包阅导读总结
1. 关键词:Platform Engineering、Security、Vulnerability、Developer Experience、Automation
2. 总结:文章指出平台工程不仅能解决开发者面临的问题,还能提升组织安全性。通过 OpenSSL 漏洞事件,作者意识到要重视安全团队的需求,以用户为中心兼顾开发者和安全体验,实现高度自动化。
3. 主要内容:
– 平台工程的作用
– 本应解决开发者面临的摩擦、延迟和中断问题。
– 作者经历的 OpenSSL 漏洞事件
– 需确定生产中运行 OpenSSL 的位置并制定修补计划。
– 修复过程涉及更新容器镜像,大量服务和人员参与,虽 CI/CD 流程自动化,但基础镜像升级未自动化。
– 对安全团队的同理心
– 作者之前未重视安全团队,此次事件后有了改变。
– 安全自动化的投资回报易计算,但漏洞的真正代价可能更大。
– 考虑“安全体验”
– 关注“左移”成果,改变对话,不把工作都交给开发团队。
– 平台工程团队应从用户需求出发,高度自动化,重视安全团队需求。
思维导图:
文章地址:https://thenewstack.io/platform-engineering-can-help-your-security-team-too/
文章来源:thenewstack.io
作者:Hannah Foxwell
发布时间:2024/7/25 19:39
语言:英文
总字数:1236字
预计阅读时间:5分钟
评分:86分
标签:平台工程,安全,开发安全运维,持续集成/持续部署,零日响应
以下为原文内容
本内容来源于用户推荐转载,旨在分享知识与观点,如有侵权请联系删除 联系邮箱 media@ilingban.com
You’re notified of a new critical vulnerability in a popular open source project. The package is shipped with all the most popular Linux distributions. It’s in the base image you use to build your containers. The vulnerability is deployed in every single microservice you run. What do you do next? Do you have a plan?
If only we had a team that excelled at automating the software development life cycle, provided developer-friendly tools for continuously shipping updates, and who could select and validate the open source building blocks your development team needs to run their applications.
If only we had platform engineering.
Platform engineering is supposed to solve a lot of the friction, delays and interruptions that developers face. However, my own real-world experience as a product director in cybersecurity taught me that platform engineering can also improve an organization’s security.
In October 2022 I was involved in my first Zero Day response. OpenSSL notified the world that it had discovered a critical vulnerability in versions 3.0.0 – 3.0.6 of OpenSSL. There was no debate — this advisory required an urgent, organized response.
Not only is OpenSSL packaged with most Linux distributions, but it is also the software that handles the encryption of network connections. We didn’t know the nature of the vulnerability when we started our preparation, but we knew that the potential impact was severe.
We braced ourselves for another Heartbleed, the vulnerability discovered in 2014 in the OpenSSL cryptographic software library, which affected a massive number of web servers.
We needed to identify where we were running OpenSSL in production and make a plan to patch the vulnerability. Our microservices were deployed as containers with a Linux distribution baked into each container. We rapidly discovered that every single production service was impacted. Take a deep breath. OK, what next?
With the blast radius identified we then had to prepare to patch, and patch quickly! On this occasion, the remediation process was to update our container-based images.
To do this we had to identify every dockerfile for every service and ensure the base image in the FROM:
line was updated. Each container would need to be rebuilt and redeployed through our CI/CD pipelines and into production. Hundreds of services, hundreds of dockerfiles, hundreds of updates, hundreds of redeployments … hundreds of people involved.
CI and CD processes were automated but unfortunately, base image upgrades were not. We needed every development team to engage in the response. Some teams had just a handful of services, but others had a lot more. It wasn’t a complicated process but it disrupted hundreds of developers, with the inevitable cost of context switching, communication overhead and validation.
Building Empathy for the Security Team
I tell this story a lot, even though the Critical categorization of the vulnerability was downgraded to High upon disclosure on Nov. 1. (CVE-2022-3602 and CVE-2022-3786, if you’re interested!
I tell this story because until that day I had resisted “DevSecOps” as a separate thing. I believed that “DevOps has always included security” and “My platform engineering team is building security in.” But I had never lived a day in the life of the security team. I lacked empathy for the security team.
Like many other platform engineering leaders, I prioritized developer experience (DevEx). I focussed on productivity and developer friction when I spoke about the need to build a Platform as a Product (PaaS). My team of platform product managers would conduct user interviews with developers, and then manage security like stakeholders on the peripherals. We didn’t consider security as users of the product.
The return on investment (ROI) of security automation is easy to calculate in terms of “cost of response.” But the real cost of the next Zero Day vulnerability might not be limited to disruption and lost time. Those vulnerabilities could be exploited, leaving your systems open to hackers and doing irreparable reputational damage to your company.
Marc Cluet, executive director of core platform engineering for a global financial services organization (and organizer of London DevOps for a decade) has always advocated for security as part of the solution.
“As someone who has experience working in highly regulated environments, security has always been a part of the DevOps transformation initiatives I have been a part of,” Cluet told The New Stack in an online interview. “The security processes and solutions you build will need to meet the needs of regulators and the organization’s many different teams including development, operations, security, audit, compliance, governance, etc.”
“Shifting left” has been a mantra of the DevOps movement for over a decade. But the temptation with this philosophy is to delegate security to the development teams without consideration of what they need to be successful.
Andy Burgin, a principal platform engineer in the gambling industry, warned against this in an online interview with The New Stack: “If you use ‘shifting left; as a way to make work/responsibility/accountability someone else’s problem under the banner of ‘empowering,’ you’re completely misusing the term.
“Having tooling/training and above all commitment over compliance in place is far better than simply YOLOing things you don’t want to have to deal with anymore at another team. Socio-technological systems are not a playground for a game of ownership tig.”
Consider the ‘Security Experience’
When we focus on the outcomes we want to drive by “shifting left,” the conversation changes. We want to prevent and resolve more security issues earlier in the development process, ideally before they are ever deployed to production. We don’t necessarily have to delegate all of that work to the development team.
To ensure you don’t introduce more friction in the development process, you need to take a highly automated approach, informed by the user needs of security teams alongside the needs of developers.
The platform engineering community is thriving and more teams are adopting a Platform as a Product approach for their internal developer platforms (IDPs) — but often, teams are making the same mistakes I made. They see security as a stakeholder and not as a user of the platform. To succeed, we must take a user-centric approach to both developer experience and security experience.
If you’re part of a platform engineering team, I urge you to conduct user research with your colleagues in security. Ask them what they need from your IDP. Ask them how you can help make their jobs easier.
Security teams need visibility of the software development life cycle from code to production. They need application context to assess risk and respond appropriately. They need both proactive prevention and reactive incident response to be highly automated.
Security teams value feedback loops to measure their success; Are we getting better at this? What is our mean time to repair (MTTR) for a new critical common vulnerability and exposure (CVE)? Are developers using our security tooling correctly? Where do we have blind spots? What security education do developers need?
Who better to deliver these outcomes than the platform engineering team?
YOUTUBE.COM/THENEWSTACK
Tech moves fast, don’t miss an episode. Subscribe to our YouTubechannel to stream all our podcasts, interviews, demos, and more.