their servers like they
used to.

@benjammingh
Monday, 11 November 13
I’d buy that for a dollar
[laptop:~]% id
uid=501(ben) gid=20(staff) groups=20(staff)
[laptop:~]% ./magic
[*] running old exploit against unpatched OSX.
[*] firing off connect back shell to AWS.
[*] throwing mad persistence in to LaunchAgents.
[*] dropping to a shell.
[laptop:~]# id
uid=0(root) gid=0(root)

@benjammingh
Monday, 11 November 13
Zero [cool] day
• Zero day is bad!

@benjammingh
Monday, 11 November 13
Surprise!
• You can’t defend against unknown

attacks.
• Clue is in the name.

@benjammingh
Monday, 11 November 13
Rejoice. That mostly doesn’t matter!

@benjammingh
Monday, 11 November 13
Treat the symptoms
• Lateral movement can be more

important than how they got in.
• You don’t care that they broke a

window, you care that they got in your
living room and took your TV.
• (still fix your window)

@benjammingh
Monday, 11 November 13
Hudson hawk reference
• Why is /bin/sh running on your

webserver?
• Why is your webserver trying to SSH to

other hosts?
• Why is the Cold Fusion process reading

arbitrary files off of disk (SE/NSA Linux
time)
@benjammingh
Monday, 11 November 13
But still patch
• Please, still patch things.
• Know that it isn’t a panacea.
• Realise that is okay.

@benjammingh
Monday, 11 November 13
Please do patch!
• No really!

@benjammingh
Monday, 11 November 13
Logs are your eyes.
“If it’s not monitored...
...it’s not in production”
Well
“If it’s not logged, did it really happen?”

@benjammingh
Monday, 11 November 13
You have a limited number of eyes.

@benjammingh
Monday, 11 November 13
Alerts

@benjammingh
Monday, 11 November 13
Logstash
• http://logstash.net/
• http://www.elasticsearch.org/overview/

kibana/
• http://www.logstashbook.com/
• https://github.com/miah/chef_logstash
• https://forge.puppetlabs.com/tags/

logstash
@benjammingh
Monday, 11 November 13
Two factor all the things
•Duo - https://www.duosecurity.com/
•Authy - https://www.authy.com/
•Google - http://goo.gl/hvre2D
•YubiKey - https://www.yubico.com/
Hat tip to Jan Schaumann (@jschauma),
from whom I stole the title of this slide from.

@benjammingh
Monday, 11 November 13
Duo and Yubikeys
vvbrc

@benjammingh
Monday, 11 November 13
Pen Testing
• Don’t pay someone else to tell you to

patch things.
• Don’t pay someone to run Nessus.
• Hire more security people before paying

for pen-tests.
• Attack simulations are better. http://

bit.ly/attacksims
@benjammingh
Monday, 11 November 13
Attack simulations?
• Everything in scope.

@benjammingh
Monday, 11 November 13
Attack simulations?
• Everything in scope.
• Don’t have security run it.

@benjammingh
Monday, 11 November 13
Attack simulations?
• Everything in scope.
• Don’t have security run it.
• Don’t block on fragility.

@benjammingh
Monday, 11 November 13
Transparency!
• Invite people to the brief.
• Don’t just expect a PDF.
• Treat it as a postmortem.
• Come out of it with a set of actions.

@benjammingh
Monday, 11 November 13
Game days.
• Ops’ “game day” simulations, but for

security.

@benjammingh
Monday, 11 November 13
Phishing
• Who’s stopped phishing?

@benjammingh
Monday, 11 November 13
Phishing
• Who’s stopped phishing?
• You’re not going to stop phishing.

@benjammingh
Monday, 11 November 13
Phishing
• Who’s stopped phishing?
• You’re not going to stop phishing.
• That doesn’t matter.

@benjammingh
Monday, 11 November 13
Phishing
• Who’s stopped phishing?
• You’re not going to stop phishing.
• That doesn’t matter.
• Don’t think you can fully eliminate it, get

it reported instead.

@benjammingh
Monday, 11 November 13
Intermission.

@benjammingh
Monday, 11 November 13
New, Improved Devops

• Silo smashing in to one new larger silo!

@benjammingh
Monday, 11 November 13
DevSecOpsFarmerQueen
•
•
•

Many hats.

•

Security doesn’t just

Not just dev.
Not just ops.

magically happen.
@benjammingh
Monday, 11 November 13
Get security involved!
• This can be done is all sized

environments!
•

Small - having someone who has a security background or
interest.

•

Large - ”Chris Eng & Ryan O’Boyle – From the Trenches:
Real-World Agile SDLC” - http://nsc.is/presentation/chris-engryan-oboyle-from-the-trenches-real-world-agile-sdlc/

@benjammingh
Monday, 11 November 13
Security are people too!

@benjammingh
Monday, 11 November 13
Security are people too!
• they just might not always act like it...
• security is the only area of technology

with genuine adversaries.

@benjammingh
Monday, 11 November 13
Infosec, this one’s for you
• Dev and ops (and everyone else) are

people too.
• They made those decisions without

malice in mind.
• People don’t go out of their way to

make things insecure!

@benjammingh
Monday, 11 November 13
Primary action items
• Don’t just say “did you speak to security

about this?”
• Get people involved!
• Security has never [succesfully] been a

check box.

@benjammingh
Monday, 11 November 13
Reducing barriers.
Having an approachable security team is
the most important thing they can do.
The second you lose the ability to talk to
them about anything, you effectively lose
your security team.

@benjammingh
Monday, 11 November 13
So, that party you mentioned?
• Skill sharing.

@benjammingh
Monday, 11 November 13
So, that party you mentioned?
• Hack week.

@benjammingh
Monday, 11 November 13
So, that party you mentioned?
• Boot camping.

@benjammingh
Monday, 11 November 13
Borrowing from the devops.
• Tests!

@benjammingh
Monday, 11 November 13
Borrowing from the devops.
• Tests!
• Test your code and your infrastructure.

@benjammingh
Monday, 11 November 13
Borrowing from the devops.
• Tests!
• Test your code and your infrastructure.
• Wait, someone already gave this talk:
http://www.slideshare.net/nickgsuperstar/
devopssec-apply-devops-principles-to-security/32

@benjammingh
Monday, 11 November 13
Borrowing from the devops.
So did Gareth!
https://speakerdeck.com/garethr/securitymonitoring-penetration-testing-meetsmonitoring

@benjammingh
Monday, 11 November 13
Stop saying “No!”

@benjammingh
Monday, 11 November 13
So finally
• The most important thing that we do as

a security team is...
• Humility.

@benjammingh
Monday, 11 November 13
So finally
• The most important thing that we do as

a security team is...
• Humility.
• Security isn’t everything. People are rad.

@benjammingh
Monday, 11 November 13
Fin

<golden axe screen shot>

@benjammingh
Monday, 11 November 13

More Related Content

Recently uploaded

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Recently uploaded (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

DevOpsDay London Ben Hughes Security

  • 2. Whom be this? • Ben Hughes, security monkey at Etsy. • Bullet point fanatic. • Terrible at slides. • Shout out to the Etsy security team. @benjammingh Monday, 11 November 13
  • 3. It’s a tale of two halves • Security, where did it all go wrong? • Don’t go alone, take this! • Security-devops-maybe-DBAs-too- oh and-QA-sure-who-else? • I quite like Etsy, here’s why. @benjammingh Monday, 11 November 13
  • 4. Security, where did it all go wrong? @benjammingh Monday, 11 November 13
  • 5. Wait, but we bought a firewall! @benjammingh Monday, 11 November 13
  • 6. They’re coming out of the walls @benjammingh Monday, 11 November 13
  • 7. teh cloudz • AWS logo goes here. • Maybe not in AWS... (other cloudiness vendors may be available) @benjammingh Monday, 11 November 13
  • 8. But we’re secure, right? @benjammingh Monday, 11 November 13
  • 9. But we’re secure, right? @benjammingh Monday, 11 November 13
  • 10. The Watering hole attacks of Feb @benjammingh Monday, 11 November 13
  • 11. Other than the occasional RCE/ SQLi or 0-day, companies just aren’t getting breached directly through their servers like they used to. @benjammingh Monday, 11 November 13
  • 12. I’d buy that for a dollar [laptop:~]% id uid=501(ben) gid=20(staff) groups=20(staff) [laptop:~]% ./magic [*] running old exploit against unpatched OSX. [*] firing off connect back shell to AWS. [*] throwing mad persistence in to LaunchAgents. [*] dropping to a shell. [laptop:~]# id uid=0(root) gid=0(root) @benjammingh Monday, 11 November 13
  • 13. Zero [cool] day • Zero day is bad! @benjammingh Monday, 11 November 13
  • 14. Surprise! • You can’t defend against unknown attacks. • Clue is in the name. @benjammingh Monday, 11 November 13
  • 15. Rejoice. That mostly doesn’t matter! @benjammingh Monday, 11 November 13
  • 16. Treat the symptoms • Lateral movement can be more important than how they got in. • You don’t care that they broke a window, you care that they got in your living room and took your TV. • (still fix your window) @benjammingh Monday, 11 November 13
  • 17. Hudson hawk reference • Why is /bin/sh running on your webserver? • Why is your webserver trying to SSH to other hosts? • Why is the Cold Fusion process reading arbitrary files off of disk (SE/NSA Linux time) @benjammingh Monday, 11 November 13
  • 18. But still patch • Please, still patch things. • Know that it isn’t a panacea. • Realise that is okay. @benjammingh Monday, 11 November 13
  • 19. Please do patch! • No really! @benjammingh Monday, 11 November 13
  • 20. Logs are your eyes. “If it’s not monitored... ...it’s not in production” Well “If it’s not logged, did it really happen?” @benjammingh Monday, 11 November 13
  • 21. You have a limited number of eyes. @benjammingh Monday, 11 November 13
  • 23. Logstash • http://logstash.net/ • http://www.elasticsearch.org/overview/ kibana/ • http://www.logstashbook.com/ • https://github.com/miah/chef_logstash • https://forge.puppetlabs.com/tags/ logstash @benjammingh Monday, 11 November 13
  • 24. Two factor all the things •Duo - https://www.duosecurity.com/ •Authy - https://www.authy.com/ •Google - http://goo.gl/hvre2D •YubiKey - https://www.yubico.com/ Hat tip to Jan Schaumann (@jschauma), from whom I stole the title of this slide from. @benjammingh Monday, 11 November 13
  • 26. Pen Testing • Don’t pay someone else to tell you to patch things. • Don’t pay someone to run Nessus. • Hire more security people before paying for pen-tests. • Attack simulations are better. http:// bit.ly/attacksims @benjammingh Monday, 11 November 13
  • 27. Attack simulations? • Everything in scope. @benjammingh Monday, 11 November 13
  • 28. Attack simulations? • Everything in scope. • Don’t have security run it. @benjammingh Monday, 11 November 13
  • 29. Attack simulations? • Everything in scope. • Don’t have security run it. • Don’t block on fragility. @benjammingh Monday, 11 November 13
  • 30. Transparency! • Invite people to the brief. • Don’t just expect a PDF. • Treat it as a postmortem. • Come out of it with a set of actions. @benjammingh Monday, 11 November 13
  • 31. Game days. • Ops’ “game day” simulations, but for security. @benjammingh Monday, 11 November 13
  • 32. Phishing • Who’s stopped phishing? @benjammingh Monday, 11 November 13
  • 33. Phishing • Who’s stopped phishing? • You’re not going to stop phishing. @benjammingh Monday, 11 November 13
  • 34. Phishing • Who’s stopped phishing? • You’re not going to stop phishing. • That doesn’t matter. @benjammingh Monday, 11 November 13
  • 35. Phishing • Who’s stopped phishing? • You’re not going to stop phishing. • That doesn’t matter. • Don’t think you can fully eliminate it, get it reported instead. @benjammingh Monday, 11 November 13
  • 37. New, Improved Devops • Silo smashing in to one new larger silo! @benjammingh Monday, 11 November 13
  • 38. DevSecOpsFarmerQueen • • • Many hats. • Security doesn’t just Not just dev. Not just ops. magically happen. @benjammingh Monday, 11 November 13
  • 39. Get security involved! • This can be done is all sized environments! • Small - having someone who has a security background or interest. • Large - ”Chris Eng & Ryan O’Boyle – From the Trenches: Real-World Agile SDLC” - http://nsc.is/presentation/chris-engryan-oboyle-from-the-trenches-real-world-agile-sdlc/ @benjammingh Monday, 11 November 13
  • 40. Security are people too! @benjammingh Monday, 11 November 13
  • 41. Security are people too! • they just might not always act like it... • security is the only area of technology with genuine adversaries. @benjammingh Monday, 11 November 13
  • 42. Infosec, this one’s for you • Dev and ops (and everyone else) are people too. • They made those decisions without malice in mind. • People don’t go out of their way to make things insecure! @benjammingh Monday, 11 November 13
  • 43. Primary action items • Don’t just say “did you speak to security about this?” • Get people involved! • Security has never [succesfully] been a check box. @benjammingh Monday, 11 November 13
  • 44. Reducing barriers. Having an approachable security team is the most important thing they can do. The second you lose the ability to talk to them about anything, you effectively lose your security team. @benjammingh Monday, 11 November 13
  • 45. So, that party you mentioned? • Skill sharing. @benjammingh Monday, 11 November 13
  • 46. So, that party you mentioned? • Hack week. @benjammingh Monday, 11 November 13
  • 47. So, that party you mentioned? • Boot camping. @benjammingh Monday, 11 November 13
  • 48. Borrowing from the devops. • Tests! @benjammingh Monday, 11 November 13
  • 49. Borrowing from the devops. • Tests! • Test your code and your infrastructure. @benjammingh Monday, 11 November 13
  • 50. Borrowing from the devops. • Tests! • Test your code and your infrastructure. • Wait, someone already gave this talk: http://www.slideshare.net/nickgsuperstar/ devopssec-apply-devops-principles-to-security/32 @benjammingh Monday, 11 November 13
  • 51. Borrowing from the devops. So did Gareth! https://speakerdeck.com/garethr/securitymonitoring-penetration-testing-meetsmonitoring @benjammingh Monday, 11 November 13
  • 53. So finally • The most important thing that we do as a security team is... • Humility. @benjammingh Monday, 11 November 13
  • 54. So finally • The most important thing that we do as a security team is... • Humility. • Security isn’t everything. People are rad. @benjammingh Monday, 11 November 13
  • 55. Fin <golden axe screen shot> @benjammingh Monday, 11 November 13