SecOps
I think (I hope!) we all know by now that Security failures are legion. An ad hoc or reactive stance on behalf of security is risky--not only in business terms and costs of operating, but increasingly executives are being held to account in civil and criminal courts for security failures. Business leaders that take a lax attitude toward security are going to get burned. A weak security posture will be exploited. It's a certainty.
Effective security measures require Defense in Depth. Multiple people, processes and applications dedicated (in whole or in part) to security are needed in order to maintain a reasonable position to defend, detect and investigate attacks. As environments grow the number of systems that need to be protected grows. The only way to keep up your defenses in a large and/or growing environment is automation. In 2015 the term SecOps began to get wide use. Like DevOps, SecOps is concerned with Configuration Management, Monitoring and Communication. And as with DevOps, SecOps requires a high degree of automation. Many of the automation tools of DevOps can serve a dual-role and help achieve the objectives of SecOps.
A comprehensive list of security domains that need attention for an adequate Defense in Depth includes:
- Firewalls
- Access Management
- Encryption and Key Management
- Anti-virus
- Scanning
- Maintain Secure Systems and Applications
- Logging
- Policies and Procedures
DevOps can take a primary role or assist in many of these concerns. Principally, Server Configuration Management (SCM) plays a key role in both DevOps and SecOps. From a SecOps perspective, SCM will help deliver on they key requirements of maintaining secure systems. The goals are different for SecOps, but all of the benefits of SCM as described for Automation are also benefits for SecOps:
- Central Management
- Homogenous System Configuration
- Homogenous Configuration of Firewalls and Network Devices
- Systems Patched with the Latest Updates
Specifically, these benefits contribute to the security objective to “Maintain Secure Systems and Applications.” In fact, as environments grow, the only way to securely management is with an SCM. So how do these SCM benefits impact security? The unabridged explanation covers all the same ground as the benefits of SCM for managing server farms and clusters. The same problems of time-consuming system management environment complexity, system drift and non-homogeneity of systems, and systems that are not patched consistently all effect security. Getting all of your systems (and networks) under one umbrella with the ability to quickly and consistently update them via automation is key to holding the security line against attackers.
Additionally, SCM will assist in these other objectives for a secure environment:
- Access Management
- Anti-Virus Installation and Configuration
- Encryption and Key Management
- Logging Installation and Configuration
In the case of Access Management, an SCM might provide direct support for the management of accounts and keys, or it may only be providing a supporting role. For the other cases, SCM will aid in the deployment and configuration of these applications and tools. SCM will deliver anti-virus software, encryption keys, and logging configurations. Logging is critical for investigating security breaches. Maintaining backups of logs for one year is a requirement for PCI.
Automation will increasingly address the concerns of policies and procedures. An SCM system will assist in the auditing of policies and procedures. Security must be continually evaluated at all levels of the organization including automation. Auditing is part of a continual feedback look designed to maintain and improve security. It is a significant part of regulatory compliance, certifications and direct customer or vendor inspection. Increasingly companies are being held accountable and incurring downstream liability for companies that interact with them as partners or providers. This is increasing the frequency and comprehensiveness of audits being performed by customers or partners.