Inspired by Justin Garrison, I’m sharing a log of all my CFP submissions.
Slides are available for all given talks over on SpeakerDeck.
Table
Proposals
2024
Lessons in Security Partnership
Abstract
As security moves beyond the “Department of No,” partnership has become core for baking security into software. However, security teams are often reinventing and rediscovering partnership skills from scratch. This talk will use personal narratives of effective and ineffective partnerships to teach how to build a proactive and collaborative relationship between Security and its key stakeholders. Learn from my mistakes. Leave this talk empowered and informed with specific tactics to build focus, leverage, and alignment.
Outline
Rough initial outline:
- Story 1: An story of bad Security Partnership, told via slack screenshots.
- Introduction: Security Partnership
- Engagement Models: Consultative, Embedded, Champions. Proactive, Reactive.
- The stakeholders in Security Partnership: Eng ICs, PMs, Eng Leaders, Security
- Building a foundation for partnership
- Understand engineering processes
- Understand the product and the business
- Credibility: gained in ounces, lost in pounds
- Relationship: built through the proactive partnership
- The role of shadowing and onboarding
- The role of internal standards
- Story 2: Successful partnership - patch management, aligning on timelines and mitigating controls. Leveraged credibility on risk, relationship for transparency on constraints and timelines, and understanding the engineering for a mitigation
- Handling Stakeholders: learn to speak their language
- PMs want predictability and clean interfaces, and care about product requirements
- EMs/TLs want predictability, and care about technical requirements
- Eng ICs care about implementation details
- Visualization: right point of contact for various elements of partnership
- The role of standards
- blind application, and inconsistent application both have risks
- goal is to reduce amount of direct partnership
- “every consultation is a failure”
- hook into existing processes, like design document templates
- follow engineering processes within security to ensure you dogfood your changes
- Communication guidelines
- communicate with empathy
- realistic trade-offs
- vulnerability impact without jargon
- reward communication with the team
- Story 3: multi-quarter CI/CD security project with many stumbles but ultimate success. Share initial failures, and their resolution:
- initial alignment on design wasn’t captured in a design document or security review
- security controls were tracked on the partner teams board, losing security visibility
- numerous controls requested, but no overall threat model or risk prioritization
- no milestoning or incremental delivery of security requirements
- lack of defined ownership for implementation, handoff/stabilization, maintenance
- Partnering - reactive
- Discovery: build trust and show that the security team has build strong context
- Setting security requirements and acceptance criteria
- Giving options can cause confusion over clarity. Give them in conversation, but always document a decision
- Resist the urge to ask teams to address related security debt
- Story 4: Internal tooling - client side redaction as a defense-in-depth mitigation. poor documentation of that decision. engineers notice months later and remove the tool in concern.
- Getting agreement
- broad and collaborative framing, leaving space for creative solutions
- talk in terms they care about
- minimize work on their part
- risks of asymmetric work, and the role of IOUs
- center impact on people
- “this is how it looks to me. Can you understand what I’m seeing? Is that how it looks to you?”
- Getting the work done
- what you do, what they do, what doesn’t get done
- varied cost of action - the closer aligned to role, the faster the work will be to do
- Be helpful, but be careful: you want to make sure ownership lands somewhere sustainable and the relationship stays balanced
- handshake agreements don’t work, here’s why
- Providing feedback
- security should bear the burden of false positives
- accountability and the Principal–agent problem
- Story 5: bug bounty report of lack of rate limiting on an endpoint. checked design document, and it had been called out.
- make sure changes to acceptance criteria get backported to documentation as such
- Escalations
- too many escalations are a sign of dysfunction
- Story 6: suggested escalation received as conflict versus a means of prioritization
- clean escalations: background, alternatives, tradeoffs described using neutral language, ideally make a recommendation - else highlight who prefers which paths forward
- everyone involved should agree on framing
How to 10X Your Cloud Security (Without the Series D)
Abstract
I’ll summarize and distill the actionable guidance for scaling Cloud Security programs from the vast array of talks and blog posts our there. We'll blaze through a dense view of what cloud security is, how you can do it more effectively, and what the near future looks like. After the talk, you'll have practical takeaways, and a lengthy, curated bibliography to lean on.
Outline
This is a blatant rip off of Clint Gibler’s BSidesSF 2020 talk, but focused on cloud security programs (he’s cool with it!): https://docs.google.com/presentation/d/1lfEvXtw5RTj3JmXwSQDXy8or87_BHrFbo1ZtQQlHbq0/edit
I’ve given a series of previous talks that lend themselves to this work:
- https://speakerdeck.com/ramimac/aws-security-easy-wins-and-enterprise-scale in 2020
- https://speakerdeck.com/ramimac/cloud-security-orienteering in 2021
- https://speakerdeck.com/ramimac/beyond-the-aws-security-maturity-roadmap in 2023
This talk will focus on a similar set of assumptions, mindset, and principals as Clint’s talk, but applied to Cloud Security.
We’ll go through a program, and highlight the best existing evidence of high leverage opportunities to scale cloud security.
Take a small example:
- service allowlisting massively reduces the area you need to control: https://ramimac.me/aws-allowlisting
- once you have service allowlisting, you are in place to review new services. how do you do that effectively? What can we learn from TrustOnCloud’s threat model approach, Sp0oKeR’s approach to detection engineering for obscure services, and Wiz’s Cloud Threat Landscape?
We’ll cover over a dozen such tactics, building on the amazing work in the cloud security community to provide a centralized resource that can serve both folks just starting out, and those of us expanding sophisticated programs.
The Path to Zero-Touch Production
Abstract
Zero Touch Prod is a Google-ism, and also a good idea. It's common that engineers, even at companies with strong security programs and cloud-native architecture, organically evolve operational processes that require they touch production daily.
As security practitioners, it's our job to keep our companies safe - both from bad actors, and also humans making mistakes. Allowing humans to work directly in production infrastructure introduces mitigable risks.
This talk shares my universal theory of how to incrementally and collaboratively move a cloud-native organization to Zero Touch Prod. We'll talk about why people touch prod, how they touch prod, and what we can do about it. I'll include a summary of the various production access primitives available in AWS, when to use them, and how to do so safely. We'll dive deep on the implementation options for building blocks like JIT/Temporary Access and operational script running.
Wherever you are in your Access Journey, you'll walk away with practical and pragmatic next steps
Outline
CloudSec often involves taking your company from “ssh over the internet” to “zero trust” (always with some warts, exceptions).
This talk synthesizes my knowledge on how to move a company to Zero Touch Prod. The rough outline:
## Intro (5m)
### Touching Prod
- you start with SSH to production boxes
- Maybe, you move this to SSM to production (nop more internet exposure) or a bastion host
- Engineers are often touching production for good reason
### Introduce Zero Touch Prod
- https://www.usenix.org/sites/default/files/conference/protected-files/srecon19emea_slides_wolafka.pdf
### The values behind a push for Zero touch production (5m)
- You need to consider your organization, and DevEx
- This is the type of problem that needs a solution deeply integrated to your organization’s values, roadmap, and operational practices
- Some examples of values tradeoffs:
- Carrot or stick on migration - are new solutions available for adoption in parallel, or hard cut over?
- paved roads or goat paths - do you build based on common paths, or do you build cars (not faster horses)
- how early do you launch? how does that impact change fatigue?
- do you build generic mechanisms that might not remove 100% of a given user profile’s needs, or do you build against removing specific user cohorts from prod access?
### Taxonomy of production access needs and the utilities that can address them (5m)
- Script running - predefined command or set of commands with allowlisted or safe arguments or parameters
- Scheduled Jobs - asynchronous, recurring, also backfills
- Easy UI-based Internal Tools
- A Workbench, with a predefined framework for pushing data from production
- Read-only access to safe subset of production data (e.g analytics)
- Break-glass JIT/Temporal Access
### AWS Primitives & Vendor options (10m)
- ex. Port Forwarding https://ramimac.me/ssm-iam
- ex. RDS IAM auth - https://ramimac.me/rds-iam-auth
- ex. RunCommand docs as script runner
- ex. AWS Verified Access (Cloudflare Access, Okta ASA, ZTNA tools)
- https://speakerdeck.com/ramimac/beyond-the-aws-security-maturity-roadmap?slide=34
#### JIT Access (5m)
- Synthesis of https://ramimac.github.io/wiki/jit-cloud-access/, basically
### Case Studies in DevEx for AWS Primitives (5m)
- Using a browser extension to guide people to refresh Identity Center sessions, fix the gross AWS SSO click throughs
aws-vault
, granted
, etc. – a single opinionated cli flow
- wrapping ^ so you can add: smart role selection, integration to your JIT tool, smart guidance based on error codes
- offering a single cli for production access – don’t expose SSM vs. EC2 Instance Connect etc. to end users
- This all is important because: 1) It allows you to make implementation changes without interface changes, 2) It allows you to hide the complexity of the underlying granular IAM, 3) it improves discoverability, 4) it can counteract change fatigue
Abstract
This talk will break down the controls and compromises in a real world deployment of a Hybrid SaaS architecture for Terraform Automation. It will show how to make such a system both secure *and* user-friendly.
Description
Hybrid SaaS balances a SaaS control plane with customer managed compute. It offers a solution for security conscious customers to take advantage of some of the ergonomics of SaaS, without outsourcing as much of the risk of the system. This has become particularly popular with the rising concerns around vendor compromise. There is a standard security architecture emerging for these systems.
This talk will break down the controls and compromises in a real world deployment of a Hybrid SaaS architecture for Terraform Automation. It will both discuss the standard security model of hybrid SaaS, and also how to maintain a high security bar for Terraform Automation without accepting the developer experience compromises of other solutions.
Previous talks and research, including the excellent Attacking and Defending Infrastructure with Terraform: How we got admin across cloud environments
at BSidesSF2022, focus on the security risks in Terraform Automation. However, that talk and the general guidance tends to rely on limiting who can interact with your terraform automation - for example by limiting who can run a Plan - as a core security control.
At Figma, we’ve deployed a system that leverages compensating controls to mitigate the risks without erroding developer experience. This is tightly coupled to our use of Hybrid SaaS.
The talk will specifically cover Terraform Automation security model (using Spacelift), and will pull in our experience securing Buildkite - another Hybrid SaaS system - to show how many of the lessons can be generalized across Hybrid SaaS.
While the talk will mention these specific vendors, the goal of their inclusion is to give specific context on the available risks, controls, and limitations provided as Hybrid SaaS. The talk will explicitly call out that alternative vendors for Terraform Automation exists, and controls - as a benefit of hybrid SaaS - should not be specific to Spacelift customers but generally applicable.
Outline
## Introduction - 5m
- Refresher on Terraform Architecture (ex. https://spacelift.io/blog/terraform-architecture)
- Specific mention of third party modules and providers
## Attacking Terraform Automation - <10m
- Review of Terraform Automation (including mention of various vendor and OSS solutions)
- Review prior art on attacking Terraform Automation (with “demos”/recordings/visualizations of attacks)
- Malicious providers and modules
- https://about.gitlab.com/blog/2022/06/01/terraform-as-part-of-software-supply-chain-part1-modules-and-providers/
- https://sprocketfox.io/xssfox/2022/02/09/terraformsupply/
- RCE in Terraform Plan / “Apply-in-Plan”
- https://cloud.hacktricks.xyz/pentesting-ci-cd/terraform-security#rce-in-terraform
- https://youtu.be/yt-3ndhMMn8?si=wC1Rt1F8NEXLzUEb&t=1006
- Secrets in State Files
- “Task Runs”
- https://developer.hashicorp.com/terraform/cloud-docs/architectural-details/security-model#what-isn-t-part-of-the-threat-model
## Hybrid SaaS - <10m
- SaaS control plane, customer owned compute
- Pros / Cons
- Increased customer ownership/control of security is both
- “can we do security better than the vendor”
- “how sensitive is this system to risks with multi-tenancy”
- Increased management overhead -> “potential worst of both worlds in paying for SaaS and also having to manage compute”
- Examples at Figma
- Security model
- specifically: highlighting signed payloads as a core element
- https://buildkite.com/docs/agent/v3/securing#signing-pipelines
- https://docs.spacelift.io/concepts/run/#zero-trust-model
- discuss “how to decrease trust in the control plane” as a driving motivation
- Secrets management
- Prioritize putting security in the worker, not the control plane. The latter can be ignored on compromise
- IAM -> Figma’s CI Credential Exchange for Buildkite, OIDC-based assumption for Spacelift
## Securing Spacelift @ Figma
- Four threats
- “proposed runs” -> if you can put up a PR, you can run a Plan
- compromise of engineer session on control plane
- compromise of admin session on control plane, or Spacelift itself
- “tracked runs” -> if you can get code in
master
, you can run an Apply
- Threat 1 is “outside the security model” for Terraform Cloud, and is often framed as untenable (i.e Mike’s talk)
- What do you do if you refuse to compromise on the DevEx of allowing anyone to see a Plan of their changes
- Controls
- Lean on Github Approvals + proprietary Commit Integrity (signing, validation)
- Private Worker Pool -> Spacelift has no direct permissions in Figma’s AWS infrastructure
- Account level isolation of these workers
- Worker side validation of all commits sent to workers via Github APIs
- Permission Segmentation between Plans and Applies
- Sandboxing of “runs” as a core enabling architecture
- Next Step –> roll our own Stack level isolation using OIDC
- Semgrep for static analysis to attempt to detect known RCE patterns, with alerts on violation
- Next Step –> Migrate to REGO with
spacelift-launcher --run-initialization-policy
- Spacelift Policies - role based approval
- ergonomics -> Auto-Approval allowed where safe!
- opal -> JIT access to approval groups
- Securing the configuration definition with Commit Integrity
- note: figma doesn’t enforce code ownership, reference devex tradeoffs in Github “stale approvals”
- RBAC in control plane to limit risk of engineer compromise
- Disable “Task Runs” (RCE-as-a-service) both control plane and worker side
- JIT authorization + detective controls for Admin actions
- Vendor all terraform modules, semgrep to warn at PR time
- Minimize providers per-state to minimize risk of provider takeover
- Use a mirror for all Terraform providers
- Do not store secrets in state. Implemented secrets scanning for terraform state
- Pin “worker image” in case of Spacelift compromise
- TF_LOG -> Check in pre-init, unset if it’s a dangerous value
Panther rules
- Stack modified by unexpected principals
- New API keys // Actions from API keys
- New AWS integrations // task runs
High Integrity
- runner image from our ECR repo
- only master tracked runs, only our main repo
- must have run static analysis in pre-init
- ban task runs
- distinct worker pool
- more aggressive alerting on control plan logs
2023
Beyond the Baseline: Horizons for Cloud Security Programs
Abstract
There is a definitive resource for cloud-native companies to build a security program and posture in AWS: Scott Piper’s AWS Security Maturity Roadmap. However, mature programs quickly progress past the end of Scott’s roadmap. In this talk, I’ll take you on a rapid fire tour beyond the end of the roadmap, focusing on the problems you’ll encounter scaling a cloud security program. A key framework will be “build versus buy,” and the talk will be opinionated about where cloud security teams can fall into the trap of undifferentiated work. The goal is to leave you with a clear view of the possibilities at the leading edge of cloud security, risk-informed guidance on priorities, and a crucial new reference for writing cloud security roadmaps.
Outline
- This talk will heavily leverage content from Beyond the AWS Security Maturity Roadmap, which I presented at fwd:cloudsec 2023. I’ll be adding an additonal half-dozen controls/program elements that were cut for time in the 30m version, and expanding the amount of context setting to suit a slightly broader audience. This will still be an “advanced” talk that focus on mature programs, but as a survey of those programs still offers interest and accessibility for audience members who aren’t working on cloud security directly.
- The talk leans practical and actionable, focusing on technologies and controls that can be implemented today, in real businesses, at real scale.
Rough outline:
Context: 12m
- Biases on “the sort of cloud security program” I’m talking about: engineering oriented security program, zero trust, selling a software product
- The baseline - a quick overview of what is already assumed based on Scott’s Cloud Security Maturity roadmap
- The Netflix influence
- “Netflix exists in order to spite the gods, copy them not”
- To break it down: many of the solutions shared are built with constraints and opportunities that make it not apply to you
- Netflix: predates many managed services, oss offerings, and cloudsec products. they have scaled past the utility of many off-the-shelf solutions. they have enormous data gravity and have to hack around their account architecture.
- When I joined Figma, the pitch was - “we’ve shipped the roadmap, help us figure out what’s next.” As an example of where the program was at - refer to MaxB’s 2021 fwd:cloudsec talk
- Build v. Buy
- The type of cloudsec team with engineering capabilities has this option
- In many cases, just a few years ago the only option would be to Buy
- Framework from Sabry Tozin
- Are we solving a problem unique to our company?
- Are we solving a problem at a scale unique to company?
- Is the cost and effort of integrating an off-the-shelf solution so large that we may as well build one?
- What are the purchasing/ongoing license costs of the product in comparison to building it ourselves?
1. ref: https://boringappsec.substack.com/p/edition-9-a-build-vs-buy-framework
- Bad reasons: Buying to de-risk, Building for vanity
- be pragmatic about security risk in involving a 3rd party in this solution
Meat: 25m
We’ll talk about the problem space as you scale and give specific open source and popular-in-peer-companies commercial solutions to:
- Asset inventory / continuous compliance
- Secrets Management
- Secure IAC modules
- SSH replacement
- Least Privilege / IAM
- Account management, vending, and sandbox accounts
- DFIR
- Automated remediation
- Runtime Security
- Endpoint Monitoring
- Egress / Perimeter (data, network)
- Honeytokens
- etc.
Beyond the AWS Security Maturity Roadmap
Abstract
Scott (Piper)’s [AWS Security Maturity Roadmap](https://summitroute.com/downloads/aws_security_maturity_roadmap-Summit_Route.pdf) is the definitive resource for cloud-native companies to build a security program and posture in AWS. It does an amazing job at providing broadly applicable guidance along the maturity curve. However, for many fwd:cloudsec attendees the roadmap ends too soon.
Similar to Scott’s Roadmap, in my experience there is a set of technical capabilities and controls that companies consider once they’ve “shipped the roadmap” (either by following it directly, or through parallel construction). In this talk, I’ll take you on a rapid fire tour beyond the paved road. We’ll focus on the problems you’ll encounter scaling an AWS security program, and bring together dozens of examples of how other companies have tackled these challenges, comparing their approaches. A key framework will be “build versus buy,” and the talk will be opinionated about where cloud security teams can fall into the trap of undifferentiated work.
The goal is for us all to walk away with a clear view of the possibilities at the leading edge of cloud security, risk-informed guidance on priorities, and a crucial new reference for writing cloud security roadmaps.
Outline
This talk will respect the fwd:cloudsec audience, and take Scott’s roadmap as lingua franca.
Outline:
Context: 6m
- Biases on “the sort of cloud security program” I’m talking about: engineering oriented security program, zero trust, selling a software product
- The Netflix influence
- “Netflix exists in order to spite the gods, copy them not”
- To break it down: many of the solutions shared are built with constraints and opportunities that make it not apply to you
- Netflix: predates many managed services, oss offerings, and cloudsec products. they have scaled past the utility of many off-the-shelf solutions. they have enormous data gravity and have to hack around their account architecture.
- When I joined Figma, the pitch was - “we’ve shipped the roadmap, help us figure out what’s next.” As an example of where the program was at - refer to MaxB’s 2021 fwd:cloudsec talk
- Build v. Buy
- The type of cloudsec team with engineering capabilities has this option
- In many cases, just a few years ago the only option would be to Buy
- Framework from Sabry Tozin
- Are we solving a problem unique to our company?
- Are we solving a problem at a scale unique to company?
- Is the cost and effort of integrating an off-the-shelf solution so large that we may as well build one?
- What are the purchasing/ongoing license costs of the product in comparison to building it ourselves?
1. ref: https://boringappsec.substack.com/p/edition-9-a-build-vs-buy-framework
- Bad reasons: Buying to de-risk, Building for vanity
- be pragmatic about security risk in involving a 3rd party in this solution
Meat: 14m
We’ll talk about the problem space as you scale and give specific open source and popular-in-peer-companies commercial solutions to:
- Asset inventory / continuous compliance
- Secrets Management
- Secure IAC modules
- SSH replacement
- Least Privilege / IAM
- Account management, vending, and sandbox accounts
- DFIR
- Automated remediation
- Runtime Security
- Endpoint Monitoring
- Egress / Perimeter (data, network)
- Honeytokens
Level Up Your Career: A Panel on Staff+ Engineering
Abstract
What does it mean to be a Staff+ engineer in security, and how can you get there?
Come hear our panelists discuss what it's really like, how you go from Senior to Staff, or whatever you want to learn more about. Ask Us Anything - seriously, anything, even about putting the cyber in space.
Outline
This panel will gather several of the participants of https://tldrsec.com/guides/staffeng-security and build on that work. We hope to continue the discussion of Staff+ Engineering in Security and offer an opportunity for the BSidesSF community to have a conversation with a broad set of security engineers who have reached these roles.
outline
We’ll start with a quick introduction,which means each panelist gets 90 seconds to pitch themselves. We’ll open up with some crowdsourced and pre-seeded questions to get the discussion going, covering topics like (example questions):
- What’s a week like as a Staff+ engineer?
- What are the hardest parts of being a Staff+ engineer?
- What should you do if you feel “stuck” at Senior?
- What about your Staff+ journey or role is specific to Security?
- Is there an IC/Manager Pendulum in Security?
- What comes after Staff+ for you?
After that we’ll open the floor to questions from the conference participants. We believe this format will:
- Allow panelists to set shared context on Staff+ Engineering roles in security
- Share some of the key takeaways and themes from https://tldrsec.com/guides/staffeng-security
- Provide plenty of opportunity for conference participants to engage in a BSidesSF specific discussion
2022
Buying Security: A Client’s Guide
Abstract
You can’t buy security, but vendors play a key role in effective security programs. This talk will provide a comprehensive guide to buying and getting value, based on experiences on both sides of the marketplace, a comprehensive literature review, and a survey of clients and vendors of all stripes.
Outline
Elevator Pitch
You can’t buy security, but vendors play a key role in effective security programs. This talk will provide a comprehensive guide to buying and getting value, based on experiences on both sides of the marketplace, a comprehensive literature review, and a survey of clients and vendors of all stripes.
Talk Description
A detailed outline and the key takeaways for your presentation. Tell us more details about your presentation and why people will want to attend. These details will help us make an informed
decision about your submission.
- You can’t buy security, but security services vendors play a key role in effective security programs. They can offer much needed staff in the current tight market for experienced talent and bring expertise that is not cost-effective to maintain in-house. Vendors are also engaged for the growing requirements of compliance and standards. A third-party can provide objective feedback and bring broad industry context to bear.
- This talk will provide a comprehensive guide to buying and getting value from security services. The content comes from experience on both sides of this marketplace, a comprehensive literature review, and a survey of clients and vendors of all stripes. We’ll discuss the
landscape of vendors and engagements, and go through a structured approach to buying security. We’ll step through deciding you need security services, contracting, processing the results and moving your security program forward.
- Shopping for and deriving value from these vendors is becoming a core competency for security professionals. This is an area many organizations struggle due to information asymmetry, difficulty of assessing performance and quality, and infrequent or limited awareness
of the breadth and quality within the market. Combined with misleading sales tactics and a lack of standardization on delivery, this overwhelming marketplace, now with even more alternatives to traditional single-vendor assessments - buying a decent security engagement is harder than ever.
Notes
Note: I’m able to present this as a 25 minute talk instead. It’d be tight with the target breadth, and so will likely focus heavily on survey results instead of comprehensive procedure.
Why this?
To some extent, this topic sounds like well tread ground, but there are a number of distinctive elements that make this worth sharing:
1. It’s vendor agnostic: While I have a background as a Security Consultant - I am explicitly disinterested in discussing specific vendors, even implicitly. Roughly ⅔ of the 50+ sources reviewed for this material came from vendors attempting to sell their services.
2. It’s built on a comprehensive literature review:
I’ve read and compiled a massive amount of similar work, all of it flawed in various ways. This includes everything from vendor and client blogs, to standards attempts (PTES), analyst works (Gartner), and authoritative guides (CREST, NCSC). This talk functionally is a superset of all the best guidance available today.
3. It includes the data from a survey: I’ve been working with Clint Gibler (tldrsec.com) to develop this content, which will include a survey. I’ve already received some great content from everyone from Directors at FAANG to first security hires to solo consultants and folks from the big security services vendors. Taking advantage of TL;DR Sec’s community of 8,000+, I’m confident there will be some excellent takeaways to share. If accepted to BSidesSF, I will hold off publishing the longform written version in conjunction with my talk.
Why me?
I’ve spoken previously at multiple BSides events (CT 19+20, Boston 20) as well as DEFCON Cloud Village 2021. I’ve supported, sold, and delivered dozens of security assessments, and then went in house and bought services as a Staff Eng. at a scale-up startup. I create comprehensive and objective content that is deeply seated in prior art - such as: https://tldrsec.com/blog/cloud-security-orienteering/ and https://research.nccgroup.com/2020/04/24/the-extended-aws-security-ramp-up-guide/
Outline
An outline of the non-survey content:
- Types of Security Services
- Common motivations, and impact on vendor selection
- Compliance, Sales, Investment or M&A, internal attestation, post-breach, risk reduction
- Types of Security Services Vendors
- Global/enterprise consulting, cyber security services,
boutique (or regional), specialty, sole practitioner (researcher/bug
hunter), low cost, MSSP, VAR
- How to find potential vendors
- Network recommendations, follow-the-leader (industry
endorsements), research, conference speakers, published research, public reports, compliance approved, assessment standards work, prominent
staff, certifications, analyst recommendations
- Client-side scoping and requirements
- Requesting and reviewing proposals
- Running an RFP: what to ask vendors, what to expect
- Vendor-side scoping
- Contracting
- Quotes, negotiation, vetting, rules of engagement, common clauses, change orders
- Pre-assessment preparation
- Technical, onboarding, logistics
- After the assessment
- The readout, how to read a report, ingesting the results to the organization
- What comes next
A proposal on expected survey content:
- High-value topics for compiled data include:
- Pricing (bucketed, day-rate focused)
- Contracting (key terms)
- Negotiating
- Scoping
- Consulting Program Management
- “Pull quotes”/specific interesting responses - ex from the current preliminary sample:
- Notes on a bakeoff held between consultancies by a high-profile buyer
- What a former consultant has found buyers value that he didn’t appreciate
- Takeaways from selling millions in services to enterprises
- The perspective of a small VAR selling
Key takeaways will be focused on making audience members aware of the breadth of the industry, and understand how to introspect on their needs, use that to generate a list of potential vendors, and them make an informed decision on contracting. For those who have never bought security services it will take them from 0-60, and for professionals who have bought engagements it will interrogate their assumptions on the quality of their procurement.
Steal this Security Program
Abstract
Bezos coined "undifferentiated heavy lifting" in 2006 to describe the "muck" Amazon handled for developers. Security is an industry mired in the muck. No matter the company, there are endless possible activities the security team can tackle. Implementing a baseline program and posture is a significant challenge. Much of this work is common, and has been solved many times before. Thankfully, security is an industry full of organizations and individuals that embrace knowledge sharing. Security is not a zero-sum game, and we can all stand on the shoulders of giants.
Whether you're the first security hire at a startup, or part of a large enterprise program, you're resource constrained. Leveraging public resources for your security program is a maturity shortcut, albeit one with many pitfalls. Security has long been characterized as a "market for lemons," and this is true even of free resources. This talk will separate the signal from the noise and highlight the best public resources you can use to build out your security program.
Outline
Intro
- About Me
- Undifferentiated work
- What is it? What does it look like?
- ex. Dumb Security Questionnaires (https://latacora.micro.blog/its-weird-to/)
- Differentiated: your risks, your product, your industry, your team
Operating principles
2021
Cloud Security Orienteering
Abstract
Most of us are not lucky enough to have architected the perfect cloud environment, according to this month's best practices, and without any legacy elements or surprise assets. Over the course of a career in cloud security, you'll likely find yourself walking into a new environment and needing to rapidly orient yourself to both mitigate the biggest risks and also develop a roadmap towards a sustainable, secure future.
As a security consultant, I had the challenge and opportunity to enter blind into a variety of cloud environments. They were across Azure, GCP, and AWS, some well-architected and others organically sprawling, containing a single account/project and hundreds. This gave me a rapid education in how to find the information necessary to familiarize myself with the environment, dig in to identify the risks that matter, and put together remediation plans that address short, medium, and long term goals.
This talk will present a cloud and environment agnostic methodology for getting your bearings if tasked with securing a novel cloud environment. We'll learn by applying this to a sample AWS environment in order to cover:
- An archeological guide for where and how to find organizational context
- How to quickly find and kill the most common attack vectors at the perimeter (both network and identity)
- Common architectural and deployment patterns, how to spot them, and their security implications
- What you need to know, what you need to prioritize, and what "best practices" aren't worth the squeeze when you're in a crunch
Outline
https://tldrsec.com/p/blog-cloud-security-orienteering
2020
Learning from AWS (Customer) Security Incidents
Abstract
In light of the increasing adoption of cloud computing, there have has been broad coverage of the compromise of customer environments in the cloud. In both popular and technical literature however, there has been a focus on the most egregious, simplest breaches (i.e open S3 buckets). However, deeper analysis shows a much broader variety of tactics currently exploited by attackers and researchers to compromise cloud environments.
This talk will, with a focus on AWS, discuss over a dozen different public breaches. We'll walk through the technical details of these attacks, establish the common root causes, look at lessons learned, and establish how you can proactively secure your environment against these real world risks.
Outline
Introduction:
- To me
- To AWS Security
- “The cloud”
- Shared responsibility model
- To the topic - Breaches of AWS Environments
A quick hat tip to prior art:
- SANS Cloud Security Summit
- Lessons Learned from Cloud Security Incidents, Past and Present
- https://www.youtube.com/watch?v=wUYKq1F0Qnk
- Cloud Breaches: Case Studies, Best Practices, and Pitfalls
- https://www.youtube.com/watch?v=rtEjI_5TPdw
- fwd:cloudsec
- “The Usual Suspects” - James Condon
- F5 Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 Years (https://www.f5.com/labs/articles/threat-intelligence/is-the-cloud-safe–part-2–breach-highlights-for-the-past-3-years)
Case Studies: (for each I’ll break down the breach, and identify the root cause)
- The simple examples - exposed S3 buckets, managed Elasticsearch, etc.
- The one we all heard about - CapitalOne
- Code Spaces
- DNC Hack by the GRU
- LA Times
- OneLogin
- Uber
- Impreva
- Tesla
- JW Player
- TeamTNT botnet
- Cryptomining AMI
- Mandiant talk example
- Expel.io examples
- whatever happens between now and the conference?
Root Causes: (I’ll correlate the breaches, and establish a set of common root causes, this can be compared to both https://disruptops.com/stop-todays-top-10-cloud-attack-killchains/ and https://attack.mitre.org/matrices/enterprise/cloud/ “Inital Access”. For each, we’ll do a 10,000ft look at best practices for prevention)
AWS Security: Easy Wins and Enterprise Scale
Abstract
Cloud computing continues its rampant growth, and AWS maintains its lead as the predominant platform. Since the last BSidesBoston in 2017, AWS adoption has gone from 57% to 76% of enterprises.Whether your organization has two feet firmly in the cloud, is dipping a toe in the water, or you personally are wondering "where do I even start," it's important to learn to adjust security to cloud environments.
This talk will look at two extremes. First, we'll go through the easy wins that almost any one or any organization can identify and apply. Then, we'll pivot to look as the the big picture security problems to consider as either your security maturity or AWS usage grows. We won't be able to go deep into all the weeds of the topic, but instead we'll provide the essential information, and pointers for next steps. No matter your size, complexity, or sophistication of your AWS environment, you should walk away with an idea of where to look for your next actionable improvements.
Outline
Outline:
I’m not sure whether the goal is to allow for questions, and if so whether that is included in the talk time or appended afterwards.
This rough outline provides the flexibility for either case.
10 Minutes
- Introduction
- To me
- To the topic
- To “the Cloud”
- To AWS
- AWS Shared Responsibility Model
- Key AWS Background (terms and technologies)
- Networking in AWS
- VPCs, EC2, security groups, NACLs
- IAM
- IAM Principal Types (Users/Roles/root)
- Credentials (Passwords/Access Keys)
- Policies
- Policy Evaluation
15-20 Minutes
- “Easy”
- Single account best practices
- Single account security services
- Common account compromise footholds
- Single account auditing
- how to use it for service hardening and best practices
- Turnkey encryption
15-20 Minutes
- “Hard”
- Organizational Architecture
- Security at scale
- Encryption
- Least Privilege
- tips for IAM creation and auditing
- Access analyzer/Access advisor
- Logging/Monitoring/Alerting
- Preparing for Incident Response
- Visibility and multi-account auditing
- Antiope
- JIRA/Salesforce integrated OSS
- Security Hub
- Governance
- IaC
- AWS Config
- Organizations SCPs
- Systems Manager
- Automatic Remediation
I’ve previously presented on AWS Security and Self-Auditing at BSidesCT 2019, and gave a 4-hour workshop on AWS Security at BASC2019.
Slides for both are available at https://speakerdeck.com/ramimac
I have not presented this specific presentation, however it has overlap due to its nature as a discussion of AWS Security.
I’ve tried to create a broad presentation that will have appeal to both those new to the topic as well as those who may already be literate in AWS security.
The goal is to work from first principles, but to quickly ramp up to also address the bleeding edge and big picture problems.
This talk will be of interest to those less familiar with AWS Security due to the high level coverage, inclusion of easy wins, and peek into the complexities that come with enterprise scale.
For those who are already involved somehow in AWS Security, this can be used for both Gap Analysis, and could assist in identifying roadmaps for future improvements.
My background as a security consultant gives me a valuable perspective through exposure to numerous environments of all sizes, configurations, and maturity.