Cyber Hygiene at speed and scale
– How to Clean a Datacenter
James Mckinlay – CSO Praetorian Consulting International
#whoami
 Electoral Role
 Landline
 Broadband
 Mobile Phone
 Gas Electric
 TV licence
 Passport
 Inland Revenue
 High Street Bank
 Online Retailers
 Online webmail
 Companies House
 Online accountant
 Births & Marriages Register
 Hospital records / GP records
Husband, Father, Son
Cyber Consulting <-IT Security <- IT Solutions
https://uk.linkedin.com/in/jmck4cybersecurity
 Shares / Child ISA
 Pension
 Car Insurance
 House Insurance
 Flight Records (ARINC)
 Mortgage
 Postcode Address File
 University Records
 Water / Utilities
 Council Tax
 Driving Licence
 Car registration / car tax
 Equifax Experian Callcredit
#riskAssessment
http://www.lkcyber.com/
http://www.slideshare.net/lkcyber/self-check
@CisoAdvisor
Actual Agenda
* Very quick look at datacentre issues
* My take on “Good Cyber Hygiene”
* Once more unto the breach
* Takeaways
“Everything should be
as simple as it can be,
but not simpler”
 (1) Before we go any further, I feel I should first
point out that everything I’m about to say is
obviously just my personal opinion, which you
are of course entitled to take with the
appropriate pinch of salt. I would expect that if
you asked someone else who was considering
the same points, they might have very different
things that they are looking for.
 (2) I am not currently in a UK Datacenter
 (but …...)
Disclaimer
* Section 1:
Data centres
Revolution Quote 1:
“You will not be able to stay
home, brother.
You will not be able to plug in,
turn on and cop out.
You will not be able to lose
yourself on skag and
Skip out for beer during
commercials,
Because the revolution will not
be televised.”
- Gil Scott-Heron (1949 –2011)
Co-location
(power & comms)
Co-location
(DRP site)
Managed Service
(physical)
Corporate Servers
(in house)
Managed Service
(virtual)
Cloud
(Public / Private)
19th Hole == DC3
Co-location
(power & comms)
Co-location
(DRP site)
Managed Service
(physical)
Corporate Servers
(in house)
Managed Service
(virtual)
Cloud
(Public / Private)
19th Hole == DC3
Managed Service
(physical)
Corporate Servers
(in house)
Managed Service
(virtual)
Co-location
(power & comms)
Co-location
(DRP site)
Managed Service
(physical)
Corporate Servers
(in house)
Managed Service
(virtual)
Cloud
(Public / Private)
19th Hole == DC3
Cloud
(Public / Private)
Good-cyber-hygiene-at-scale-and-speed
Tier what ?
Tier 1: Guaranteeing
99.671% availability.
Tier 2: Guaranteeing
99.741% availability.
Tier 3: Guaranteeing
99.982% availability.
Tier 4: Guaranteeing
99.995% availability.
Availability over
Security
The more secure you are,
physical, environmental,
configuration management,
change management,
release management,
infosec signoff ....
The better the availability !
DC Problems
External (public)
DDoS on one customer affects all
customers on a shared subnet
External (partners)
Third Party supplier access allows
route into Managed Services and
customer data
Internal (bau)
Managed Services network not
secured adequately
Managed Services network not split
from corporate network
Internal (strategic)
Mergers & Acquisitions
Business Transformation
Hold the front page
* Section 2:
Cyber Hygiene
Revolution quote 2:
“The first revolution is when you
change your mind about how
you look at things, and see there
might be another way to look at
it that you have not been
shown. What you see later on is
the results of that, but that
revolution, that change that
takes place will not be
televised.”
- Gil Scott-heron (1949 –2011)
Not talking about 27001 here
ISO 27002 can be traced back to the British Standard 7799, which
was published in 1995.
Originally written by the DTI, after several revisions ISO took it on as
ISO/IEC 17799.
There was a second part to BS 7799 which formed the
implementation of an ISMS.
This element was what ISO 27001 became in November 2005
(therefore named ISO 27001:2005)
So many to choose from
 ACPO (DFIR)
 AusDSD (ISPF) (ROSI)
 CBEST
 CIS (BM) (SM) (CSC)
 COBIT4 & 5
 CSA CCM
 CPNI / CESG / CERT-UK
 Carnegie Mellon CERT
 EN16945 (NATS)
 First.org
 FCA
 Gov.hk
 HMG
 ISO
Standards,
Frameworks and
Good Practice guides
 ISC2
 ISF-SOGP
 ISM3 Maturity Model
 ISSAF
 Microsoft
 NARUC (Utilities)
 NESA-IAS
 NIST
 OWASP
 PAS-49
 PCIDSS
 SANS
 Secure Pay Europe (ECB)
 SOC I & SOC II reporting
So many questions
What if someone had reviewed them
all and made a list of the Top 100
Cyber Security Questions to ask ?
Cyber Security Perspectives
http://usahuawei.com/wp-content/uploads/2014/12/Top100-cyber-security-requirements.pdf
So to my favourites
AusDSD T35
NSA T10
NSA Managed Network
T20 CCv6
bestest bestest favourite
NSA
Adversary Obstruction
https://www.youtube.com/watch?v=bDJb8WOJYdA
https://www.iad.gov/iad/library/reports/nsa-methodology-for-adversary-obstruction.cfm
Inside favourite
NSA
Adversary Obstruction
https://www.iad.gov/iad/library/reports/nsa-methodology-for-adversary-obstruction.cfm
1. Protect Credentials
2. Segregate Networks and Functions
3. Implement Host Intrusion Prevention System (HIPS) Rules
4. Centralize logging of all events
5. Take Advantage of Software Improvement
6. Implement Application Whitelisting
7. Install and correctly use EMET
8. Public Services Utilization
9. Use a Standard Baseline
10.Data-at-Rest and Data-in-Transit Encryption
11.Use Anti-Virus File Reputation Services
Chart and project plan
AusDSD T35
Also C-Y-A
DPA98
GDPR
* Section 3:
Once more unto the ...
Revolution quote 3:
“There can't be any large-scale
revolution until there's a personal
revolution, on an individual
level. It's got to happen inside
first.”
- Jim Morrison (1943 - 1971)
New agenda
Why it sits well with DC-MS
Speed and scale
Security Operations
First Steps & Roadmap
Service Delivery
Why it sits well with DC-MS
Work
packages
CAB
CMDB
tickets
Service
description
Software library
RCA
Problem
Management
SLA
VisualOps
Why it sits well with DC-MS
Secure Configuration
Management
Why it sits well with DC-MS
DevSecOps
speed and scaleSpeed and scale
Concepts
Easy to deploy, easy to operate
MIG agents are designed to be lightweight, secure, and easy to deploy so you can ask your favorite
sysadmins to add it to a base deployment without fear of breaking the entire production network. All
parameters are built into the agent at compile time, including the list and ACLs of authorized
investigators. Security is enforced using PGP keys, and even if MIG's servers are compromised, as long
as our keys are safe on your investigator's laptop, no one will break into the agents.
Fast and asynchronous
MIG is designed to be fast, and asynchronous. It uses AMQP to distribute actions to endpoints, and
relies on Go channels to prevent components from blocking. Running actions and commands are
stored in a Postgresql database and on disk cache, such that the reliability of the platform doesn't
depend on long-running processes.
Speed is a strong requirement. Most actions will only take a few hundreds milliseconds to run on
agents. Larger ones, for example when looking for a hash in a big directory, should run in less than a
minute or two. All in all, an investigation usually completes in between 10 and 300 seconds.
Strong security primitives
Privacy and security are paramount. Agents never send raw data back to the platform, but only reply
to questions instead. All actions are signed by GPG keys that are not stored in the platform, thus
preventing a compromise from taking over the entire infrastructure.
Good-cyber-hygiene-at-scale-and-speed
Gareth Rushgrove @ Puppet Labs
Is it fast ?
Does it scale ?
Does it use python?
Secure continuous delivery?
Security Automation?
Pipeline, CI, API, Monitoring?
New thinking
speed and scaleSpeed and scale
Data
Centre Cloud
Build your own ?
speed and scaleSpeed and scale
SOC thinking
Security operations
Secret Sauce
First Steps – quick wins
First Steps
Managed data centre is perfect situation to install an run VMaaS
Managed data centre is perfect situation to build a knowledgebase of awkward patches
SOC members are perfect researchers for remediation work following VMaaS
Managed data centre is perfect situation to link VMaaS to CMDB and CAB
SCM operations are perfect for testing remediation work
First Steps – quick wins
Future Steps
SCM can correlate software asset records
SCM can maintain baseline security
SCM can query system for files, hashes, registry entries
SCM can collect local admin details
SCM can collect local USB usage
Summary
 It is in a Data Centre’s best interest to be more secure because that helps availability !!
 IT Ops, Security Ops and Security Management (compliance) need to work closer together
 SOC / SecOps doesn’t have to be about incident response in can also be incident prevention
 If you have outsourced hosting and infrastructure management – why not add VMaaS and
Remediation activities !
Takeaways
 Take “Fix the basics” seriously we’ve had years to get this
 Get started if you haven’t already
 Use what has been learnt from years of vulnerability
assessment and patch management and device hardening
 Tailor it to your organisation (size and maturity)
 Learn from other disciplines (collaborate or die)
 Challenge Managed Service providers to do more security
Network with likeminded peers
Time is precious
thank you for yours
James

More Related Content

PDF
GPDR_Get-Data-Protection-Right
PPTX
Cyber Hygiene
PPT
Edith Turuka: Cyber-Security, An Eye Opener to the Society
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PPTX
Information Security For Small Business
PPTX
Webinar: Be Cyber Smart – Stories from the Trenches
PDF
Craft Your Cyber Incident Response Plan (Before It's Too Late)
GPDR_Get-Data-Protection-Right
Cyber Hygiene
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Information Security For Small Business
Webinar: Be Cyber Smart – Stories from the Trenches
Craft Your Cyber Incident Response Plan (Before It's Too Late)

What's hot (19)

PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
New CISO - The First 90 Days
PDF
Industrial Control Security USA Sacramento California Oct 6/7
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PDF
Cyber Security 101: What Your Agency Needs to Know
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PDF
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
PDF
Cybersecurity report
PDF
State of Cyber: Views from an Industry Insider
PPTX
A Guide to Disaster Preparedness for Businesses
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PPTX
Cyber Security Conference 2017
PDF
Recovering from a Cyber Attack
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
GDPR, Data Privacy and Cybersecurity - MIT Symposium
New CISO - The First 90 Days
Industrial Control Security USA Sacramento California Oct 6/7
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Cyber Security 101: What Your Agency Needs to Know
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
Cybersecurity report
State of Cyber: Views from an Industry Insider
A Guide to Disaster Preparedness for Businesses
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Cyber Security Conference 2017
Recovering from a Cyber Attack
Ad

Similar to Good-cyber-hygiene-at-scale-and-speed (20)

PPTX
You Spent All That Money And Still Got Owned
PPTX
Glue con2011 future_of_net_systems
PPT
SGSB Webcast 3: Smart Grid IT Systems Security
PPTX
Cisco Phy Sec Overview Netversant
PDF
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPTX
Cloud risk and business continuity v21
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PPT
Top IT Management Practices for Government Entities
PDF
Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Los...
PDF
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker H...
PDF
Using the Cloud
PPTX
Encryption in industrial control systems; Is the juice worth the squeeze?
PDF
Building The Infrastructure For Cloud Security 1st Ed Raghuram Yeluri
PDF
Cloud Security @ TIM - Current Practises and Future Challanges
PDF
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
PPT
Cloud computing security - Insights
PDF
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
PDF
Automated prevention of ransomware with machine learning and gpos
You Spent All That Money And Still Got Owned
Glue con2011 future_of_net_systems
SGSB Webcast 3: Smart Grid IT Systems Security
Cisco Phy Sec Overview Netversant
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? Reviewing the SP Security Checklist
Cloud risk and business continuity v21
Automation: The Wonderful Wizard of CTI (or is it?)
Top IT Management Practices for Government Entities
Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Los...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker H...
Using the Cloud
Encryption in industrial control systems; Is the juice worth the squeeze?
Building The Infrastructure For Cloud Security 1st Ed Raghuram Yeluri
Cloud Security @ TIM - Current Practises and Future Challanges
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Cloud computing security - Insights
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Automated prevention of ransomware with machine learning and gpos
Ad

More from James '​-- Mckinlay (11)

PPTX
Cracking for the Blue Team
PPTX
Security at the speed of dev ops v3
PDF
40 things to do before you spend $1 on AI
PDF
Securing Smart Cities
PDF
cybersecurity-workforce-papers
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PDF
Metrics evolution breakfast edition
PDF
IGPC Data Breach Planning braindump
PDF
Living with Determined Attackers MOSI Edition
PDF
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
PDF
Living with the threat of Determined Attackers - RANT0214
Cracking for the Blue Team
Security at the speed of dev ops v3
40 things to do before you spend $1 on AI
Securing Smart Cities
cybersecurity-workforce-papers
BsidesMCR_2016-what-can-infosec-learn-from-devops
Metrics evolution breakfast edition
IGPC Data Breach Planning braindump
Living with Determined Attackers MOSI Edition
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
Living with the threat of Determined Attackers - RANT0214

Recently uploaded (20)

PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Geologic Time for studying geology for geologist
Convolutional neural network based encoder-decoder for efficient real-time ob...
TEXTILE technology diploma scope and career opportunities
A review of recent deep learning applications in wood surface defect identifi...
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Module 1 Introduction to Web Programming .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sustainability-14-14877-v2.pddhzftheheeeee
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
CloudStack 4.21: First Look Webinar slides
sbt 2.0: go big (Scala Days 2025 edition)
NewMind AI Weekly Chronicles – August ’25 Week IV
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
4 layer Arch & Reference Arch of IoT.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf

Good-cyber-hygiene-at-scale-and-speed

  • 1. Cyber Hygiene at speed and scale – How to Clean a Datacenter James Mckinlay – CSO Praetorian Consulting International
  • 2. #whoami  Electoral Role  Landline  Broadband  Mobile Phone  Gas Electric  TV licence  Passport  Inland Revenue  High Street Bank  Online Retailers  Online webmail  Companies House  Online accountant  Births & Marriages Register  Hospital records / GP records Husband, Father, Son Cyber Consulting <-IT Security <- IT Solutions https://uk.linkedin.com/in/jmck4cybersecurity  Shares / Child ISA  Pension  Car Insurance  House Insurance  Flight Records (ARINC)  Mortgage  Postcode Address File  University Records  Water / Utilities  Council Tax  Driving Licence  Car registration / car tax  Equifax Experian Callcredit
  • 4. @CisoAdvisor Actual Agenda * Very quick look at datacentre issues * My take on “Good Cyber Hygiene” * Once more unto the breach * Takeaways “Everything should be as simple as it can be, but not simpler”
  • 5.  (1) Before we go any further, I feel I should first point out that everything I’m about to say is obviously just my personal opinion, which you are of course entitled to take with the appropriate pinch of salt. I would expect that if you asked someone else who was considering the same points, they might have very different things that they are looking for.  (2) I am not currently in a UK Datacenter  (but …...) Disclaimer
  • 6. * Section 1: Data centres Revolution Quote 1: “You will not be able to stay home, brother. You will not be able to plug in, turn on and cop out. You will not be able to lose yourself on skag and Skip out for beer during commercials, Because the revolution will not be televised.” - Gil Scott-Heron (1949 –2011)
  • 7. Co-location (power & comms) Co-location (DRP site) Managed Service (physical) Corporate Servers (in house) Managed Service (virtual) Cloud (Public / Private) 19th Hole == DC3
  • 8. Co-location (power & comms) Co-location (DRP site) Managed Service (physical) Corporate Servers (in house) Managed Service (virtual) Cloud (Public / Private) 19th Hole == DC3 Managed Service (physical) Corporate Servers (in house) Managed Service (virtual)
  • 9. Co-location (power & comms) Co-location (DRP site) Managed Service (physical) Corporate Servers (in house) Managed Service (virtual) Cloud (Public / Private) 19th Hole == DC3 Cloud (Public / Private)
  • 11. Tier what ? Tier 1: Guaranteeing 99.671% availability. Tier 2: Guaranteeing 99.741% availability. Tier 3: Guaranteeing 99.982% availability. Tier 4: Guaranteeing 99.995% availability. Availability over Security The more secure you are, physical, environmental, configuration management, change management, release management, infosec signoff .... The better the availability !
  • 12. DC Problems External (public) DDoS on one customer affects all customers on a shared subnet External (partners) Third Party supplier access allows route into Managed Services and customer data Internal (bau) Managed Services network not secured adequately Managed Services network not split from corporate network Internal (strategic) Mergers & Acquisitions Business Transformation
  • 14. * Section 2: Cyber Hygiene Revolution quote 2: “The first revolution is when you change your mind about how you look at things, and see there might be another way to look at it that you have not been shown. What you see later on is the results of that, but that revolution, that change that takes place will not be televised.” - Gil Scott-heron (1949 –2011)
  • 15. Not talking about 27001 here ISO 27002 can be traced back to the British Standard 7799, which was published in 1995. Originally written by the DTI, after several revisions ISO took it on as ISO/IEC 17799. There was a second part to BS 7799 which formed the implementation of an ISMS. This element was what ISO 27001 became in November 2005 (therefore named ISO 27001:2005)
  • 16. So many to choose from  ACPO (DFIR)  AusDSD (ISPF) (ROSI)  CBEST  CIS (BM) (SM) (CSC)  COBIT4 & 5  CSA CCM  CPNI / CESG / CERT-UK  Carnegie Mellon CERT  EN16945 (NATS)  First.org  FCA  Gov.hk  HMG  ISO Standards, Frameworks and Good Practice guides  ISC2  ISF-SOGP  ISM3 Maturity Model  ISSAF  Microsoft  NARUC (Utilities)  NESA-IAS  NIST  OWASP  PAS-49  PCIDSS  SANS  Secure Pay Europe (ECB)  SOC I & SOC II reporting
  • 17. So many questions What if someone had reviewed them all and made a list of the Top 100 Cyber Security Questions to ask ? Cyber Security Perspectives http://usahuawei.com/wp-content/uploads/2014/12/Top100-cyber-security-requirements.pdf
  • 18. So to my favourites AusDSD T35 NSA T10 NSA Managed Network T20 CCv6
  • 19. bestest bestest favourite NSA Adversary Obstruction https://www.youtube.com/watch?v=bDJb8WOJYdA https://www.iad.gov/iad/library/reports/nsa-methodology-for-adversary-obstruction.cfm
  • 20. Inside favourite NSA Adversary Obstruction https://www.iad.gov/iad/library/reports/nsa-methodology-for-adversary-obstruction.cfm 1. Protect Credentials 2. Segregate Networks and Functions 3. Implement Host Intrusion Prevention System (HIPS) Rules 4. Centralize logging of all events 5. Take Advantage of Software Improvement 6. Implement Application Whitelisting 7. Install and correctly use EMET 8. Public Services Utilization 9. Use a Standard Baseline 10.Data-at-Rest and Data-in-Transit Encryption 11.Use Anti-Virus File Reputation Services
  • 21. Chart and project plan AusDSD T35
  • 23. * Section 3: Once more unto the ... Revolution quote 3: “There can't be any large-scale revolution until there's a personal revolution, on an individual level. It's got to happen inside first.” - Jim Morrison (1943 - 1971)
  • 24. New agenda Why it sits well with DC-MS Speed and scale Security Operations First Steps & Roadmap
  • 25. Service Delivery Why it sits well with DC-MS Work packages CAB CMDB tickets Service description Software library RCA Problem Management SLA
  • 26. VisualOps Why it sits well with DC-MS
  • 29. Concepts Easy to deploy, easy to operate MIG agents are designed to be lightweight, secure, and easy to deploy so you can ask your favorite sysadmins to add it to a base deployment without fear of breaking the entire production network. All parameters are built into the agent at compile time, including the list and ACLs of authorized investigators. Security is enforced using PGP keys, and even if MIG's servers are compromised, as long as our keys are safe on your investigator's laptop, no one will break into the agents. Fast and asynchronous MIG is designed to be fast, and asynchronous. It uses AMQP to distribute actions to endpoints, and relies on Go channels to prevent components from blocking. Running actions and commands are stored in a Postgresql database and on disk cache, such that the reliability of the platform doesn't depend on long-running processes. Speed is a strong requirement. Most actions will only take a few hundreds milliseconds to run on agents. Larger ones, for example when looking for a hash in a big directory, should run in less than a minute or two. All in all, an investigation usually completes in between 10 and 300 seconds. Strong security primitives Privacy and security are paramount. Agents never send raw data back to the platform, but only reply to questions instead. All actions are signed by GPG keys that are not stored in the platform, thus preventing a compromise from taking over the entire infrastructure.
  • 31. Gareth Rushgrove @ Puppet Labs
  • 32. Is it fast ? Does it scale ? Does it use python?
  • 33. Secure continuous delivery? Security Automation? Pipeline, CI, API, Monitoring?
  • 34. New thinking speed and scaleSpeed and scale Data Centre Cloud
  • 35. Build your own ? speed and scaleSpeed and scale
  • 38. First Steps – quick wins First Steps Managed data centre is perfect situation to install an run VMaaS Managed data centre is perfect situation to build a knowledgebase of awkward patches SOC members are perfect researchers for remediation work following VMaaS Managed data centre is perfect situation to link VMaaS to CMDB and CAB SCM operations are perfect for testing remediation work
  • 39. First Steps – quick wins Future Steps SCM can correlate software asset records SCM can maintain baseline security SCM can query system for files, hashes, registry entries SCM can collect local admin details SCM can collect local USB usage
  • 40. Summary  It is in a Data Centre’s best interest to be more secure because that helps availability !!  IT Ops, Security Ops and Security Management (compliance) need to work closer together  SOC / SecOps doesn’t have to be about incident response in can also be incident prevention  If you have outsourced hosting and infrastructure management – why not add VMaaS and Remediation activities !
  • 41. Takeaways  Take “Fix the basics” seriously we’ve had years to get this  Get started if you haven’t already  Use what has been learnt from years of vulnerability assessment and patch management and device hardening  Tailor it to your organisation (size and maturity)  Learn from other disciplines (collaborate or die)  Challenge Managed Service providers to do more security Network with likeminded peers
  • 42. Time is precious thank you for yours James