Welcome!

Article

Key Takeaways from Continuous Discussions (#c9d9) Episode 45: DevOps and Security

DevOps and Security

One of our recent Continuous Discussion (#c9d9) podcast episodes focused on best practices around the tenets of DevOps and Security.

Our expert panel included: Andreas Wittig, author of “Amazon Web Services in Action” and software engineer, speaker, teacher and consultant; Dave Bechberger, a senior architect and developer at Expero; J. Paul Reed, an internationally recognized speaker on DevOps, release engineering, and operations complexity; Martin Cron, principal engineer at WiserCare; Sukhbir Dhillon, founder of Addteq; and our very own Anders Wallgrenand Sam Fell.

During the episode, we discussed how DevOps can help secure your code, environments and processes, as well as how it can help improve visibility and compliance.

Securing Your Code

quality hygiene is just as important to code security as release engineering hygiene - @martincron

 

Security in your source code is something you must educate your teams about - @andreaswittig

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Release engineering hygiene is crucial to securing your code, and actually really easy, says Reed: “If you’ve got a library that has a security vulnerability, that’s a security problem. If you’ve got 58 libraries in your products with a security problem, that’s a release engineering problem. Training your team on StringBuffers and Java-whatever is important but also really hard. The really low hanging fruit turns out to be release engineering hygiene, and it comes from simply knowing what you are using.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Bake security into your code, says Bechberger: “I think the most important thing I’ve ever seen about securing your code is that you have to start building your code from the beginning, it isn’t something you can add afterwards…I was reading an article where someone found that they were using Reddit servers and about 6,000 Reddit servers were open to the Internet with no security. There has to be a tight integration between developers and operation, both of them have to work together to figure out how to build a product and then actually secure it going forward.”

 

Dhillonhttp://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" /> advises if you are going to have libraries, have them come from one source: “We were working with one client: they have 9,000 applications, and they don’t even know what libraries they use.  If they are not coming from a common central location, where you author the security rules, you will always have these problems.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Working in the health industry means Cron has to take extra measures to ensure security; he does so by running unit tests: “I have unit tests that say ‘Try to talk to our servers on clear text’ and if they respond at all to clear text the we know we are doing something wrong. We’ve got the same set of tests running against all our servers so if anything talks clear text at all the tests fail, the pipeline stops.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />When it comes to securing your code, securing your source code is crucial, per Wittig: “Security in your source code is something that you need to bring into your team and need to educate them about; you need to get into new techniques and iterate over the thing you already have security-wise in your source code. A big part of it in my opinion is educating the team to get everybody aware of the security issues that can arise when running source code.”

 

Securing Your Environments

Shared passwords also impact governance in a environment - you can lose sight of who made the most recent version @samueldfell

 

Create a culture where people are encouraged to bring forward security concerns - @bechbd

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Adopt a hacker mentality when securing your environment, advisesDhillon: “When you’re shipping your code you’re never thinking from the hacker mentality, you always think from a good cop side, whereas the hacker might be utilizing so many other things which you never thought of. When you are put in that position you will think like that and automatically improve your code quality.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Securing environments is often a cultural problem, notes Reed: “The thing that is so interesting about security, especially from a DevOps culture perspective, is it’s a) how do you incorporate the knowledge that even the developers know and b) how do you organizationally deal with the problem so you don’t have passwords on sticky notes or self-sign certs that you rely on. This is a frustrating part about security because there is a lot of low hanging fruit and it’s not a technical, knowledge, or training problem.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />The most important element for securing environments per Wittig? Building security into a continuous delivery pipeline: “Have a secure infrastructure, a secure environment for running applications. That’s an infrastructure that is defined by code and that is part of your deployment pipeline. That means having pure reviews for security-relevant infrastructure parts like authorization tools, cloud services and then to deploy those things automatically to production to avoid human failure, to have a machine do all that work and also to have automated testing for the security configurations, testing infrastructure and also in combination with the application.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Use automation to secure your environments, says Cron: “The safest environment is the one you don’t let humans muck around in. If you have your pipeline with automated deployments, you’re not SSH-ing into the server and doing things manually; and, if no one can do things manually, or if doing things manually is such an exceptional case, it shows up in the log and you can see who was doing what, when.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Configuration management is key to securing environments, saysBechberger: “We have all seen tons of hard-coded configurations of connection strings, passwords or things where you have a configuration file that was just checked in, but build some sort of infrastructure around managing that. If I need to go to production, there is a path for me to get there, it’s not going through the back door and logging in with an admin password or an admin SSL.”

 

Securing Your Process

If your processes are onerous then people will cheat and go around them - per @anders_wallgren

 

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Culture also plays a big role in securing your process. Cron explains: “Make the propaganda posters that say ‘This is a value we care about and is a part of our process.’ Have things like transparency and code reviews be absolutely integral to the process. [In our company] we have total transparency – I trust everyone on the team, we don’t have to have different roles because everyone is literally watching everyone else.”

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Best practice for securing environments? Hack your own code like Dhillon does at Addteq: “People never give a time for the developers to hack their own code. We run break-a-thon sessions and hack our own code, and whoever finds the most vulnerabilities gets rewarded and everybody is happy that they are doing something different.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Want to secure your process? Do Agile, says Wittig: “[In Agile] the idea is to iterate on your products so you improve them step-by-step, and sometimes I wonder why we are not using the same process to improve security. As iterations on our security are getting better step-by-step it means we have to start with the basics and then we have to get better and better. Probably our product owners are not happy with investing huge amounts of developer time to get to a security level that is extremely high, so we need to start small and then iterate and keep getting better and better.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Create a culture that fosters security, advises Bechberger: “I think the other part [of securing your process] is another culture aspect, which is to make it known not only to the development team but also to management and your product owners why security is important and why it may take slightly longer to build up the secure way versus the insecure way. I have seen many times where people want to cut corners because security takes too long, but in the end it doesn’t really take too long, it’s far easier to start now than start later.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />In order to secure your environment, have a little bit of trust up front, advises Reed: “When you talk about process, that involves people and people are really good at getting around process, especially brittle processes that doesn’t work. When you talk about securing process, what you’re basically talking about is a shell game – you’re basically saying ‘I don’t trust my developers.’ That’s a losing proposition – if you don’t trust your developers it’s already game over.”

 

Improve Visibility and Compliance

Visibility & comliance: It's not a hard thing to explain and easy to show the value to people - @martincron

 

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Advice on how to increase compliance, per Wittig: “Compliance rules are sometimes hard to communicate to the whole organization especially if your teams are changing a lot, so one thing that I like is to have compliance rules as code, and check your infrastructure and your application against them.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Visibility and compliance are your reasons for doing security right, saysReed: “If you do security right, visibility and compliance are the reasons you give to the business about why you do it. They are natural things that fall out of a good process.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Cron gave a traceability demo to their non-tech savvy CEO, and it clicked for him, so Cron suggests you can explain visibility and compliance to just about anyone: “Visibility and compliance are not hard things to explain and show value to others.”

 

Watch the full episode here:

 

 

Want more Continuous Discussions?

http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 300w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 115w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 230w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 380w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 100w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 266w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 532w" height="400" width="560" alt="c9d9-continuous-discussions-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discussions-podcast.jpg" class="alignnone wp-image-23651 size-full" />

We hold our #c9d9’s every other Tuesday at 10 a.m. PST, each episdoe featuring expert panelists talking about DevOps, Continuous Delivery, Agile and more. Next time on Continuous Discussions: Open Source and DevOps.

More Stories By Anders Wallgren

Anders Wallgren is Chief Technology Officer of Electric Cloud. Anders brings with him over 25 years of in-depth experience designing and building commercial software. Prior to joining Electric Cloud, Anders held executive positions at Aceva, Archistra, and Impresse. Anders also held management positions at Macromedia (MACR), Common Ground Software and Verity (VRTY), where he played critical technical leadership roles in delivering award winning technologies such as Macromedia’s Director 7 and various Shockwave products.

Latest Stories
SYS-CON Events announced today that CAST Software will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CAST was founded more than 25 years ago to make the invisible visible. Built around the idea that even the best analytics on the market still leave blind spots for technical teams looking to deliver better software and prevent outages, CAST provides the software intelligence that matter ...
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, discussed how AI can simplify cloud operations. He covered the following topics: why cloud mana...
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, discussed solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. H...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, will discuss th...
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, will introduce two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a...
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single-threaded, you can effectively identify hot spots in your serverless code. In his session at @DevOpsSummit at 21st Cloud Expo, Dave Martin, Product owner at CA Technologies, will give a live demonstration and code walkthrough, showing how ...
Translating agile methodology into real-world best practices within the modern software factory has driven widespread DevOps adoption, yet much work remains to expand workflows and tooling across the enterprise. As models evolve from pockets of experimentation into wholescale organizational reinvention, practitioners find themselves challenged to incorporate the culture and architecture necessary to support DevOps at scale.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
As more and more companies are making the shift from on-premises to public cloud, the standard approach to DevOps is evolving. From encryption, compliance and regulations like GDPR, security in the cloud has become a hot topic. Many DevOps-focused companies have hired dedicated staff to fulfill these requirements, often creating further siloes, complexity and cost. This session aims to highlight existing DevOps cultural approaches, tooling and how security can be wrapped in every facet of the bu...
yperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let’s say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it....
SYS-CON Events announced today that Pulzze Systems will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems Inc, provides the software product "The Interactor" that uniquely simplifies building IoT, Web and Smart Enterprise Solutions. It is a Silicon Valley startup funded by US government agencies, NSF and DHS to bring innovative solutions to market.
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP, Cloud Foundry Services, at Grape Up, will show you an example of how to deal with this issue. He will demonstrate a cloud-native Spring Boot app running in Cloud Foundry and communicating with clients over websocket protocol that can be easily scaled horizontally and coordinate...