Welcome!

Microservices Expo Authors: Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz, Zakia Bouachraoui

Article

Key Takeaways from Continuous Discussions (#c9d9) Episode 45: DevOps and Security

DevOps and Security

One of our recent Continuous Discussion (#c9d9) podcast episodes focused on best practices around the tenets of DevOps and Security.

Our expert panel included: Andreas Wittig, author of “Amazon Web Services in Action” and software engineer, speaker, teacher and consultant; Dave Bechberger, a senior architect and developer at Expero; J. Paul Reed, an internationally recognized speaker on DevOps, release engineering, and operations complexity; Martin Cron, principal engineer at WiserCare; Sukhbir Dhillon, founder of Addteq; and our very own Anders Wallgrenand Sam Fell.

During the episode, we discussed how DevOps can help secure your code, environments and processes, as well as how it can help improve visibility and compliance.

Securing Your Code

quality hygiene is just as important to code security as release engineering hygiene - @martincron

 

Security in your source code is something you must educate your teams about - @andreaswittig

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Release engineering hygiene is crucial to securing your code, and actually really easy, says Reed: “If you’ve got a library that has a security vulnerability, that’s a security problem. If you’ve got 58 libraries in your products with a security problem, that’s a release engineering problem. Training your team on StringBuffers and Java-whatever is important but also really hard. The really low hanging fruit turns out to be release engineering hygiene, and it comes from simply knowing what you are using.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Bake security into your code, says Bechberger: “I think the most important thing I’ve ever seen about securing your code is that you have to start building your code from the beginning, it isn’t something you can add afterwards…I was reading an article where someone found that they were using Reddit servers and about 6,000 Reddit servers were open to the Internet with no security. There has to be a tight integration between developers and operation, both of them have to work together to figure out how to build a product and then actually secure it going forward.”

 

Dhillonhttp://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" /> advises if you are going to have libraries, have them come from one source: “We were working with one client: they have 9,000 applications, and they don’t even know what libraries they use.  If they are not coming from a common central location, where you author the security rules, you will always have these problems.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Working in the health industry means Cron has to take extra measures to ensure security; he does so by running unit tests: “I have unit tests that say ‘Try to talk to our servers on clear text’ and if they respond at all to clear text the we know we are doing something wrong. We’ve got the same set of tests running against all our servers so if anything talks clear text at all the tests fail, the pipeline stops.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />When it comes to securing your code, securing your source code is crucial, per Wittig: “Security in your source code is something that you need to bring into your team and need to educate them about; you need to get into new techniques and iterate over the thing you already have security-wise in your source code. A big part of it in my opinion is educating the team to get everybody aware of the security issues that can arise when running source code.”

 

Securing Your Environments

Shared passwords also impact governance in a environment - you can lose sight of who made the most recent version @samueldfell

 

Create a culture where people are encouraged to bring forward security concerns - @bechbd

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Adopt a hacker mentality when securing your environment, advisesDhillon: “When you’re shipping your code you’re never thinking from the hacker mentality, you always think from a good cop side, whereas the hacker might be utilizing so many other things which you never thought of. When you are put in that position you will think like that and automatically improve your code quality.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Securing environments is often a cultural problem, notes Reed: “The thing that is so interesting about security, especially from a DevOps culture perspective, is it’s a) how do you incorporate the knowledge that even the developers know and b) how do you organizationally deal with the problem so you don’t have passwords on sticky notes or self-sign certs that you rely on. This is a frustrating part about security because there is a lot of low hanging fruit and it’s not a technical, knowledge, or training problem.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />The most important element for securing environments per Wittig? Building security into a continuous delivery pipeline: “Have a secure infrastructure, a secure environment for running applications. That’s an infrastructure that is defined by code and that is part of your deployment pipeline. That means having pure reviews for security-relevant infrastructure parts like authorization tools, cloud services and then to deploy those things automatically to production to avoid human failure, to have a machine do all that work and also to have automated testing for the security configurations, testing infrastructure and also in combination with the application.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Use automation to secure your environments, says Cron: “The safest environment is the one you don’t let humans muck around in. If you have your pipeline with automated deployments, you’re not SSH-ing into the server and doing things manually; and, if no one can do things manually, or if doing things manually is such an exceptional case, it shows up in the log and you can see who was doing what, when.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Configuration management is key to securing environments, saysBechberger: “We have all seen tons of hard-coded configurations of connection strings, passwords or things where you have a configuration file that was just checked in, but build some sort of infrastructure around managing that. If I need to go to production, there is a path for me to get there, it’s not going through the back door and logging in with an admin password or an admin SSL.”

 

Securing Your Process

If your processes are onerous then people will cheat and go around them - per @anders_wallgren

 

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Culture also plays a big role in securing your process. Cron explains: “Make the propaganda posters that say ‘This is a value we care about and is a part of our process.’ Have things like transparency and code reviews be absolutely integral to the process. [In our company] we have total transparency – I trust everyone on the team, we don’t have to have different roles because everyone is literally watching everyone else.”

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Best practice for securing environments? Hack your own code like Dhillon does at Addteq: “People never give a time for the developers to hack their own code. We run break-a-thon sessions and hack our own code, and whoever finds the most vulnerabilities gets rewarded and everybody is happy that they are doing something different.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Want to secure your process? Do Agile, says Wittig: “[In Agile] the idea is to iterate on your products so you improve them step-by-step, and sometimes I wonder why we are not using the same process to improve security. As iterations on our security are getting better step-by-step it means we have to start with the basics and then we have to get better and better. Probably our product owners are not happy with investing huge amounts of developer time to get to a security level that is extremely high, so we need to start small and then iterate and keep getting better and better.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Create a culture that fosters security, advises Bechberger: “I think the other part [of securing your process] is another culture aspect, which is to make it known not only to the development team but also to management and your product owners why security is important and why it may take slightly longer to build up the secure way versus the insecure way. I have seen many times where people want to cut corners because security takes too long, but in the end it doesn’t really take too long, it’s far easier to start now than start later.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />In order to secure your environment, have a little bit of trust up front, advises Reed: “When you talk about process, that involves people and people are really good at getting around process, especially brittle processes that doesn’t work. When you talk about securing process, what you’re basically talking about is a shell game – you’re basically saying ‘I don’t trust my developers.’ That’s a losing proposition – if you don’t trust your developers it’s already game over.”

 

Improve Visibility and Compliance

Visibility & comliance: It's not a hard thing to explain and easy to show the value to people - @martincron

 

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Advice on how to increase compliance, per Wittig: “Compliance rules are sometimes hard to communicate to the whole organization especially if your teams are changing a lot, so one thing that I like is to have compliance rules as code, and check your infrastructure and your application against them.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Visibility and compliance are your reasons for doing security right, saysReed: “If you do security right, visibility and compliance are the reasons you give to the business about why you do it. They are natural things that fall out of a good process.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Cron gave a traceability demo to their non-tech savvy CEO, and it clicked for him, so Cron suggests you can explain visibility and compliance to just about anyone: “Visibility and compliance are not hard things to explain and show value to others.”

 

Watch the full episode here:

 

 

Want more Continuous Discussions?

http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 300w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 115w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 230w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 380w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 100w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 266w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 532w" height="400" width="560" alt="c9d9-continuous-discussions-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discussions-podcast.jpg" class="alignnone wp-image-23651 size-full" />

We hold our #c9d9’s every other Tuesday at 10 a.m. PST, each episdoe featuring expert panelists talking about DevOps, Continuous Delivery, Agile and more. Next time on Continuous Discussions: Open Source and DevOps.

More Stories By Anders Wallgren

Anders Wallgren is Chief Technology Officer of Electric Cloud. Anders brings with him over 25 years of in-depth experience designing and building commercial software. Prior to joining Electric Cloud, Anders held executive positions at Aceva, Archistra, and Impresse. Anders also held management positions at Macromedia (MACR), Common Ground Software and Verity (VRTY), where he played critical technical leadership roles in delivering award winning technologies such as Macromedia’s Director 7 and various Shockwave products.

Microservices Articles
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.