When Security Meets Innovation: a Cross-Team Love Story
-
Upload
atlassian -
Category
Technology
-
view
3.110 -
download
2
Transcript of When Security Meets Innovation: a Cross-Team Love Story
CRAIG DAVIES HEAD OF SECURITY •
ATLASSIAN @CRDAVIES
SecOps, a Love StoryHow Atlassian’s Security Team works together
ANDREW WURSTER T/L • ATLASSIAN @YOURCISCOKID
It’s a big bad world out there
Build trust with every team.
Remove Barriers
Be Transparent
Be Consistent
Meet the Security Team
We handle (allthethings) security
Trust@Atlassian
Detect and respond Secure by Design
Scale
ATX SYDMTV
Security Engineering Security Intelligence
Information is key to Cyber Security Test, Test, Test:
Plan for the worst:
Data must be useful:Don’t look at everything, look at what matters
We work through scenarios, what could happen?
We test everything, from threats to our incident plans.
Everything is Connected
Intel Hub
A Day in the Life
Active Bitbucket users
increase wk / wk
25%
Incident Investigation
False Positive OR
Low Priority
Not so fast… create a JIRA
True Positive AND
High Priority
New Incident
BAU Task
The Playbook
Logging PipelineOther IncidentsEmail Ingestion JIRA Service Desk
New Security Incident
Industry Groups
• Big cool statistic
• 2,569
• Add-Ons in Marketplace
Phase 1: Detect and Analyze
Security Playbook
Active Bitbucket users
increase wk / wk
25%
Create tasks in JIRA,
track bigger stuff in Confluence
• Big cool statistic
• 2,569
• Add-Ons in Marketplace
Establish Comms
Phase 2:Contain, Eradicate, Recover
• Big cool statistic
• 2,569
• Add-Ons in Marketplace
Allocate work
all users
IT Team
Understanding the problem: Investigation workflow
Active?2FA Enabled?
Successful?
IT Team
all users
Active?2FA Enabled?
Successful?
>1m failed
IT Team
all users
Active?2FA Enabled?
Successful?
successful
>1m
~100k
failed
IT Team
all users
Active?2FA Enabled?
Successful?
successful
>1m
~100k
failed
IT Team
~= 90k active users
all users
Span and Control: how can we contain it?
bad actors
3rd party breach data
legit requests
bad requests
Apply Filter
Contain and Eradicate
By the books: Block a Malicious IP
Play / Policy: How to block …
Config Repo
git PR
By the books: Block a Malicious IP
Policy
By the books: Block a Malicious IP
Config Repo Live Config
deploy
• Big cool statistic
• 2,569
• Add-Ons in Marketplace
Allocate work
Recovery
Phase 3: Review
The Incident is over You’ve survived
Time for PIR
Post Incident Review
Helping you
Trust.atlassian.com
megabytes
terabytes
0.0001%
Are you ready?
People:
Process:
Data:Would you know if you had an attack?
Test everything - dry runs
Encourage open discussion and don’t be driven by rules
Thank you!
CRAIG DAVIES HEAD OF SECURITY •
ATLASSIAN @CRDAVIES
ANDREW WURSTER T/L • ATLASSIAN @YOURCISCOKID