Quintessence Anx Developer Advocate, PagerDuty
DevSecOps and Secure Incident Response
Slide 2
Don’t panic @QuintessenceAnx
Slide 3
The Now
@QuintessenceAnx
Slide 4
@QuintessenceAnx
Slide 5
Software Development Life Cycle
@QuintessenceAnx
Slide 6
Vault over “The Wall” for Security Review
@QuintessenceAnx
Slide 7
Software Development Life Cycle
Security
@QuintessenceAnx
Slide 8
@QuintessenceAnx @QuintessenceAnx
Slide 9
🤔
@QuintessenceAnx
Slide 10
DevSecOps
@QuintessenceAnx
Slide 11
What is DevSecOps?
@QuintessenceAnx
Slide 12
DevSecOps stands for development, security, and operations. DevSecOps seeks to integrate security across the SDLC and streamline the workflows between dev, sec, and ops.
@QuintessenceAnx
Slide 13
What DevSecOps is not
@QuintessenceAnx
Slide 14
DevSecOps is not replacing security with dev and/or ops, or expecting dev and/or ops to become security specialists, or expecting security to become devs and/or ops.
@QuintessenceAnx
Slide 15
Phew.
@QuintessenceAnx
Slide 16
@QuintessenceAnx @QuintessenceAnx
Slide 17
How?
@QuintessenceAnx
Slide 18
The Secure SDLC + Shifting Left
@QuintessenceAnx
Slide 19
@QuintessenceAnx
Slide 20
@QuintessenceAnx
Slide 21
@QuintessenceAnx
Slide 22
SecOps Activities •
Secure architecture / design
•
Threat modeling
•
Testing, e.g. SAST and DAST
•
Scanning images and dependencies
•
Fuzzing
•
And more!
@QuintessenceAnx
Slide 23
Shift Left
@QuintessenceAnx
Slide 24
@QuintessenceAnx
Slide 25
How?
@QuintessenceAnx
Slide 26
Cultural Support
@QuintessenceAnx
Slide 27
Humans.
@QuintessenceAnx
Slide 28
Sharp end: High Risk Low Power
Blunt end: Low Risk High Power @QuintessenceAnx
Slide 29
Exec Buy-in
@QuintessenceAnx
Slide 30
Never trick staff, ever.
@QuintessenceAnx
Slide 31
Training
@QuintessenceAnx
Slide 32
Full Service Ownership
@QuintessenceAnx
Slide 33
Capture the Flag
@QuintessenceAnx
Slide 34
Threat Modeling
@QuintessenceAnx
Slide 35
🚨 @QuintessenceAnx
Slide 36
Secure Incident Response
@QuintessenceAnx
Slide 37
Stop the attack in progress. 2. Cut off the attack vector.
Apply additional mitigations, make changes to monitoring, etc.
Assemble the response team.
Forensic analysis of compromised systems.
Isolate affected instances.
Internal communication.
Identify timeline of attack.
Involve law enforcement.
Identify compromised data. 7. Assess risk to other systems.
Reach out to external parties that may have been used as vector for attack.
Assess risk of re-attack.
External communication.
@QuintessenceAnx
Slide 38
Stop the attack in progress
@QuintessenceAnx
Slide 39
Cut off the attack vector
@QuintessenceAnx
Slide 40
Assemble the response team
@QuintessenceAnx
Slide 41
Isolate the affected instances
@QuintessenceAnx
Slide 42
Identify timeline of the attack
@QuintessenceAnx
Slide 43
Identify compromised data
@QuintessenceAnx
Slide 44
Assess risk to other systems
@QuintessenceAnx
Slide 45
Assess risk of re-attack
@QuintessenceAnx
Slide 46
Apply additional mitigations, additions to monitoring, etc.
@QuintessenceAnx
Slide 47
Forensic analysis of compromised systems
@QuintessenceAnx
Slide 48
Internal communication
@QuintessenceAnx
Slide 49
Involve law enforcement
@QuintessenceAnx
Slide 50
Reach out to external parties that may have been used as attack vectors
@QuintessenceAnx
Slide 51
External communication
@QuintessenceAnx
Slide 52
Stop the attack in progress. 2. Cut off the attack vector.
Apply additional mitigations, make changes to monitoring, etc.
Assemble the response team.
Forensic analysis of compromised systems.
Isolate affected instances.
Internal communication.
Identify timeline of attack.
Involve law enforcement.
Identify compromised data. 7. Assess risk to other systems.
Reach out to external parties that may have been used as vector for attack.