Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract:...

8
SHIFT LEFT SPEED DELIVERY, IMPROVE SECURITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS OF MAGNITUDE? Optum Technology—the technical arm of UnitedHealth Group, one of the largest companies in the United States— did just that. Disruptive technical innovation can be driven in a company of any industry, size and complexity; it is no longer limited to startups and technical companies. This is a story of a sea change taking place within a gargantuan company—a grass roots effort to leverage a series of open source tools and a question- everything attitude to create massive efficiency gains, leveraging the DevOps philosophy, replacing traditional delivery pipelines with new methods that are already saving millions. One example that will be discussed is a new server delivery pipeline. This approach: Delivers servers in less than 6 minutes, Servers are complaint with applicable Regulatory requirements and have the documentation to prove it Solution automatically monitors & maintains compliance moving into the future Security and compliance are built directly into the delivery pipeline and, best of all… There are no Information Security personnel involved in the delivery process In a complex regulatory environment such as the U.S. healthcare industry, this is no mean feat. Come learn of our journey and how you can take the next step in yours. #ShiftLeft #DevOps #Chef #Jenkins #InSpec #GauntLt #Optum #UHG #QuinnShamblin #AaronRinehart Key Takeaways: Actions steps you can take to begin a DevOps Security movement within your organization. How to make developers excited to be part of the solution, delivering security on behalf of the organization. How to get out of the way of your developers and IT operational delivery people The names of a few important tools that can leveraged to improve your delivery and security by orders of magnitude.

Transcript of Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract:...

Page 1: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

S HI F T L E F T

S P E E D D E L IVE R Y, I M P R O V E S E C U R IT Y

Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS OF MAGNITUDE? Optum Technology—the technical arm of UnitedHealth Group, one of the largest companies in the United States—did just that. Disruptive technical innovation can be driven in a company of any industry, size and complexity; it is no longer limited to startups and technical companies. This is a story of a sea change taking place within a gargantuan company—a grass roots effort to leverage a series of open source tools and a question-everything attitude to create massive efficiency gains, leveraging the DevOps philosophy, replacing traditional delivery pipelines with new methods that are already saving millions. One example that will be discussed is a new server delivery pipeline. This approach:

• Delivers servers in less than 6 minutes,

• Servers are complaint with applicable Regulatory requirements and have the documentation to prove it

• Solution automatically monitors & maintains compliance moving into the future

• Security and compliance are built directly into the delivery pipeline and, best of all…

• There are no Information Security personnel involved in the delivery process

In a complex regulatory environment such as the U.S. healthcare industry, this is no mean feat. Come learn of our journey and how you can take the next step in yours. #ShiftLeft #DevOps #Chef #Jenkins #InSpec #GauntLt #Optum #UHG #QuinnShamblin #AaronRinehart Key Takeaways:

• Actions steps you can take to begin a DevOps Security movement within your organization.

• How to make developers excited to be part of the solution, delivering security on behalf of the organization.

• How to get out of the way of your developers and IT operational delivery people

• The names of a few important tools that can leveraged to improve your delivery and security by orders of magnitude.

Page 2: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

W H A T D O E S I T T A K E

How long does takes for your team to deliver a new virtual server?

A day? A week? Longer?

How long would it take to deliver 100? 1000?

What if they all have to be compliant with HIPAA, PCI, NIST, etc.?

• How would you like to deliver one in 6 minutes?

• AND improve security at the same time

• AND be able to prove your compliance

• AND cost less

4

S P E A K E R

Quinn R Shamblin CISM, CISSP, ITIL, PMP, GCFA

Director of Enterprise Security Architecture

[email protected]

www.linkedin.com/in/quinnshamblin/

• My name is Quinn Shamblin

• My background includes 5 years as the CISO of Boston University, CISO of University of Cincinnati, time with HP, P&G and as an Officer in the U.S. Navy.

• You can find me pretty easily on LinkedIn if you search for “Quinn Shamblin”. I usually come up on the first page.

W H A T W I L L W E C O V E R ?

• DevOps …

• How can Security be part of something like THAT?

• The grassroots beginnings of DevOps Security at UHG

• Not everything will be a success…

…but some things will

…spectacularly

• Lessons Learned and reasons for success

• We are just at the beginning…

• So why are we here?

• (Slide Read)

W HAT I S DE V O P S ?

“DevOps, a movement of people who care about developing &

operating reliable, secure, high performance systems at scale,

has always — intentionally — lacked a definition or manifesto.”

– Jez Humble, author “The DevOps Handbook”

• …So we aren’t going to tell you what it is.

• It isn’t a specific series of steps you take

• It is a cultural shift to focus human resources on things that humans can bring value too and leverage technology to bring the value it can bring

• It does however have a few core ideas and techniques

• These can be found in two important works, which, if you have not encountered them yet, you should carve out time to absorb

Page 3: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

8

T H O U G H T L E A D E R S H I P

The Phoenix Project A Novel about IT, DevOps, and

Helping Your Business Win

• by Gene Kim, Kevin Bahr and George Spafford

• For those of you that read “The Goal” by Eli Goldrat, which revolutionized manufacturing in the 80s,

• Like “The Goal”, this book is also a novelization, and applies the lessons of “The Goal”, making them accessible to those of us in IT

• To those of us that have been in IT for awhile, the first 6 chapters are a painful reminder of just how bad things can be

• But fight your way through them; there are some really important lessons after the authors set the stage

• I highly recommend the audio book version vs the traditional book. Will help you fight through the painful parts

9

T H O U G H T L E A D E R S H I P

The Phoenix Project A Novel about IT, DevOps, and

Helping Your Business Win

• by Gene Kim, Kevin Bahr and George Spafford

The DevOps Handbook

How to create world-class agility, reliability,

and security in technology organizations

• by Gene Kim, Patrick Debois, John Willis, Jez Humble and John Allspaw

• The Phoenix Project is a novelization, this is the actual handbook to talk you through how to lead this revolution

10

K E Y T A K E A W A Y S

TPP provides 12 key takeaways. Here are a few highlights’

• Pillars – Development and operations work better when they are considered two halves of the same team, not competitors

• Bottleneck – WIP is the enemy of efficient progress.

• Controlling WIP means making work visible so you find the most limiting resource, the constraint

• The more utilized a particular resource is, the longer tasks will wait in a queue before receiving hands-on attention. These wait times multiply when the test is handed off between workstations multiple times.

• Improving efficiency anywhere but the constraint is a waste of time

• Gears – The Ultimate goal of making work visible is to understand it, make it replicable, understand how to best alleviate the constraint and, where possible, automate the work

DE V O P S S E C

• So… DevOps sounds like an IT initiative, what does it have to do with Security?

Page 4: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

B U I L D I T ─ T O G E T H E R ─ A N D T H E Y W I L L C O M E

• DevOps is a new paradigm

• New ideas and bold steps are required

• Security is a function of Quality

“Business requirements related to security” not “security requirements”

• Building a Better Model: Continuous Delivery is Better Security

Focus on Delivering Value

Continuous Delivery ∴ Continuous Security Model

Strategy should be to Enable DevOps and Automation

Focus security personnel on delivering capabilities, remove them from delivery

Remove the bottleneck, subordinate the contraint

• This is where “Rugged DevOps” or DevOps Sec comes in to play.

• Just as Dev and Ops need to be thought of as being on the same team, so too does Security.

• Developers should be responsible for delivering security along with the other functions

• And in this new world, it is often possible to remove security personnel from the delivery pipeline altogether

• Refocusing their efforts on working with developers to create systems to allow developers to easily deliver security along with capability

O UR G RA S S RO O T S B E G I NNI NG

• A common comment on DevOps is that “surely this is something that is only realistic for startups or tech companies?”

• We did not find that to be true…

• …as long as you take the lessons from those that have been successful

16

Our Journey began

with Developer

Enablement

Develop the Tools,

Techniques and

Processes

needed to deliver

Security Services in a

world of Continuous

Delivery.

• Developers are understanding the power of Continuous Delivery,

• but security techniques of the past (mostly waterfall) cannot keep pace.

• Our goal was to try to find tools and techniques that would enable the developers to move at the new speed of business, while not sacrificing security.

C O N T E X T : U H G I S L A R G E & C O M P L E X

• 360+ Companies, 100+ Legal Entities

• Dozens of Large Acquisitions/yr

• 28,000+ Developers

• 17,000+ Applications

• HIPAA, HITRUST, FISMA, MARS-E

• EU & Other Intl Privacy Regs, ++

• Diverse Technology Mix: from Mainframe to Machine Learning

• 1000+ Security Professionals

• DevOps Teams – Varied Maturities

• Waterfall, Agile, and Scaled Agile Delivery

• Security Testing: Mostly Human Driven

• But we *are* a ridiculously large company.

• Actually, we are a bit like the Borg, “Your market segmentation and technological distinctiveness will be added to our own.”

• We are a collective of hundreds of companies, with incredibly diverse technical capabilities and maturity levels

• Operating in a highly regulated field

• …So how could we begin to tackle this issue in a company so large and complex? How could be possibly get fuding for an effort so vast? …

A G R A S S R O O T S B E G I N N I N G

• No grand vision, plan, project proposal, or funding request

• Teams of passionate people volunteering their time to solve problems

they cared about.

• 60 Developers, across Silos & Disciplines

Operations, Engineers, and Security Leaders from across the entire

company

The key is the trust that we are all there—even security—with open minds

to work together toward solving this problem.

• …We didn’t

• We took a lesson from start-ups and worked directly with developers to solve one issue for one small group and grow from there

• We showed an open mind and enthusiasm for solving issues that had been plaguing the company

• There was skepticism at first, but we put our money where our mouth was so to speak

• We had to build trust that we really would work to change policy to support

• Reason for Success #1: We didn't ask executives for money, we asked for a little time from a few passionate people

Page 5: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

O U R P R I N C I P L E S F O R D E V O P S S E C U R I T Y

• Shall prefer Open Source solutions

• Shall support automation

• Shall provide self-service

• Shall be flexible to continuous iterative change

• Shall perform baseline and health-check validation

• Shall be able to execute in a lean and rapid manner

• Shall be standardized

• Shall be easy to learn

• Shall be API driven

• Shall be able to monitor and prevent accidental disruptive behavior

• Reason for Success #2: We didn't need money in order to build value, because we favored open source solutions

• As we were beginning our journey, we worked up a set of principles

• Principles intended to guide us toward speed and scalability

• (There are other principles frameworks as well.)

B U I L D I T - T O G E T H E R - A N D T H E Y W I L L C O M E

• Target things people are passionate about

• Began with six core DevOps Security Problem Sets

Security baseline + configuration validation w/ Chef & Inspec

Gauntlt rugged attack framework

Automated Static Code Analysis in Jenkins via API

Automated Application Vulnerability Scans in Jenkins via API

Clair Container image scanning: building image scanning into Jenkins

DevOps Self-Governance & Operationalization Framework

• Reason for Success #3: We focused our efforts on pain points that people were passionate about

• Where were our pain points?

• Some of these efforts succeeded, some failed

• For some of the ones that failed, we will try again

FA I LURE S A ND S UCCE S S E S

22

Chef + InSpec:

Automated Security

Configuration &

Validation at Speed

Case Study

State Health

Exchange

• One of our core goals was to change the way people interact with Security and fit what *they* are doing.

• One example: We need to enable compliance at speed and scale

• Enable deployment, security and compliance configuration at speed and scale.

• Get security (people) out of the pipeline.

• Security is embedded into the delivery pipeline through security-approved compliance cookbooks

• Compliance is immediately confirmed prior to release for use.

C O M P L I A N C E A S C O D E W I T H C H E F + I N S P E C

• If you are not familiar with it, Chef is an “Infrastructure as Code” Automation tool. It allows infrastructure to be deployed by running a pre-defined script they call a “cookbook”

• In this framework, Server Security Compliance now becomes “just another cookbook”

• Agile, responsive, quick, flexible – You can have a different cookbook for each scenario. And it can be applied by the developer in minutes per server, not days or weeks.

• So, compliance is an integral part of server build and configuration, instead of a late “add-on”, “shifting it left” on the deployment timeline

• This doesn’t replace vulnerability scans. But Servers will largely be compliant at provisioning, which can later be verified with formal scans

• Reduces the end-of-project surprises and project risks with the old way

• This does require upfront investment to create solid compliance cookbooks. We expect that to be someone’s full-time job.

• An experienced chef developer with knowledge of the IaaS or PaaS service under development might expect between 80-120 hours upfront

Page 6: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

O R D E R S O F M A G N I T U D E

• Initial Approach: 15 weeks+

• Stood up 300+ servers from service catalog over 1 weekend

• Waited weeks for extra build services beyond the catalog

• Allowed app and middleware teams to configure in parallel

• After 2+ months were able to apply compliance rules

• Licensing Issues contributed to the delay

• Required 2+ weeks just to run,

• Resulted in compliance tickets, Remediation and rework

• In the new world:

• Run Time: 300 servers 6 minutes ≈ 30 hours

• (One-time investment to create cookbook: 40-100 hours)

March

April

May

June

July

• Compliance experience:

• One State Health Exchange was facing a migration from their data center to ous.

• SEs stood up all required servers (300+) over a weekend via service catalog requests.

• We then waited weeks to get extra build services to customize requirements that were required for that State beyond what the catalog would offer.

• SecurityBlanket was to be used for compliance, but we were running into license complications which were taking weeks to resolve, so we allowed app team and middleware teams to jump in and configure hosts.

• After a couple of months total time, we then applied compliance rules via SecurityBlanket which took a couple weeks to get installed and executed on all 300+ hosts across environments.

• We found issues, so we then went through a series of remediation tickets and rework to get systems compliant.

• We lost tremendous time in the coordination between teams who each needed to restart systems through their work.

• This started in early March for host requests and then it was mid July when the production systems were compliant and ready for application deployment and testing.

25

GauntLt:

“Be Mean to Your Code”

Case Study

Driving Security

Testing into the Pipeline:

Automated Vulnerability

Scanning

S E C U R I T Y I S A F U N C T I O N O F Q U A L I T Y

• Gauntlt – An open source application vulnerability scanner engine

• Enables a self-service vulnerability resolution solution that can be built into Jenkins build pipeline

• Automates use of multiple vulnerability security scanning tools

• Provides packages allowing developers to easily run self-service security checks

• Scans begin immediately and take only minutes to complete

• Next we wanted a self-service application vulnerability scanning solution that could be integrated into the Jenkins build pipeline

• Gauntlt is an open source application vulnerability scanner aggregator engine that allows for multiple vulnerability security scanning tools (like SSLyze, Arachni, Garmr, Nmap, CURL, more) to be packaged in a way to allow developers to easily create security checks against their applications.

• We currently have ours configured with six open source security scanning tools. We plan to add more

• So we have built a lightweight, yet comprehensive scan,

• Again, right now it does fully replace other techniques, but it enables developers to detect and fix issues early—while still actively developing—so that later formal scans come back clean.

• Which will be used in tandem with other programs to generate metrics based on the security of the application and to help bring applications up to compliance

• What do you notice about both of the above two successes?

• Reason for Success #4: We are building rewards into the new processes (1. Speed. 2. You don't have to talk to us, you can move at your own pace.)

• Another Reasons for Success: We start small with just the teams that were involved in our effort. Their colleagues are seeing their success with the new technique and they are flocking to the new techniques. We—security—are not driving or funding anything.

Page 7: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

L E S S O N S L E A R N E D O N O U R J O U R N E Y

28

Start Small & Focus

Shift Left…

One capability

at a time…

• Part of fail fast

• Teasing out the Grand Unification Theory will delay the small, important wins—and associated groundswell—you could be building

29

Voice of the

Customer

Define, understand,

and listen to your

customer as part

of your journey.

Involve them.

You will be surprised

how eager they

are to help you.

• Our process and tool failures are actively harming their productivity

• The WANT to help us be better

• Yes, there are cowboys out there that just want us out of the way, but there are also plenty of them that are more mature and want to do things with quality.

30

Find the Passion of

Others and aim it at

your problems

For us, it was those

who were most

passionate about

each problem that

achieved success

• Each of our efforts that were successful, were successful because of the small number of passionate individuals involved that wanted it solved.

31

Automation is

Important but

Don’t be Distracted

by it

Emphasize

Simplification &

Standardization

over Automation

• Don’t automate bad processes

• Simplify and streamline your processes first, then automate

Page 8: Abstract: SHIFT LEFT - CDM Media · SHIFT LEFT SPEED D ELIVER Y, IM PR O VE SEC UR ITY Abstract: How would you like to increase the speed of your server delivery pipeline by 3 ORDERS

32

Embrace Failure

as a Friend

Plan and expect

failure as a

positive outcome.

Encourage teams to

fail quickly and learn

from them.

• This helps you understand peoples priorities

• Rid yourselves of people that are not producing, let them drop back to their regular roles

• Refocus the producers—the passionate ones—on other efforts that are seeing traction

W HAT ’S NE XT

D E V O P S S E C U R I T Y I N T H E N E X T 5 Y E A R S

1

2

3

4

5

• Comment for 5 ( i.e. Netflix Security Monkey )

K E Y T A K E A W A Y S

• DevOps is not a fad, it is the future – It is a culture shift, not just about automation

• Principles

• Drive out complexity. Complex things don’t scale

• Avoid Analysis Paralysis

• Fail small, fail fast

• Let humans focus on where they add value; automate everything else

• Reasons for success

• We didn't ask for money, we asked for passionate people

• We didn't need money in order to build value, because we favored open source solutions

• We focused our efforts on pain points that people were passionate about

• We built rewards into the new processes

• .

T H A N K Y O U

Q&AQuinn R Shamblin – CISM, CISSP, ITIL, PMP, GCFA

[email protected]

www.linkedin.com/in/quinnshamblin/

Another great lead is: Aaron Rinehart [email protected] https://www.linkedin.com/in/aaronsrinehart