PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half...

24
PRIVILEGED SECURITY FOR NETOPS Quincy Cheng – APJ DevOps Manager, CyberArk

Transcript of PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half...

Page 1: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

PRIVILEGED SECURITY FOR NETOPS

Quincy Cheng – APJ DevOps Manager, CyberArk

Page 2: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

•Net – Network•Dev – Development•Ops – Operations•Sec – Security

DEVOPS, NETOPS, SECOPS, DEVSECOPS…

2

Page 3: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

WHY?

3

Automation Continues Everything

It's all about velocity and delivering in a mode of continuous improvement

Everything is Code

NetOps: IAS Infrastructure as Code

Collaboration and Sync

Page 4: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

4

CODE DELIVERY = REVENUE GROWTH

Source: EMA, “DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise,” 2017.

Companies with faster code delivery were

62%more likely to see YoY revenue

growth of 25% or more

Slower Code Delivery

Faster Code Delivery

Page 5: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

3 TYPICAL USE CASES

5

SystemAdmin

ProjectManager

Infra-structure

I manage projects, e.g. new deployments

I preform system operations, e.g. failover

I manage infrastructure platforms, e.g. config &

security baseline

Page 6: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

REALITY

6

Page 7: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

ATTACKERS TARGET NON-HUMAN CREDENTIALS

Tesla Cloud Account Data Breach

Attackers used credentials stored in Kubernetes to hijack cloud resources to mine cryptocurrency

Attacker finds unprotected Kubernetes console and

copies the keys

DevOps engineer places

AWS access keys in

Kubernetes

Attacker uses keys to install

cryptocurrency mining software

in cloud

Kubernetes is configured to not require a password for

console access

Page 8: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

8

ATTACK CAN BE SIMPLE

Page 9: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

THE PROBLEM: EMBEDDED SECRETS

9

Page 10: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

NATIVE TOOLS CREATE RISK WITH “ISLANDS OF SECURITY”

Islands of Security • Native tool vendors not focused on security, most not enterprise ready

Vs.

• Central view and control of Privileged Access Security

• Full auditing

• Enterprise wide solution for on-premises, hybrid, cloud only

• Leverage the portfolio of CyberArk capabilities (Vault, monitoring, etc.)

Hiera DatabagsVault

IAM / KMS IAM / KMS

Secrets SecretsSecrets

IAM / KMS

Page 11: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

11

THE SOLUTION: REMOVE & CENTRALIZE EMBEDDED SECRETS

Demo repo: https://github.com/quincycheng/cicd/

• No embedded secrets• Inject secrets In memory• Short lived

Page 12: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

12

HOW?

STEP 1: WHERE ARE THEY?

Page 13: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

Cyberark Advanced Threat Landscape - 2018 Report, indicated:

CURRENT SITUATION

13

• 75% organizations do not have a privileged account security strategy for DevOps

• Fewer than half report that DevOps and security teams consistently work together

• Nearly all (99%) of security pros and DevOps respondents failed to identify all places where privileged accounts or secrets exist

Page 14: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

14

CREDENTIALS ARE EVERYWHERE (2/2)

Infrastructure

Servers VM Cloud Container Platform

Infrastructure as Code

Target Devices

Core PAS

Core PAS

Core PAS

AAM

TARGET DEVICES

Page 15: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

EVERYWHERE! (THAT’S WHY THEY’D BE SECURED IN DAY 1)

15

Page 16: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

16

HOW?

STEP 2: LOCK DOWN

Page 17: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

• Applying Human Security Principles to Machines

MACHINE IDENTITY

17

Page 18: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

Human

LOCK DOWN CREDENTIALS

18

ApplicationPASSWORD ROTATIONSECURE

STORAGE

NETWORK DEVICES

SERVERS MAINFRAMES

DATABASES APPLICATIONS

SECURITY APPLICANCES

WEBSITES/WEBAPPS

CLOUD INFRASTUCTURE

ENTERPRISE RESOURCES

CyberArk Vault

CPM

I don’t know the credentials

I have no embedded

secrets

Page 19: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

19

HOW?

STEP 3: SECURE YOUR SECRETS

Page 20: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

Human

APPLY SECURITY ENFORCEMENTS

20

Application

NETWORK DEVICES

SERVERS MAINFRAMES

DATABASES APPLICATIONS

SECURITY APPLICANCES

WEBSITES/WEBAPPS

CLOUD INFRASTUCTURE

ENTERPRISE RESOURCES

PVWA

AAM

PSM / PSMP

• Authentication• Access Control • Audit trails• Centralized

management

SIEM

• Visibility

Page 21: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

USE CASE EXAMPLE: PAS & AAM ENABLE END-TO-END SECURITY FOR THE CI/CD PIPELINE

Admin Consoles /Human Users

v Protect the tool consoleUse Privileged Session Manager to monitor and record any human or non-human interactive access

v Secure the tool credentials Use Central Policy Manager to manage and rotate credentials based on policy

v Secure the tool CLIUse On Demand Privilege Manager to Secure the tool CLI interface

v Detect unmanaged & compromised IAM usersUse Privileged Threat Analytics to detect unmanaged Access Keys, and Passwords for AWS users as well as compromised privileged IAM and EC2 users

DevOps CI/CD Pipeline /Automation Container /App Deployment

v Secure the Pipeline credentials Use Application Access Manager to manage the credentials used by the pipeline to access resources and run other tools.

v Secure Master / Cookbook / Playbook / Manifest / Application containersUse Application Access Manager to remove hard coded/ unmanaged credentials from jobs and retrieve them in a secure way

v Discover hard coded credentialsUse DNA to auto-discover hidden credentials in tool Ansible Playbooks, Roles, and Tasks

v Secure the managed Nodes Use Application Access Manager to establish an identity, for containers and other nodes, during orchestration to enable secure retrieval of secrets.

v Secure admin access to the Nodes Use Privileged Session Manager to secure, control and monitor the access to the nodes

Application Access Manager: Dynamic Access Provider

PAS and PSM, OPM, PTA PSM

CyberArk’s holistic approach secures the full CI/CD Pipeline and Tool Chain end-to-end

DNA

Page 22: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

CYBERARK C3 ALLIANCE & MARKETPLACE

22

Page 23: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

1. NetOps is great if it’s secured

2. How CyberArk can help to protect both human credentials and application secrets

3. Contact CyberArk team to help with the evaluation

KEY TAKEAWAY

23

Page 24: PRIVILEGED SECURITY FOR NETOPS - HKNOG.net · security strategy for DevOps • Fewer than half report that DevOps and security teams consistently work together • Nearly all (99%)

24

THANK YOU!

Quincy ChengAPJ DevOps Manager, [email protected]