SlideShare a Scribd company logo
1 of 35
Download to read offline
SEGREGATIONOFDUTIES
AND
CONTINUOUSDELIVERY
How to enable Continuous Delivery while continuing
to protect the business and customers.
Sriram “Ram” Narayanan
D e v S e c C o n S G 2 0 1 7
www.sriramnarayanan.com
@sriramNRN
@sriramNRNwww.sriramnarayanan.com
A friendly implementation of
Segregation of Duties
enables Continuous Delivery,
Security and Compliance to co-exist
2
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
What we’ll cover today
■ About Continuous Delivery
■ The need for Segregation of Duties
■ How typical enforcement of Segregation of Duties is a blocker to CD
■ How to improve SoD enforcement and accelerate CD
3
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Important Points
■ People behave as they are measured (e.g. KPIs)
■ Most issues are 10% technical and 90% cultural/behavioral
■ CD-Friendly SoD and true Continuous Delivery are more process and
people problems, and very less tool problems.
■ You should move toward automation-friendly tools, though.
4
@sriramNRNwww.sriramnarayanan.com
ABOUT
CONTINUOUS
DELIVERY
It’s beyond Continuous Integration, and beyond “CI/CD”
5
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
What Continuous Delivery is NOT:
6
Topic Clarification
“CI/CD” You need more than just a “daemonic CI” and a
“pipeline plugin”
Continuous
Deployment
Deployment using Tools
Blanket permission to Environment owners need to review, approve and
trigger deployments at their convenience.
Permission to push
“Containers” to Prod
What goes in those containers needs to be
validated!
@sriramNRNwww.sriramnarayanan.com
Continuous Delivery
Keep software in a reliable and
deployable state so that you can
deploy on demand.
7
@sriramNRNwww.sriramnarayanan.com
Continuous delivery is a software
engineering approach in which
teams produce software in short
cycles, ensuring that the software
can be reliably released at any
time. It aims at building, testing,
and releasing software faster and
more frequently.
- Wikipedia
8
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
With fast I.T. turn-around times, business can:
■ Stay competitive
■ Respond to change faster
■ Fix defects earlier
■ Try new ideas boldly and revert confidently.
9
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
What we’d love to have!
10
Commit
Code
Build and
Package
Test
Locally
Deploy to
Production!
Production Support
■ Deploy when ever we want
■ Debug processes on Production servers
■ Query Production Databases
■ Inspect traffic, review log files
■ Apply hot fixes within minutes
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
11
Production Support
■ Deploy when ever we want - “Raise a ticket to deploy”
■ Debug processes on Production servers - “No way !!”
■ Query Production Databases - A ticket for individual query results
■ Inspect traffic, review log files - A ticket for log extracts
■ Apply hot fixes within minutes - Ticket please!
Reality Check !
Commit
Code
Build and
Package
Test
Locally
Deploy to
Production!
Tickets per phase!
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
What puzzles (frustrates!) Dev Teams and Business
■ Why are Ops, Audit and Security Teams throwing roadblocks at us?
■ Are they raising roadblocks just to assert their importance?
■ Why are Ops given access that they cannot make use of to solve issues?
■ Why do we have such ridiculous policies!?
■ Why does everyone make us raise so many tickets?
■ Why are we trusted to write the software but not to troubleshoot it!!!??
■ Are Ops, Security and Compliance on our side, or our competitors side?
12
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
What Ops, Security, Compliance have to say:
13
“We are merely following industry
norms to protect business and
customers. We are not the enemy!
Please don’t blame us for doing
our job!!”
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
So, who is right?
14
Development teams – who develop
software that meets business goals?
Or
Ops and Security – who ensure
uptimes and protect customers?
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF
DUTIES
Why Ops, Security and Compliance do what they do
15
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Expectations from an organization
■ Make money (if a business)
■ Conform to the laws (e.g. those that protect the customers’ interests)
■ Run in a stable manner
16
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
How orgs are managed - GRC
Source: Wikipedia
17
Topic Explanation
Governance The executives are responsible for the org’s
operations
Risk Management Identify, analyze and respond to risks
Compliance Conform to stated requirements (Regulations, Org
policies, Business guarantees to
customers)
Applicable to IT, Finance, Legal
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Some examples of fraud and error
■ Untimely and/or non-uniform deployment
■ Deploying with the wrong permissions
■ Handling production environments with zero exposure and skills
■ Accessing confidential data in violation of privacy policies
■ Changing production configurations ad-hoc with poor review, and poor
documentation of changes
■ Bypassing domain logic and enforcement in the application, and changing
production data directly
■ Logging confidential data and accessing these via logs
18
@sriramNRNwww.sriramnarayanan.com
Separation of duties (SoD) (also
known as "Segregation of duties")
is the concept of having more than
one person required to complete a
task. … an internal control intended
to prevent fraud and error
- Wikipedia
19
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Segregation of Duties
■ A well-understood concept in Finance, Law, Governance, Military, etc.
■ No single person should have end to end access to complete an entire
workflow
■ At least one other person should be able to
● Regulate the activity, if need be.
● Review the activity
20
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Segregation of Duties in IT
21
No single person or team should
have end to end access from code
to production
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Typical SoD procedures for Deployments
22
Intent Action Typical
Implementation
Impact
Devs should not
author and
deploy code
Deployment by
Ops
Dependent upon
Ops availability
Business cannot
deploy on-
demand
Demonstrate
deployment in an
auditable manner
Deployment
using Tools
Special tools,
typically not
available in Dev
Dev and Prod
deployments are
different
Control over
when prod is
changed
Deployment at
specific times
Strict calendar
schedules
Cannot deploy
frequently.
Exceptions can
be expensive.
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Typical SoD procedures for Troubleshooting
23
Intent Action Typical
Implementation
Impact
Devs should not
access
confidential data
in logs
Regulate access
to log systems
Access to prod
logs governed by
SLAs. Extracts
only.
Lack of direct
access to logs
prevents fast
troubleshooting
Prevent
adhoc/harmful
changes, and
data sniffing
Regulate access
to prod servers
Special tools,
typically not
available in Dev
Dev and Prod
deployments are
different
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Typical SoD procedures for Databases
24
Intent Action Typical
Implementation
Impact
Ensure database
schema and data
integrity by
skilled DBAs
Regulate changes
to databases
Changes
reviewed and
denied before
prod deployment.
Documentation.
Waste of
precious time.
Wasteful
documentation.
Prevent
adhoc/harmful
changes, and
data sniffing
Regulate access
to prod data
A query per
ticket, reviewed,
approved,
applied
Waste of
precious time.
Penalties for
delays
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
Typical SoD procedures for Configuration
25
Intent Action Typical
Implementation
Impact
Ensure that all
(app,OS)
changes to prod
are valid and
documented
Regulate changes
to production
Changes
reviewed and
denied before
prod deployment.
Documentation
Waste of
precious time.
Wasteful
documentation.
Prevent attacks
based on known
weaknesses
Apply patches
regularly at
scheduled
intervals
Configuration
(settings,
patches) not
shared with devs
Software not
tested with Prod
configuration
@sriramNRNwww.sriramnarayanan.com
Defensive SoD and insecurely
architected software can prevent
Continuous Delivery
26
@sriramNRNwww.sriramnarayanan.com
CD-FRIENDLY SOD
Ensure Segregation of Duties while also enabling fast response times
27
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-friendly SoD – General principles
■ Involve Ops and Security right from Design phase
■ Policies in executable form via CD-Friendly config mgmt tools.
■ Separate confidential data and logs from regular data and logs
■ Single Deployment bundle – app, config, policy, DB schema.
■ Bundle Once, Deploy anywhere
■ Restrict access to confidential data/logs, permit easy access to regular
data/logs.
■ Enforce via config than via tickets (e.g. resource throttling vs tickets).
■ Use multi-factor (vs tickets) where possible to regulate actions.
28
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly deployment and configuration
29
Commit
Code
Build and
Package
Test
Locally
Deploy to
Production!
Dev, DBA, Ops,
Security
Tested
Deployment
Bundle with
approved
prod-ready
configs
2FA Deployment
enables any-time
deployment by Env owner
Policies, Code,
Approved
changes
App, OS patches,
configs, DB
changes
Deployment
Bundle
When gatekeeping checks are codified
and tested
Automated, Exploratory
and Pen Tests
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly SoD!
30
Commit
Code
Build and
Package
Test
Locally
Deploy to
Production!
Production Support
■ Deploy when ever we want – Environment owners decide, use 2FA
■ Debug processes on Production servers – Yes, configs elsewhere.
■ Query Production Databases – Easier access to regular data.
■ Inspect traffic, review log files – Easier access to regular data.
■ Apply hot fixes within minutes – Test in 1-click dev envs first
Dev, DBA, Ops,
Security
App, OS patches,
configs, DB changes
Pre-Approved
Deployment
Bundle
Pre-Approved
Deployment
Bundle
2FA Deployment
by Env Owner
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly SoD procedures for Deployments
31
Intent Action Recommended
Implementation
Impact
Devs should not
author and
deploy code
Deployment by
Environment
Owners
Review and
deploy changes
in small batches
Small batches
makes changes
easier to review.
Demonstrate
deployment in an
auditable manner
Configuration
management
tools
Build once,
deploy anywhere
Dev-Prod are the
auditably the
same
Control over
when prod is
changed
Deployment by
Environment
Owners
Frequent
Deploys in small
batches. Multi-
factor controls
Deploy only
when the Env
owner wants to.
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly SoD procedures for Troubleshooting
32
Intent Action Recommended
Implementation
Impact
Devs should not
access
confidential data
in logs and
config files
Separate
confidential and
regular logs.
Externalised
configuration
Log UUIDs.
Prod Support
teams access
regular logs, and
can SSH to prod.
Confidential data
remains
restricted. Prod
support is fast.
Prevent
adhoc/harmful
changes, and
data sniffing
Standard
environments.
1-click
environment
creation and 1-
click deployment
Prod errors can
be caught earlier
in Dev. Reduces
prod errors.
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly SoD procedures for Databases
33
Intent Action Recommended
Implementation
Impact
Ensure database
schema and data
integrity by
skilled DBAs
Regulate changes
to databases
using CD-
friendly DB
config tools
DBAs review
and recommend
changes at Dev
using CD-
friendly tools.
Identical schema
from Dev
through prod as
approved by the
DBA.
Prevent
adhoc/harmful
changes, and
data sniffing
Delink
confidential and
regular data.
Restrict access to
confidential data.
Provide access to
regular data.
Most
troubleshooting
needs just regular
data, and is fast.
@sriramNRNwww.sriramnarayanan.com
SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY
CD-Friendly SoD procedures for Configuration
34
Intent Action Recommended
Implementation
Impact
Ensure that all
(app,OS)
changes to prod
are valid and
documented
Ops and Security
config settings in
CD-Friendly
config
management tool
Test pre-
approved configs
from dev through
prod.
Pre-approved
and tested
configs enable
frequent deploys.
Prevent attacks
based on known
weaknesses
Test OS patches
in Dev
Apply and test
OS patches via
automation in 1-
click dev env.
Rapidly test OS
patches and
Software in non-
Prod first.
THANKYOU
Sriram “Ram” Narayanan
@sriramNRN
ram@thoughtworks.com
www.sriramnarayanan.com

More Related Content

What's hot

ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...BigID Inc
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesDATAVERSITY
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
Data Governance Powerpoint Presentation Slides
Data Governance Powerpoint Presentation SlidesData Governance Powerpoint Presentation Slides
Data Governance Powerpoint Presentation SlidesSlideTeam
 
data-analytics-strategy-ebook.pptx
data-analytics-strategy-ebook.pptxdata-analytics-strategy-ebook.pptx
data-analytics-strategy-ebook.pptxMohamedHendawy17
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Data quality architecture
Data quality architectureData quality architecture
Data quality architectureanicewick
 
Qap cobit2019-20181111
Qap cobit2019-20181111Qap cobit2019-20181111
Qap cobit2019-20181111Patrick Soenen
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Business Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data StrategiesBusiness Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data StrategiesDATAVERSITY
 
DAS Slides: Data Quality Best Practices
DAS Slides: Data Quality Best PracticesDAS Slides: Data Quality Best Practices
DAS Slides: Data Quality Best PracticesDATAVERSITY
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best PracticesDATAVERSITY
 

What's hot (20)

IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
DMBOK and Data Governance
DMBOK and Data GovernanceDMBOK and Data Governance
DMBOK and Data Governance
 
Data Governance Powerpoint Presentation Slides
Data Governance Powerpoint Presentation SlidesData Governance Powerpoint Presentation Slides
Data Governance Powerpoint Presentation Slides
 
data-analytics-strategy-ebook.pptx
data-analytics-strategy-ebook.pptxdata-analytics-strategy-ebook.pptx
data-analytics-strategy-ebook.pptx
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Data quality architecture
Data quality architectureData quality architecture
Data quality architecture
 
Qap cobit2019-20181111
Qap cobit2019-20181111Qap cobit2019-20181111
Qap cobit2019-20181111
 
SOX- IT Perspective
SOX- IT PerspectiveSOX- IT Perspective
SOX- IT Perspective
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Business Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data StrategiesBusiness Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data Strategies
 
DAS Slides: Data Quality Best Practices
DAS Slides: Data Quality Best PracticesDAS Slides: Data Quality Best Practices
DAS Slides: Data Quality Best Practices
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best Practices
 

Viewers also liked

Automating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsAutomating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsSmart ERP Solutions, Inc.
 
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon
 
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragile
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragileDevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragile
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragileDevSecCon
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...TransWare AG
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Smart ERP Solutions, Inc.
 
Securing the container DevOps pipeline by William Henry
Securing the container DevOps pipeline by William HenrySecuring the container DevOps pipeline by William Henry
Securing the container DevOps pipeline by William HenryDevSecCon
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0Sriram Narayanan
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSmart ERP Solutions, Inc.
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 CA CISA Jayjit Biswas
 
Renato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildRenato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildDevSecCon
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsSmart ERP Solutions, Inc.
 

Viewers also liked (20)

Automating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsAutomating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and Financials
 
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatops
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
 
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragile
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragileDevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragile
DevSecCon Asia 2017 Sergiu Bodiu: From resilient to antifragile
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
 
Securing the container DevOps pipeline by William Henry
Securing the container DevOps pipeline by William HenrySecuring the container DevOps pipeline by William Henry
Securing the container DevOps pipeline by William Henry
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
Renato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildRenato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wild
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
 

Similar to Segregation of Duties and Continuous Delivery

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORS
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORSBig Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORS
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORSMatt Stubbs
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsSolarWinds
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017Andrew Miller
 
Foundations for Successful Data Projects – Strata London 2019
Foundations for Successful Data Projects – Strata London 2019Foundations for Successful Data Projects – Strata London 2019
Foundations for Successful Data Projects – Strata London 2019Jonathan Seidman
 
Who Owns the “S” in S&OP?
Who Owns the “S” in S&OP?Who Owns the “S” in S&OP?
Who Owns the “S” in S&OP?Steelwedge
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsSolarWinds
 
How to Better Manage Technical Debt While Innovating on DevOps
How to Better Manage Technical Debt While Innovating on DevOpsHow to Better Manage Technical Debt While Innovating on DevOps
How to Better Manage Technical Debt While Innovating on DevOpsDynatrace
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining SlidesLaney Dale
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...Ignyte Assurance Platform
 
Customer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodeCustomer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodePanther Labs
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Software
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality RightDATAVERSITY
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to KnowEric Kavanagh
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5Jerry Tan
 
The lean principles of data ops
The lean principles of data opsThe lean principles of data ops
The lean principles of data opsLars Albertsson
 

Similar to Segregation of Duties and Continuous Delivery (20)

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORS
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORSBig Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORS
Big Data LDN 2018: USING FAST-DATA TO MAKE SEMICONDUCTORS
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
Foundations for Successful Data Projects – Strata London 2019
Foundations for Successful Data Projects – Strata London 2019Foundations for Successful Data Projects – Strata London 2019
Foundations for Successful Data Projects – Strata London 2019
 
Who Owns the “S” in S&OP?
Who Owns the “S” in S&OP?Who Owns the “S” in S&OP?
Who Owns the “S” in S&OP?
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
How to Better Manage Technical Debt While Innovating on DevOps
How to Better Manage Technical Debt While Innovating on DevOpsHow to Better Manage Technical Debt While Innovating on DevOps
How to Better Manage Technical Debt While Innovating on DevOps
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
 
Customer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodeCustomer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-Code
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Datacenter 2014: Raritan - Richard May
Datacenter 2014: Raritan -  Richard MayDatacenter 2014: Raritan -  Richard May
Datacenter 2014: Raritan - Richard May
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality Right
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to Know
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5
 
The lean principles of data ops
The lean principles of data opsThe lean principles of data ops
The lean principles of data ops
 

Recently uploaded

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Segregation of Duties and Continuous Delivery

  • 1. SEGREGATIONOFDUTIES AND CONTINUOUSDELIVERY How to enable Continuous Delivery while continuing to protect the business and customers. Sriram “Ram” Narayanan D e v S e c C o n S G 2 0 1 7 www.sriramnarayanan.com @sriramNRN
  • 2. @sriramNRNwww.sriramnarayanan.com A friendly implementation of Segregation of Duties enables Continuous Delivery, Security and Compliance to co-exist 2
  • 3. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY What we’ll cover today ■ About Continuous Delivery ■ The need for Segregation of Duties ■ How typical enforcement of Segregation of Duties is a blocker to CD ■ How to improve SoD enforcement and accelerate CD 3
  • 4. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Important Points ■ People behave as they are measured (e.g. KPIs) ■ Most issues are 10% technical and 90% cultural/behavioral ■ CD-Friendly SoD and true Continuous Delivery are more process and people problems, and very less tool problems. ■ You should move toward automation-friendly tools, though. 4
  • 6. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY What Continuous Delivery is NOT: 6 Topic Clarification “CI/CD” You need more than just a “daemonic CI” and a “pipeline plugin” Continuous Deployment Deployment using Tools Blanket permission to Environment owners need to review, approve and trigger deployments at their convenience. Permission to push “Containers” to Prod What goes in those containers needs to be validated!
  • 7. @sriramNRNwww.sriramnarayanan.com Continuous Delivery Keep software in a reliable and deployable state so that you can deploy on demand. 7
  • 8. @sriramNRNwww.sriramnarayanan.com Continuous delivery is a software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software faster and more frequently. - Wikipedia 8
  • 9. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY With fast I.T. turn-around times, business can: ■ Stay competitive ■ Respond to change faster ■ Fix defects earlier ■ Try new ideas boldly and revert confidently. 9
  • 10. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY What we’d love to have! 10 Commit Code Build and Package Test Locally Deploy to Production! Production Support ■ Deploy when ever we want ■ Debug processes on Production servers ■ Query Production Databases ■ Inspect traffic, review log files ■ Apply hot fixes within minutes
  • 11. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY 11 Production Support ■ Deploy when ever we want - “Raise a ticket to deploy” ■ Debug processes on Production servers - “No way !!” ■ Query Production Databases - A ticket for individual query results ■ Inspect traffic, review log files - A ticket for log extracts ■ Apply hot fixes within minutes - Ticket please! Reality Check ! Commit Code Build and Package Test Locally Deploy to Production! Tickets per phase!
  • 12. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY What puzzles (frustrates!) Dev Teams and Business ■ Why are Ops, Audit and Security Teams throwing roadblocks at us? ■ Are they raising roadblocks just to assert their importance? ■ Why are Ops given access that they cannot make use of to solve issues? ■ Why do we have such ridiculous policies!? ■ Why does everyone make us raise so many tickets? ■ Why are we trusted to write the software but not to troubleshoot it!!!?? ■ Are Ops, Security and Compliance on our side, or our competitors side? 12
  • 13. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY What Ops, Security, Compliance have to say: 13 “We are merely following industry norms to protect business and customers. We are not the enemy! Please don’t blame us for doing our job!!”
  • 14. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY So, who is right? 14 Development teams – who develop software that meets business goals? Or Ops and Security – who ensure uptimes and protect customers?
  • 15. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES Why Ops, Security and Compliance do what they do 15
  • 16. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Expectations from an organization ■ Make money (if a business) ■ Conform to the laws (e.g. those that protect the customers’ interests) ■ Run in a stable manner 16
  • 17. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY How orgs are managed - GRC Source: Wikipedia 17 Topic Explanation Governance The executives are responsible for the org’s operations Risk Management Identify, analyze and respond to risks Compliance Conform to stated requirements (Regulations, Org policies, Business guarantees to customers) Applicable to IT, Finance, Legal
  • 18. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Some examples of fraud and error ■ Untimely and/or non-uniform deployment ■ Deploying with the wrong permissions ■ Handling production environments with zero exposure and skills ■ Accessing confidential data in violation of privacy policies ■ Changing production configurations ad-hoc with poor review, and poor documentation of changes ■ Bypassing domain logic and enforcement in the application, and changing production data directly ■ Logging confidential data and accessing these via logs 18
  • 19. @sriramNRNwww.sriramnarayanan.com Separation of duties (SoD) (also known as "Segregation of duties") is the concept of having more than one person required to complete a task. … an internal control intended to prevent fraud and error - Wikipedia 19
  • 20. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Segregation of Duties ■ A well-understood concept in Finance, Law, Governance, Military, etc. ■ No single person should have end to end access to complete an entire workflow ■ At least one other person should be able to ● Regulate the activity, if need be. ● Review the activity 20
  • 21. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Segregation of Duties in IT 21 No single person or team should have end to end access from code to production
  • 22. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Typical SoD procedures for Deployments 22 Intent Action Typical Implementation Impact Devs should not author and deploy code Deployment by Ops Dependent upon Ops availability Business cannot deploy on- demand Demonstrate deployment in an auditable manner Deployment using Tools Special tools, typically not available in Dev Dev and Prod deployments are different Control over when prod is changed Deployment at specific times Strict calendar schedules Cannot deploy frequently. Exceptions can be expensive.
  • 23. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Typical SoD procedures for Troubleshooting 23 Intent Action Typical Implementation Impact Devs should not access confidential data in logs Regulate access to log systems Access to prod logs governed by SLAs. Extracts only. Lack of direct access to logs prevents fast troubleshooting Prevent adhoc/harmful changes, and data sniffing Regulate access to prod servers Special tools, typically not available in Dev Dev and Prod deployments are different
  • 24. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Typical SoD procedures for Databases 24 Intent Action Typical Implementation Impact Ensure database schema and data integrity by skilled DBAs Regulate changes to databases Changes reviewed and denied before prod deployment. Documentation. Waste of precious time. Wasteful documentation. Prevent adhoc/harmful changes, and data sniffing Regulate access to prod data A query per ticket, reviewed, approved, applied Waste of precious time. Penalties for delays
  • 25. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY Typical SoD procedures for Configuration 25 Intent Action Typical Implementation Impact Ensure that all (app,OS) changes to prod are valid and documented Regulate changes to production Changes reviewed and denied before prod deployment. Documentation Waste of precious time. Wasteful documentation. Prevent attacks based on known weaknesses Apply patches regularly at scheduled intervals Configuration (settings, patches) not shared with devs Software not tested with Prod configuration
  • 26. @sriramNRNwww.sriramnarayanan.com Defensive SoD and insecurely architected software can prevent Continuous Delivery 26
  • 27. @sriramNRNwww.sriramnarayanan.com CD-FRIENDLY SOD Ensure Segregation of Duties while also enabling fast response times 27
  • 28. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-friendly SoD – General principles ■ Involve Ops and Security right from Design phase ■ Policies in executable form via CD-Friendly config mgmt tools. ■ Separate confidential data and logs from regular data and logs ■ Single Deployment bundle – app, config, policy, DB schema. ■ Bundle Once, Deploy anywhere ■ Restrict access to confidential data/logs, permit easy access to regular data/logs. ■ Enforce via config than via tickets (e.g. resource throttling vs tickets). ■ Use multi-factor (vs tickets) where possible to regulate actions. 28
  • 29. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly deployment and configuration 29 Commit Code Build and Package Test Locally Deploy to Production! Dev, DBA, Ops, Security Tested Deployment Bundle with approved prod-ready configs 2FA Deployment enables any-time deployment by Env owner Policies, Code, Approved changes App, OS patches, configs, DB changes Deployment Bundle When gatekeeping checks are codified and tested Automated, Exploratory and Pen Tests
  • 30. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly SoD! 30 Commit Code Build and Package Test Locally Deploy to Production! Production Support ■ Deploy when ever we want – Environment owners decide, use 2FA ■ Debug processes on Production servers – Yes, configs elsewhere. ■ Query Production Databases – Easier access to regular data. ■ Inspect traffic, review log files – Easier access to regular data. ■ Apply hot fixes within minutes – Test in 1-click dev envs first Dev, DBA, Ops, Security App, OS patches, configs, DB changes Pre-Approved Deployment Bundle Pre-Approved Deployment Bundle 2FA Deployment by Env Owner
  • 31. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly SoD procedures for Deployments 31 Intent Action Recommended Implementation Impact Devs should not author and deploy code Deployment by Environment Owners Review and deploy changes in small batches Small batches makes changes easier to review. Demonstrate deployment in an auditable manner Configuration management tools Build once, deploy anywhere Dev-Prod are the auditably the same Control over when prod is changed Deployment by Environment Owners Frequent Deploys in small batches. Multi- factor controls Deploy only when the Env owner wants to.
  • 32. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly SoD procedures for Troubleshooting 32 Intent Action Recommended Implementation Impact Devs should not access confidential data in logs and config files Separate confidential and regular logs. Externalised configuration Log UUIDs. Prod Support teams access regular logs, and can SSH to prod. Confidential data remains restricted. Prod support is fast. Prevent adhoc/harmful changes, and data sniffing Standard environments. 1-click environment creation and 1- click deployment Prod errors can be caught earlier in Dev. Reduces prod errors.
  • 33. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly SoD procedures for Databases 33 Intent Action Recommended Implementation Impact Ensure database schema and data integrity by skilled DBAs Regulate changes to databases using CD- friendly DB config tools DBAs review and recommend changes at Dev using CD- friendly tools. Identical schema from Dev through prod as approved by the DBA. Prevent adhoc/harmful changes, and data sniffing Delink confidential and regular data. Restrict access to confidential data. Provide access to regular data. Most troubleshooting needs just regular data, and is fast.
  • 34. @sriramNRNwww.sriramnarayanan.com SEGREGATION OF DUTIES AND CONTINUOUS DELIVERY CD-Friendly SoD procedures for Configuration 34 Intent Action Recommended Implementation Impact Ensure that all (app,OS) changes to prod are valid and documented Ops and Security config settings in CD-Friendly config management tool Test pre- approved configs from dev through prod. Pre-approved and tested configs enable frequent deploys. Prevent attacks based on known weaknesses Test OS patches in Dev Apply and test OS patches via automation in 1- click dev env. Rapidly test OS patches and Software in non- Prod first.