Welcome!

Cloud Security Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Ravi Rajamiyer

Related Topics: @DevOpsSummit, @CloudExpo, Cloud Security

@DevOpsSummit: Blog Feed Post

Why Security Needs DevOps: OpenSSL and Beyond | @DevOpsSummit #DevOps

New methods of infrastructure management are the only way to keep pace with current security threats

Why Security Needs DevOps: OpenSSL and Beyond
By Greg Pollock

On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, development, and security teams braced for impact and then– it wasn't really that bad.

One issue was about the downgrade to export RSA vulnerability and the other was about susceptibility to DoS attacks. The RSA export was a serious problem, but it had been known for months and was just being officially reclassified as high severity. DoS attacks were bad but wouldn't result in data compromise. The "next Heartbleed" turned out to be more like the boy who cried wolf.

Since Heartbleed, vulnerability disclosures have gotten more attention. Sometimes it is well deserved; other times it feels more like media hype. For a larger perspective on the post-Heartbleed security landscape, ScriptRock talked to Jonathan Cran and Scott Petry. Jonathan Cran is the VP of Operations at Bugcrowd, a platform for crowd-sourced security. Scott Petry is the founder of Postini and Authentic8, which makes a disposable browser to insulate businesses from their employees' surfing.

Jonathan Cran pointed to some relatively good news: greater investments in the Linux Core Infrastructure Initiative will start paying down some of the operating system's technical debt. Additionally, the Linux Foundation is paying for a professional audit for the first time and has hired more full time developers to work solely on the kernel.

At the same time, the overall volume of vulnerabilities is only increasing, as Bugcrowd's success suggests. Given the decline of signature based defenses and the unpredictability of new vulnerabilities, Cran's recommendations require infrastructure teams to be flexible. "You need to be able to know what you have, know what vulnerabilities are out there, and quickly make changes," he said. "You need to have systems in place so that once you know what a vulnerability is, you can fix it as soon as possible. That's more about your processes and how you build your infrastructure than about this vulnerability or that one in particular."

Scott Petry painted a less rosy picture of the security landscape. "Will there be more? Oh yeah. Is it going to be OpenSSL? I don't know. Just think about other core utilities- image processing, for example- and you have a list of potential vulnerabilities with the same reach as Heartbleed." (N.B.: this interview was conducted before VENOM, a core vulnerability in many VMs, was disclosed.) Open source software's pace of development and the natural supply/demand have contributed immensely valuable libraries but have also made security testing optional. Like Cran, Petry recommends that infrastructure owners prepare for the unknown unknowns by building flexible, transparent, high quality systems. "Give me visibility, the ability to quickly make changes, and the ability to check that those changes worked."

Black hats and infrastructure owners remain locked in a red queen's race. Hackers continue to find novel ways to exploit the weak spots in complex systems; Operations teams get better at monitoring and automating their infrastructure. Sadly, the bad guys are currently winning: the Verizon Data Breach Investigation Report finds that the difference between time to infection and time to discovery has increased every year from 2004 to 2014. But perhaps an approach to security that takes into account the complete development and deployment cycle- a DevOps, approach- can turn the tide.

The lesson to be learned from Heartbleed and its offspring is not that OpenSSL or open source software is too dangerous to use. Rather, the conclusion is that new methods of infrastructure management - better visibility into system state, more efficient meands of detecting and eliminating vulnerabiltiies, faster ways to apply uniform changes - are the only way to keep pace with current security threats.

Read the original blog entry...

More Stories By ScriptRock Blog

ScriptRock makes GuardRail, a DevOps-ready platform for configuration monitoring.

Realizing we were spending way too much time digging up, cataloguing, and tracking machine configurations, we began writing our own scripts and tools to handle what is normally an enormous chore. Then we took the concept a step further, giving it a beautiful interface and making it simple enough for our bosses to understand. We named it GuardRail after its function — to allow businesses to move fast and stay safe.

GuardRail scans and tracks much more than just servers in a datacenter. It works with network hardware, Cloud service providers, CloudFlare, Android devices, infrastructure, and more.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...