Legacy systems are like preserved habitats. We need to be able to migrate to better conditions.
61
Slide 62
Example: patching inline PHP code
Instead: single class for DB queries
62
Slide 63
Static indicators like high coral cover or fish abundance reflect favorable past conditions. Erosion of coral reef resilience is dynamic.
63
Slide 64
Ensure your threat models aren’t based on favorable past conditions
64
Slide 65
Survival strategy: comingle warm-adapted species with cold-adapted cohorts
65
Slide 66
Apps built with legacy systems and libs will not survive in an increasingly open API world
66
Slide 67
Uncertainty and surprise must be baked into your approach
67
Slide 68
Test adaptability to attacker methods with attack simulation or auto playbook testing
68
Slide 69
Chaos Monkey
69
Slide 70
Randomly kills instances to test their ability to withstand failure. It also makes persistence really hard.
70
Slide 71
Design your security architecture for survival even if individual controls fail
71
Slide 72
Rethinking security architecture is hard.
The industry offers too much complexity.
72
Slide 73
Containers
73
Slide 74
Containers promote adaptability and support transformability @jessfraz | blog.jessfraz.com/post/talks
74
Slide 75
Containers = “isolated, resource-controlled, and portable runtime environments”
75
Slide 76
Easier to determine root cause Easier to transport to better infrastructure Easier to kill the infection & stop spread
76
Slide 77
Ongoing stress like ocean warming or overfishing makes coral less resilient in the face of cyclones or coral bleaching events
77
Slide 78
Complexity will erode your resilience in the face of new vulns or data breaches
78
Slide 79
Transformability
Slide 80
Transformability = challenge existing assumptions & reorganize your system
80
Slide 81
Prior example: inline code makes it difficult to reorganize your system vs. a single class
81
Slide 82
In disaster recovery policy, ideal is to change location & remove urbanization
82
Slide 83
2011: 6.3mms earthquake hit Christchurch
Cost to rebuild of $40bn+
83
Slide 84
NZ designated a “red zone” where land is too vulnerable & where rebuilding is uneconomic
84
Slide 85
Identify the red zones within your IT systems
85
Slide 86
Choose your own infosec redzone criteria: Publicly exposed, legacy systems, critical data, privileged access, overly verbose, single point of failure, difficult to update, …
86
Slide 87
Example: API consuming critical data should be in “red zone” whether it has vulns or not
87
Slide 88
Identify assets that fall under your red zone criteria & migrate them to a safer system
88
Slide 89
Example: Planned decommission of levees to assist migration Prohibits becoming a permanent “fix”
89
Slide 90
Continually consider how you can prepare in advance for migration
90
Slide 91
Complex systems require collaborative planning across stakeholders
91
Slide 92
Open sharing of protections in place, what risk remains, uncertainties in the approach
92
Slide 93
Partner with engineering – they benefit from flexibility and transformability as well
93
Slide 94
Your role is to manage state transitions. Consider how a resilience approach fits into engineering workflows.
94
Slide 95
2FAC @ Facebook: integrated 2FA into dev workflows without creating friction
95
Slide 96
“You can actually implement security controls that affect every single thing people are doing and still make them love it in the process”
96
Slide 97
Find someone with whom to collaborate & how security can fit into their workflows
97
Slide 98
Ensure your org is learning from prior experiences – foster a security culture
98
Slide 99
Conclusion
Slide 100
Infosec resilience means a flexible system that can absorb an attack and reorganize around the threat.
100
Slide 101
Robustness is optimized through diversity of controls
101
Slide 102
Adaptability minimizes the impact of an attack and keeps your options open
102
Slide 103
Transformability demands you challenge assumptions & reorganize around reality
103
Slide 104
“The history of evolution is that life escapes all barriers. Life breaks free. Life expands to new territories. Painfully, perhaps even dangerously. But life finds a way.” 104
Slide 105
Attacks will evolve. We can evolve, too.
105
Slide 106
Let’s strive for acceptance of our grief, and architect effective and realistic defense
106
Slide 107
The blue pill relegates us to the role of a firefighting cat who’s drunk on snake oil
107
Slide 108
Instead of accepting snake oil, take the red pill of resilience instead
108
Slide 109
“Good enough is good enough. Good enough always beats perfect.” – Dan Geer
Suggested Reading ▪ Engineering resilience versus ecological resilience
▪ Resilience and disaster risk reduction: an etymological journey ▪ A strategy-based framework for assessing the flood resilience of cities – A Hamburg case study ▪ Vulnerability, Resilience, and the Collapse of Society ▪ Are some forms of resilience more sustainable than others?
▪ Flood Resilience: a Co-Evolutionary Approach ▪ The oak or the reed: how resilience theories are translated into disaster management policies ▪ Rethinking Ecosystem Resilience in the Face of Climate Change ▪ Building evolutionary resilience for conserving biodiversity under climate change ▪ Complexity and Planning: Systems, Assemblages and Simulations ▪ “Windows Containers” by Microsoft ▪ “The Netflix Simian Army” by Netflix 111