SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Brian Henerey
Director of Technology & Operations, OpinionLab
bhenerey@gmail.com | @bhenerey | October 2014
Controlling Devops
Me
• Working in tech since 1998
• Discovered Puppet – 2006
• Discovered Devops – 2010
• First Devopsdays – TODAY!
Trust us, we’re Engineers!
• Did you delete those users accounts?
• Do those automated backups work?
• Do you know what code was released to Prod?
• Who authorized those changes?
• Who reviewed them?
• Are people ssh-ing into Prod? Did they make
any changes?
• How many people have access to customer
data?
Trust, Actually
• Trust is a core element of Devops
• We want to trust and empower our people, that’s
why we hired them
• Yet, we need some controls in place…
This Talk...
• I’m going to briefly describe what a SOC2 is and
how it works
• I’m going to tell how to rub some Devops on one
SOC(2) it to me
A Report on the Controls at a Service Organization
Relevant to:
– Security
– Availability
– Confidentiality
– Processing Integrity
– Privacy
These are called ‘Trust Services Principles’. Defined
here: http://en.wikipedia.org/wiki/Service_Organization_Controls
American Institute of CPAs (AICPA)
Why would you want one?
• To assert that your company meets all the
criteria of the Trust Services Principles
• You want an external auditor to make a
statement that you’ve done this
Who has SOC2 reports?
• SaaS’s
• Datacenters
• AWS (http://blogs.aws.amazon.com/security/blog/tag/SOC+2)
How does a SOC2 work?
You/Your Org
• Write System Description
• Write Controls
• Write Policies based on Controls
• Write Assertion about your System
Auditor
• Helps you prepare the above
• Performs audit for 3-12 months
• Produces Auditor’s report
What does the have to do with
Devops?
1. Accountants are more familiar with traditional IT
practices
– Devops practices require different controls
2. A SOC2 is driven by mitigating risk.
– So is DevOPs
What about ITIL?
• ITIL is the baby that got thrown out with the
bathwater.
• This is just my experience.
Over-optimized for speed
• There’s a ton more emphasis on speed of
feature delivery than creating operable systems
• You can not wish the operational pain away
• So let’s put some controls in place at the start
Getting started with Controls
TSP
Criteria
Risk
Example
Control
Your
Control
Evidence
What is a Control?
• Your organization’s practice for mitigating
specific risks
• Tip: You’re better off with multiple controls to
address each Risk
What kind of Controls are there?
• AICPA introduced the ‘common criteria’ which
cover:
– Organization and management
– Communications
– Risk management and design and implementation of
controls
– Monitoring of controls
– Logical and physical access of controls
– System Operations
– Change Management
Example Control
• Risk: “Breaches and incidents recur because
preventive measures are not implemented after a
previous event. “
• Control: “At least monthly, the Technology
Management Team meet to review the Operations
Review Register and discuss plan for resolution of
issues, or recap of resolved issues.”
Evidence of Control Performing Well
• “Monthly meeting minutes OR checklist of categories
of issues/projects discussed at meetings, attendees,
date, and indication if any projects/issues need to be
communicated to other employees.”
• Tip: this is what you want automated or baked into
your processes as much as possible. No one likes
busy work
Is a Control a Policy?
No.
• Controls are used only by the auditor
• Policies and Procedures are written for
employees with clear instructions on how to
perform their jobs.
How do I write a control?
Auditor
interviews me
Auditor
writes
Review
together
How many controls will I need?
• Around 200
– Maybe 20% of these are duplicates. The means the
same control addresses multiple risks.
• I spent 50-60 hours with the auditor writing
controls over 2-3 months
These are your Controls!
• Start off by writing what your company actually
does
• The most valuable part of writing these controls
is discovering areas to improve
What do Accountants like?
• Clarity
• Hierarchy-based Approval
• Consistency
• Ownership
• Accountability
How is Devops different?
• More collaboration
• More autonomy
• Less segregation of responsibilities
• Broader range of impact
– Systems, code, security, networks, databases
• More bottom-up leadership
Devops Criteria for writing Controls
• Lightweight
• Minimal impact to workflow
• No bureaucracy
• No busy work
• Automate/bake-in all the evidence
• Team members empowered to do their jobs
Up-front versus Back-end Controls
• Up-front control is more powerful, but more
stifling
– People cheat the system in favor of ‘getting things
done’
• Devops controls are on the back-end: The team
is trusted to make changes. We’ll review what
changed after the fact.
– Need multiple controls to increase the effectiveness
Don’t fear the policy
• Okay, maybe fear it a bit.
Leverage your ticketing system
• Already has history
• Already can create reports
• Easy to add approval to it
• Can automate ticket creation for
weekly/monthly/quarterly tasks
• Easy to add screenshots or attachments as
evidence
Leverage your version control
• Name your branches/commits based on Ticket-
ID
• Can review list of commits after deployment to
make sure changes were approved/intended
Leverage your tools + logging
• Have your tools create log events
– Who’s using the tool
– Datestamp
– What change was made
– i.e. Chef-handler for logstash
• https://github.com/lusis/logstash_handler
Side benefit of doing this
• The more you think about your organization,
you’ll probably find things you should really be
doing but aren’t.
• You’ll also find you aren’t consistent in your
behavior, which is why you need layers of
Control.
Example: Alert fatigue
• You probably already have a policy on
responding to alerts
• If you’re not following this process, perhaps it’s
because you have too many alerts, or they’re
un-actionable
• If it’s hard to follow your process, it’s because
you have debt in your system which should be
paid down
Detailed example of a Control
Common Criteria 5.6
“Logical access security measures have been
implemented to protect against security,
availability, or confidentiality threats from sources
outside the boundaries of the system.”
CC5.6 continued
Risk
“Threats to the system are obtained through
external points of connectivity”
CC5.6 Control examples 1
“For VOC system infrastructure components,
logical access is controlled through each
component's native security using group/role
based permissions when possible. The Windows
network is further protected by a 3rd party multi-
factor authentication system.”
Evidence: Network diagram that includes VOC
infrastructure components
CC5.6 Control example 2
“For VOC custom developed applications, logical
access is controlled through role-based security
with configurations stored in the applications'
underlying database. For the 3rd party reporting
tool that is integrated with the VOC custom
developed applications, logical access is controlled
through that tool's native security.”
Evidence: Diagram or documentation that
identifies the software/applications that comprise
the VOC system
CC5.6 Control example 3
“Firewalls are initially setup as deny all and then
configured to allow access for approved services.
At least quarterly, the configuration of each firewall
is reviewed by the Technology Operations Team
and updated as deemed necessary according to
industry best practices.”
Evidence: Quarterly review of firewall configuration
indicating who reviewed, date reviewed, and steps
taken (e.g. firewall rules updated to…).
CC5.7 Control example 4
“Remote access to VOCF systems and
infrastructure components requires single factor
VPN authentication followed by a second factor
authentication at the server or network level.
Certain VOCF system component require two
factor authentication.”
Evidence: VPN configuration screen prints
Thanks!!
Questions?
Special thanks to
Mike Becker
Partner-in-charge, Risks and Controls
@ FGMK
Judge a man by his questions
rather than his answers
-Voltaire

Weitere ähnliche Inhalte

Was ist angesagt?

How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditingLepide USA Inc
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1aGene Kim
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Automating Enterprise IT Management
Automating Enterprise IT ManagementAutomating Enterprise IT Management
Automating Enterprise IT ManagementJohn Gilligan
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlAlgoSec
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...John Gilligan
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education ITKaseya
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemRogue Wave Software
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationSafetyChain Software
 
Patch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare ITPatch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare IT Kaseya
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)Sam Bowne
 
Upgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication systemUpgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication systemJames Keener
 
TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)TDiTechnologies
 

Was ist angesagt? (20)

How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditing
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Ahmed
AhmedAhmed
Ahmed
 
Automating Enterprise IT Management
Automating Enterprise IT ManagementAutomating Enterprise IT Management
Automating Enterprise IT Management
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Patch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare ITPatch Management: 4 Best Practices and More for Today's Healthcare IT
Patch Management: 4 Best Practices and More for Today's Healthcare IT
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
Upgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication systemUpgrading St. Luke's telecommunication system
Upgrading St. Luke's telecommunication system
 
TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)TDi Technologies - IT Foundation Management (IT Operations)
TDi Technologies - IT Foundation Management (IT Operations)
 

Ähnlich wie DevOpsDays Chicago 2014 - Controlling Devops

DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Marie Pagnotta
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...Steffan Stringer
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a finalGene Kim
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayChris Gates
 
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docxCHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docxchristinemaritza
 
Compliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management toolCompliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management toolkarisma hirapara
 
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]Barun Kumar
 
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...Puppet
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015Bob Sokol
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessJules Pierre-Louis
 

Ähnlich wie DevOpsDays Chicago 2014 - Controlling Devops (20)

We Bought Some Tools
We Bought Some ToolsWe Bought Some Tools
We Bought Some Tools
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docxCHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
CHAPTER6 Performing a Risk AssessmentTHERE ARE SEVERAL S.docx
 
Compliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management toolCompliance watcher - A legal compliance management tool
Compliance watcher - A legal compliance management tool
 
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
GRCSG2014_Kumar_Lessons for ensuring_F2E [Compatibility Mode]
 
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...How to Build High-Performing IT Teams - Including New Data on IT Performance ...
How to Build High-Performing IT Teams - Including New Data on IT Performance ...
 
Puppet Labs EMC DevOps Day NYC Aug-2015
Puppet Labs  EMC DevOps Day NYC Aug-2015Puppet Labs  EMC DevOps Day NYC Aug-2015
Puppet Labs EMC DevOps Day NYC Aug-2015
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

DevOpsDays Chicago 2014 - Controlling Devops

  • 1. Brian Henerey Director of Technology & Operations, OpinionLab bhenerey@gmail.com | @bhenerey | October 2014 Controlling Devops
  • 2. Me • Working in tech since 1998 • Discovered Puppet – 2006 • Discovered Devops – 2010 • First Devopsdays – TODAY!
  • 3. Trust us, we’re Engineers! • Did you delete those users accounts? • Do those automated backups work? • Do you know what code was released to Prod? • Who authorized those changes? • Who reviewed them? • Are people ssh-ing into Prod? Did they make any changes? • How many people have access to customer data?
  • 4. Trust, Actually • Trust is a core element of Devops • We want to trust and empower our people, that’s why we hired them • Yet, we need some controls in place…
  • 5. This Talk... • I’m going to briefly describe what a SOC2 is and how it works • I’m going to tell how to rub some Devops on one
  • 6. SOC(2) it to me A Report on the Controls at a Service Organization Relevant to: – Security – Availability – Confidentiality – Processing Integrity – Privacy These are called ‘Trust Services Principles’. Defined here: http://en.wikipedia.org/wiki/Service_Organization_Controls American Institute of CPAs (AICPA)
  • 7. Why would you want one? • To assert that your company meets all the criteria of the Trust Services Principles • You want an external auditor to make a statement that you’ve done this
  • 8. Who has SOC2 reports? • SaaS’s • Datacenters • AWS (http://blogs.aws.amazon.com/security/blog/tag/SOC+2)
  • 9. How does a SOC2 work? You/Your Org • Write System Description • Write Controls • Write Policies based on Controls • Write Assertion about your System Auditor • Helps you prepare the above • Performs audit for 3-12 months • Produces Auditor’s report
  • 10. What does the have to do with Devops? 1. Accountants are more familiar with traditional IT practices – Devops practices require different controls 2. A SOC2 is driven by mitigating risk. – So is DevOPs
  • 11. What about ITIL? • ITIL is the baby that got thrown out with the bathwater. • This is just my experience.
  • 12. Over-optimized for speed • There’s a ton more emphasis on speed of feature delivery than creating operable systems • You can not wish the operational pain away • So let’s put some controls in place at the start
  • 13. Getting started with Controls TSP Criteria Risk Example Control Your Control Evidence
  • 14. What is a Control? • Your organization’s practice for mitigating specific risks • Tip: You’re better off with multiple controls to address each Risk
  • 15. What kind of Controls are there? • AICPA introduced the ‘common criteria’ which cover: – Organization and management – Communications – Risk management and design and implementation of controls – Monitoring of controls – Logical and physical access of controls – System Operations – Change Management
  • 16. Example Control • Risk: “Breaches and incidents recur because preventive measures are not implemented after a previous event. “ • Control: “At least monthly, the Technology Management Team meet to review the Operations Review Register and discuss plan for resolution of issues, or recap of resolved issues.”
  • 17. Evidence of Control Performing Well • “Monthly meeting minutes OR checklist of categories of issues/projects discussed at meetings, attendees, date, and indication if any projects/issues need to be communicated to other employees.” • Tip: this is what you want automated or baked into your processes as much as possible. No one likes busy work
  • 18. Is a Control a Policy? No. • Controls are used only by the auditor • Policies and Procedures are written for employees with clear instructions on how to perform their jobs.
  • 19. How do I write a control? Auditor interviews me Auditor writes Review together
  • 20. How many controls will I need? • Around 200 – Maybe 20% of these are duplicates. The means the same control addresses multiple risks. • I spent 50-60 hours with the auditor writing controls over 2-3 months
  • 21. These are your Controls! • Start off by writing what your company actually does • The most valuable part of writing these controls is discovering areas to improve
  • 22. What do Accountants like? • Clarity • Hierarchy-based Approval • Consistency • Ownership • Accountability
  • 23. How is Devops different? • More collaboration • More autonomy • Less segregation of responsibilities • Broader range of impact – Systems, code, security, networks, databases • More bottom-up leadership
  • 24. Devops Criteria for writing Controls • Lightweight • Minimal impact to workflow • No bureaucracy • No busy work • Automate/bake-in all the evidence • Team members empowered to do their jobs
  • 25. Up-front versus Back-end Controls • Up-front control is more powerful, but more stifling – People cheat the system in favor of ‘getting things done’ • Devops controls are on the back-end: The team is trusted to make changes. We’ll review what changed after the fact. – Need multiple controls to increase the effectiveness
  • 26. Don’t fear the policy • Okay, maybe fear it a bit.
  • 27. Leverage your ticketing system • Already has history • Already can create reports • Easy to add approval to it • Can automate ticket creation for weekly/monthly/quarterly tasks • Easy to add screenshots or attachments as evidence
  • 28. Leverage your version control • Name your branches/commits based on Ticket- ID • Can review list of commits after deployment to make sure changes were approved/intended
  • 29. Leverage your tools + logging • Have your tools create log events – Who’s using the tool – Datestamp – What change was made – i.e. Chef-handler for logstash • https://github.com/lusis/logstash_handler
  • 30. Side benefit of doing this • The more you think about your organization, you’ll probably find things you should really be doing but aren’t. • You’ll also find you aren’t consistent in your behavior, which is why you need layers of Control.
  • 31. Example: Alert fatigue • You probably already have a policy on responding to alerts • If you’re not following this process, perhaps it’s because you have too many alerts, or they’re un-actionable • If it’s hard to follow your process, it’s because you have debt in your system which should be paid down
  • 32. Detailed example of a Control Common Criteria 5.6 “Logical access security measures have been implemented to protect against security, availability, or confidentiality threats from sources outside the boundaries of the system.”
  • 33. CC5.6 continued Risk “Threats to the system are obtained through external points of connectivity”
  • 34. CC5.6 Control examples 1 “For VOC system infrastructure components, logical access is controlled through each component's native security using group/role based permissions when possible. The Windows network is further protected by a 3rd party multi- factor authentication system.” Evidence: Network diagram that includes VOC infrastructure components
  • 35. CC5.6 Control example 2 “For VOC custom developed applications, logical access is controlled through role-based security with configurations stored in the applications' underlying database. For the 3rd party reporting tool that is integrated with the VOC custom developed applications, logical access is controlled through that tool's native security.” Evidence: Diagram or documentation that identifies the software/applications that comprise the VOC system
  • 36. CC5.6 Control example 3 “Firewalls are initially setup as deny all and then configured to allow access for approved services. At least quarterly, the configuration of each firewall is reviewed by the Technology Operations Team and updated as deemed necessary according to industry best practices.” Evidence: Quarterly review of firewall configuration indicating who reviewed, date reviewed, and steps taken (e.g. firewall rules updated to…).
  • 37. CC5.7 Control example 4 “Remote access to VOCF systems and infrastructure components requires single factor VPN authentication followed by a second factor authentication at the server or network level. Certain VOCF system component require two factor authentication.” Evidence: VPN configuration screen prints
  • 38. Thanks!! Questions? Special thanks to Mike Becker Partner-in-charge, Risks and Controls @ FGMK
  • 39. Judge a man by his questions rather than his answers -Voltaire