SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Liz McMillan, William Schmarzo, Dana Gardner

Blog Feed Post

A Security Twist.

https://www.ingrainedtech.com/wp-content/uploads/2018/01/ship-661630_192... 768w, https://www.ingrainedtech.com/wp-content/uploads/2018/01/ship-661630_192... 1024w, https://www.ingrainedtech.com/wp-content/uploads/2018/01/ship-661630_192... 1600w" sizes="(max-width: 300px) 100vw, 300px" />
USS Constitution

Like most of you, I am not a dedicated security person, but security duties have fallen to me in one form or another at almost every role I’ve filled. The fact is that all of IT is involved in security, whether we acknowledge that fact or not. This was true before DevOps, and it is more true in a DevOps environment, where an already overtaxed security group needs to show developers and ops members of the DevOps teams what to do, rather than do it all themselves. Because DevOps creates more work for security, just by virtue of releasing more often and speeding the rate of change.

If you are like me, the last year or two of your security mind-share has been focused on the crazy rate of change in the average IT environment. There seems to be something new to worry about just about every month, and there have been some spectacular failures to show that we really do have to worry about them.

So the announcement of ages old pre-execution bugs in just about every chip on the market was an unwelcome surprise, no doubt for you as well as me. And it’s a surprise we were highly unlikely to have discovered independently, no matter how good our security team. I’m an architecture aficionado. I like to write compilers and linkers as a hobby, so knowledge of the workings of CPUs is kind of part of the pool of required knowledge. And I had zero reason to suspect this was an issue.

Which brings me to the current direction my thoughts are taking. What else do we not know? How can we plan for such broad issues?

I fear the answers to those questions are a whole lot (feel free to insert an expletive here), and Not much (feel free to sigh when you say that). We are dependent upon an insane number of other engineers/developers and their security practices, simply in the process of keeping the IT lights on. From chips to OS to VMs and containers to libraries to apps to hosting providers… You name it, our infrastructure relies on others. And we don’t really know the level of security acumen they applied most of the time. If you’ve been in IT for very long, you’ve seen an instance of a vendor doing something that is definitively unsafe, and that’s just the ones you see.

So what can you do? I honestly don’t have an answer to that at this point, but it’s a problem that we are increasingly going to have to deal with. Internal configuration and coding errors create vulnerabilities, but so do internal coding errors for the products we use. I’m beginning to suspect we only think our devs are creating more of them because we can actually see when our devs create them. In this regard, at least Open Source lets us look, but even the much touted “anyone can look at and update the code” is not reality. How many open source products do you use? How many of those have you done a thorough code review for? A small number of orgs can claim “all the critical ones”. I don’t think any org can claim 100% coverage of source for 100% of Open Source apps in use. So again, you are counting on others and their acumen. “Someone looked at the Open Source”, you tell yourself. I would argue that Heartbleed proves that is not always true.

I guess the best you can do is prepare to be boarded. Arm the troops and watch the main sail, so rigging doesn’t get snagged. In other words, expect a vulnerability you are not aware of in someone else’s code will eventually get you, and have a reaction plan in place. That’s about the best we have, for now.

Read the original blog entry...

More Stories By Don MacVittie

Don MacVittie is founder of Ingrained Technology, A technical advocacy and software development consultancy. He has experience in application development, architecture, infrastructure, technical writing,DevOps, and IT management. MacVittie holds a B.S. in Computer Science from Northern Michigan University, and an M.S. in Computer Science from Nova Southeastern University.

Latest Stories
Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, software-defined solution with rich machine ...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
Wasabi is the hot cloud storage company delivering low-cost, fast, and reliable cloud storage. Wasabi is 80% cheaper and 6x faster than Amazon S3, with 100% data immutability protection and no data egress fees. Created by Carbonite co-founders and cloud storage pioneers David Friend and Jeff Flowers, Wasabi is on a mission to commoditize the storage industry. Wasabi is a privately held company based in Boston, MA. Follow and connect with Wasabi on Twitter, Facebook, Instagram and the Wasabi blog...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Inzata is a powerful, revolutionary data analytics platform for integrating, exploring, and analyzing data of any kind, from any source, at massive scale. Powerful AI-assisted Modeling and a patented analytics engine help users quickly load, blend and model raw and unstructured data into powerful enterprise data models, actionable real-time analytics and engaging visualizations. Go beyond spreadsheets and slides and compose a powerful narrative about how your business is performing, and how y...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail. As ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundat...
Big Switch's mission is to disrupt the status quo of networking with order of magnitude improvements in network e ciency, intelligence and agility by delivering Next-Generation Data Center Networking. We enable data center transformation and accelerate business velocity by delivering a responsive, automated, and programmable software-dened networking (SDN) fabric-based networking solution. Traditionally, the network has been viewed as the barrier to data center transformation as legacy networkin...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...