Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

09:40 AM
Connect Directly

DevOps' Inevitable Disruption of Security Strategy

Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.

With DevOps principles taking root and reaching greater maturity at an increasing number of enterprises today, security strategists are in for some major disruption of the status quo in the coming years. That's the message being brought forward by a number of talks at next month's Black Hat USA, which will feature discussions on the impact that DevOps-driven practices and tools will have on the security world.

"The way software is being delivered is fundamentally changing. Security, frankly, just has to catch up," says Kelly Shortridge, vice president of product strategy for Capsule8, who will be co-presenting a talk titled "Controlled Chaos: The Inevitable Marriage of DevOps & Security." "There is almost a Copernican revolution right now where the primitive models that we've held dear for decades and are the basis for a lot of security strategies no longer apply to this cloud and microservices world. So we have to rethink things in a lot of ways." 

One of the most obvious fronts needing rethinking is with containerized workloads, which are self-encapsulated instances of application components that are changing the face of IT architecture. Containers aren't explicitly a DevOps tool per se, but the DevOps philosophical push to make small, incremental changes to software through automation and microservices — breaking up large applications into smaller, reusable chunks — has been a catalyst for recent container adoption.

On the whole, enterprises are experiencing a stratospheric explosion in containers and an increasing reliance on container orchestration tools as a crucial part of the software delivery and operational toolchain. As evidenced by sessions scheduled at Black Hat, security researchers are already starting to probe the security and resilience of containers and container orchestration platforms like Kubernetes. For example, Ian Coldwater, lead platform security engineer at Heroku, and Duffy Cooley, staff cloud native architect at VMware, will present "The Path Less Traveled: Abusing Kubernetes Defaults," a talk that will explore the attack surface exposed by running a default configuration of Kubernetes — essentially exploiting the as-designed features of the platform. 

Early exploration and research such as this notwithstanding, the average security practitioner still remains largely in the dark about container architecture, its unique peccadillos, and its inherent risks, says Shortridge's colleague, Brandon Edwards, chief scientist for Capsule8.

"A lot of people sort of just group them up with [virtual machines] or similar technology, but they're not,” says Edwards, who is co-presenting his own talk, "A Compendium of Container Escapes," which will offer a primer for security professionals to get their arms around the basics of the container attack surface. "Containers have completely different security properties, so we're just going through a variety of different ways of how they can be broken and where the security properties of containers exist and where they don't."

Edwards will also bring forward some predictions about the kinds of hacks and vulnerabilities we're likely to see in the next 12 months as security researchers and attackers start truly digging into containers.

The mystery of containers for security people is a microcosm of the larger ripples caused by the disruptions wrought by rapidly changing software delivery methods. Security teams struggling to keep up are still wont to apply old models to the new technologies, which comes down to misperceptions about them, Shortridge says. For example, the false equivalency that Edwards mentioned about containers being perceived as lightweight virtual machines will throw off strategists' thinking. 

"So if you're operating off that assumption, then your threat models are going to be all wonky and wrong — particularly if you weren't mapping the workloads and understanding how different systems are working with each other,” she says, explaining that misunderstandings about new technologies also lead to a naïve belief that old technologies can be ported to these modern systems. "So they might think, 'Is there a firewall just for containers?' But that doesn't make any sense, and it's not what we actually need." 

That lack of understanding is a microcosm of the larger industry ripples caused by DevOps software delivery methods.

The good news is that for security people who can accept this is where IT is going and are willing to make the pivot to support it, it quickly becomes apparent that DevOps practitioners share many of their goals and that the new mode can open a lot of opportunities to simplify security work, Shortridge explains. This includes foundational principles like system resilience, repeatability, and traceability of processes. She says that the security triad of CIA — confidentiality, integrity, and availability — is likely to morph into what she calls the DIE triad in the modern DevOps world: distributed, immutable, and ephemeral. 

"They roughly involve the same characteristics. Distributed computing is similar to availability — you want to make sure that none of your resources are centralized," Shortridge says. "For immutable, that's like integrity. You want to make sure that data stays the same, right? You don't want tampering or modification. And then for ephemeral, you also want to try to drive the value of assets down to zero, to make persistence less valuable, which you can do with a modern infrastructure. In a lot of ways, your job as a security person becomes a lot easier under this paradigm." 

Related Content:





Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...