Welcome!

Java IoT Authors: Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, William Schmarzo

Article

Key Takeaways from Continuous Discussions (#c9d9) Episode 45: DevOps and Security

DevOps and Security

One of our recent Continuous Discussion (#c9d9) podcast episodes focused on best practices around the tenets of DevOps and Security.

Our expert panel included: Andreas Wittig, author of “Amazon Web Services in Action” and software engineer, speaker, teacher and consultant; Dave Bechberger, a senior architect and developer at Expero; J. Paul Reed, an internationally recognized speaker on DevOps, release engineering, and operations complexity; Martin Cron, principal engineer at WiserCare; Sukhbir Dhillon, founder of Addteq; and our very own Anders Wallgrenand Sam Fell.

During the episode, we discussed how DevOps can help secure your code, environments and processes, as well as how it can help improve visibility and compliance.

Securing Your Code

quality hygiene is just as important to code security as release engineering hygiene - @martincron

 

Security in your source code is something you must educate your teams about - @andreaswittig

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Release engineering hygiene is crucial to securing your code, and actually really easy, says Reed: “If you’ve got a library that has a security vulnerability, that’s a security problem. If you’ve got 58 libraries in your products with a security problem, that’s a release engineering problem. Training your team on StringBuffers and Java-whatever is important but also really hard. The really low hanging fruit turns out to be release engineering hygiene, and it comes from simply knowing what you are using.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Bake security into your code, says Bechberger: “I think the most important thing I’ve ever seen about securing your code is that you have to start building your code from the beginning, it isn’t something you can add afterwards…I was reading an article where someone found that they were using Reddit servers and about 6,000 Reddit servers were open to the Internet with no security. There has to be a tight integration between developers and operation, both of them have to work together to figure out how to build a product and then actually secure it going forward.”

 

Dhillonhttp://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" /> advises if you are going to have libraries, have them come from one source: “We were working with one client: they have 9,000 applications, and they don’t even know what libraries they use.  If they are not coming from a common central location, where you author the security rules, you will always have these problems.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Working in the health industry means Cron has to take extra measures to ensure security; he does so by running unit tests: “I have unit tests that say ‘Try to talk to our servers on clear text’ and if they respond at all to clear text the we know we are doing something wrong. We’ve got the same set of tests running against all our servers so if anything talks clear text at all the tests fail, the pipeline stops.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />When it comes to securing your code, securing your source code is crucial, per Wittig: “Security in your source code is something that you need to bring into your team and need to educate them about; you need to get into new techniques and iterate over the thing you already have security-wise in your source code. A big part of it in my opinion is educating the team to get everybody aware of the security issues that can arise when running source code.”

 

Securing Your Environments

Shared passwords also impact governance in a environment - you can lose sight of who made the most recent version @samueldfell

 

Create a culture where people are encouraged to bring forward security concerns - @bechbd

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Adopt a hacker mentality when securing your environment, advisesDhillon: “When you’re shipping your code you’re never thinking from the hacker mentality, you always think from a good cop side, whereas the hacker might be utilizing so many other things which you never thought of. When you are put in that position you will think like that and automatically improve your code quality.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Securing environments is often a cultural problem, notes Reed: “The thing that is so interesting about security, especially from a DevOps culture perspective, is it’s a) how do you incorporate the knowledge that even the developers know and b) how do you organizationally deal with the problem so you don’t have passwords on sticky notes or self-sign certs that you rely on. This is a frustrating part about security because there is a lot of low hanging fruit and it’s not a technical, knowledge, or training problem.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />The most important element for securing environments per Wittig? Building security into a continuous delivery pipeline: “Have a secure infrastructure, a secure environment for running applications. That’s an infrastructure that is defined by code and that is part of your deployment pipeline. That means having pure reviews for security-relevant infrastructure parts like authorization tools, cloud services and then to deploy those things automatically to production to avoid human failure, to have a machine do all that work and also to have automated testing for the security configurations, testing infrastructure and also in combination with the application.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Use automation to secure your environments, says Cron: “The safest environment is the one you don’t let humans muck around in. If you have your pipeline with automated deployments, you’re not SSH-ing into the server and doing things manually; and, if no one can do things manually, or if doing things manually is such an exceptional case, it shows up in the log and you can see who was doing what, when.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Configuration management is key to securing environments, saysBechberger: “We have all seen tons of hard-coded configurations of connection strings, passwords or things where you have a configuration file that was just checked in, but build some sort of infrastructure around managing that. If I need to go to production, there is a path for me to get there, it’s not going through the back door and logging in with an admin password or an admin SSL.”

 

Securing Your Process

If your processes are onerous then people will cheat and go around them - per @anders_wallgren

 

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Culture also plays a big role in securing your process. Cron explains: “Make the propaganda posters that say ‘This is a value we care about and is a part of our process.’ Have things like transparency and code reviews be absolutely integral to the process. [In our company] we have total transparency – I trust everyone on the team, we don’t have to have different roles because everyone is literally watching everyone else.”

 

http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 150w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 115w, http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-pod... 80w" height="80" width="80" alt="sukhbir-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/sukhbir-c9d9-devops-podcast.jpg" class="alignleft wp-image-25790" />Best practice for securing environments? Hack your own code like Dhillon does at Addteq: “People never give a time for the developers to hack their own code. We run break-a-thon sessions and hack our own code, and whoever finds the most vulnerabilities gets rewarded and everybody is happy that they are doing something different.”

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Want to secure your process? Do Agile, says Wittig: “[In Agile] the idea is to iterate on your products so you improve them step-by-step, and sometimes I wonder why we are not using the same process to improve security. As iterations on our security are getting better step-by-step it means we have to start with the basics and then we have to get better and better. Probably our product owners are not happy with investing huge amounts of developer time to get to a security level that is extremely high, so we need to start small and then iterate and keep getting better and better.”

 

http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 150w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 115w, http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-de... 79w" height="81" width="80" alt="Dave-Bechberger-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/Dave-Bechberger-c9d9-devops-podcast.jpg" class="wp-image-25763 alignleft" />Create a culture that fosters security, advises Bechberger: “I think the other part [of securing your process] is another culture aspect, which is to make it known not only to the development team but also to management and your product owners why security is important and why it may take slightly longer to build up the secure way versus the insecure way. I have seen many times where people want to cut corners because security takes too long, but in the end it doesn’t really take too long, it’s far easier to start now than start later.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />In order to secure your environment, have a little bit of trust up front, advises Reed: “When you talk about process, that involves people and people are really good at getting around process, especially brittle processes that doesn’t work. When you talk about securing process, what you’re basically talking about is a shell game – you’re basically saying ‘I don’t trust my developers.’ That’s a losing proposition – if you don’t trust your developers it’s already game over.”

 

Improve Visibility and Compliance

Visibility & comliance: It's not a hard thing to explain and easy to show the value to people - @martincron

 

 

http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 150w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 115w, http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-dev... 80w" height="80" width="80" alt="andreas-wittig-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/andreas-wittig-c9d9-devops-podcast.jpg" class="alignleft wp-image-25767" />Advice on how to increase compliance, per Wittig: “Compliance rules are sometimes hard to communicate to the whole organization especially if your teams are changing a lot, so one thing that I like is to have compliance rules as code, and check your infrastructure and your application against them.”

 

http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 179w, http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops... 80w" height="80" width="80" alt="j-paul-reed-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/j-paul-reed-c9d9-devops-podcast.jpg" class="wp-image-25163 alignleft" />Visibility and compliance are your reasons for doing security right, saysReed: “If you do security right, visibility and compliance are the reasons you give to the business about why you do it. They are natural things that fall out of a good process.”

 

http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 150w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 115w, http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops... 80w" height="80" width="80" alt="martin-cron-c9d9-devops-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/martin-cron-c9d9-devops-podcast.png" class="alignleft wp-image-25762" />Cron gave a traceability demo to their non-tech savvy CEO, and it clicked for him, so Cron suggests you can explain visibility and compliance to just about anyone: “Visibility and compliance are not hard things to explain and show value to others.”

 

Watch the full episode here:

 

 

Want more Continuous Discussions?

http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 300w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 115w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 230w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 380w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 100w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 266w, http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discuss... 532w" height="400" width="560" alt="c9d9-continuous-discussions-podcast" src="http://cdn.electric-cloud.com/wp-content/uploads/c9d9-continuous-discussions-podcast.jpg" class="alignnone wp-image-23651 size-full" />

We hold our #c9d9’s every other Tuesday at 10 a.m. PST, each episdoe featuring expert panelists talking about DevOps, Continuous Delivery, Agile and more. Next time on Continuous Discussions: Open Source and DevOps.

More Stories By Anders Wallgren

Anders Wallgren is Chief Technology Officer of Electric Cloud. Anders brings with him over 25 years of in-depth experience designing and building commercial software. Prior to joining Electric Cloud, Anders held executive positions at Aceva, Archistra, and Impresse. Anders also held management positions at Macromedia (MACR), Common Ground Software and Verity (VRTY), where he played critical technical leadership roles in delivering award winning technologies such as Macromedia’s Director 7 and various Shockwave products.

IoT & Smart Cities Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...