Welcome!

@DevOpsSummit Authors: Jason Bloomberg, Pat Romanski, Yeshim Deniz, Elizabeth White, Liz McMillan

Related Topics: @DevOpsSummit, @CloudExpo, Cloud Security

@DevOpsSummit: Blog Feed Post

Why Security Needs DevOps: OpenSSL and Beyond | @DevOpsSummit #DevOps

New methods of infrastructure management are the only way to keep pace with current security threats

Why Security Needs DevOps: OpenSSL and Beyond
By Greg Pollock

On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, development, and security teams braced for impact and then– it wasn't really that bad.

One issue was about the downgrade to export RSA vulnerability and the other was about susceptibility to DoS attacks. The RSA export was a serious problem, but it had been known for months and was just being officially reclassified as high severity. DoS attacks were bad but wouldn't result in data compromise. The "next Heartbleed" turned out to be more like the boy who cried wolf.

Since Heartbleed, vulnerability disclosures have gotten more attention. Sometimes it is well deserved; other times it feels more like media hype. For a larger perspective on the post-Heartbleed security landscape, ScriptRock talked to Jonathan Cran and Scott Petry. Jonathan Cran is the VP of Operations at Bugcrowd, a platform for crowd-sourced security. Scott Petry is the founder of Postini and Authentic8, which makes a disposable browser to insulate businesses from their employees' surfing.

Jonathan Cran pointed to some relatively good news: greater investments in the Linux Core Infrastructure Initiative will start paying down some of the operating system's technical debt. Additionally, the Linux Foundation is paying for a professional audit for the first time and has hired more full time developers to work solely on the kernel.

At the same time, the overall volume of vulnerabilities is only increasing, as Bugcrowd's success suggests. Given the decline of signature based defenses and the unpredictability of new vulnerabilities, Cran's recommendations require infrastructure teams to be flexible. "You need to be able to know what you have, know what vulnerabilities are out there, and quickly make changes," he said. "You need to have systems in place so that once you know what a vulnerability is, you can fix it as soon as possible. That's more about your processes and how you build your infrastructure than about this vulnerability or that one in particular."

Scott Petry painted a less rosy picture of the security landscape. "Will there be more? Oh yeah. Is it going to be OpenSSL? I don't know. Just think about other core utilities- image processing, for example- and you have a list of potential vulnerabilities with the same reach as Heartbleed." (N.B.: this interview was conducted before VENOM, a core vulnerability in many VMs, was disclosed.) Open source software's pace of development and the natural supply/demand have contributed immensely valuable libraries but have also made security testing optional. Like Cran, Petry recommends that infrastructure owners prepare for the unknown unknowns by building flexible, transparent, high quality systems. "Give me visibility, the ability to quickly make changes, and the ability to check that those changes worked."

Black hats and infrastructure owners remain locked in a red queen's race. Hackers continue to find novel ways to exploit the weak spots in complex systems; Operations teams get better at monitoring and automating their infrastructure. Sadly, the bad guys are currently winning: the Verizon Data Breach Investigation Report finds that the difference between time to infection and time to discovery has increased every year from 2004 to 2014. But perhaps an approach to security that takes into account the complete development and deployment cycle- a DevOps, approach- can turn the tide.

The lesson to be learned from Heartbleed and its offspring is not that OpenSSL or open source software is too dangerous to use. Rather, the conclusion is that new methods of infrastructure management - better visibility into system state, more efficient meands of detecting and eliminating vulnerabiltiies, faster ways to apply uniform changes - are the only way to keep pace with current security threats.

Read the original blog entry...

More Stories By ScriptRock Blog

ScriptRock makes GuardRail, a DevOps-ready platform for configuration monitoring.

Realizing we were spending way too much time digging up, cataloguing, and tracking machine configurations, we began writing our own scripts and tools to handle what is normally an enormous chore. Then we took the concept a step further, giving it a beautiful interface and making it simple enough for our bosses to understand. We named it GuardRail after its function — to allow businesses to move fast and stay safe.

GuardRail scans and tracks much more than just servers in a datacenter. It works with network hardware, Cloud service providers, CloudFlare, Android devices, infrastructure, and more.

@DevOpsSummit Stories
"Our strategy is to focus on the hyperscale providers - AWS, Azure, and Google. Over the last year we saw that a lot of developers need to learn how to do their job in the cloud and we see this DevOps movement that we are catering to with our content," stated Alessandro Fasan, Head of Global Sales at Cloud Academy, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to the new world.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.