TNS
VOXPOP
Which agile methodology should junior developers learn?
Agile methodology breaks projects into sprints, emphasizing continuous collaboration and improvement.
Scrum
0%
Kanban
0%
Scrumban (a combination of Scrum and Kanban)
0%
Extreme Programming (XP)
0%
Other methodology
0%
Bah, Waterfall was good enough for my elders, it is good enough for me
0%
Junior devs shouldn’t think about development methodologies.
0%
DevOps / Security / Software Development

Cybersec Threat Hunter to DevOps: You’ve Been Framed…

More companies are baking security into their software development process as they realize development environments can undermine application security.
Jun 29th, 2022 3:08am by
Featued image for: Cybersec Threat Hunter to DevOps: You’ve Been Framed…
Featured image by S. Hermann & F. Richter from Pixabay.

DevOps and cloud native development have gifted cyber attackers an enlarged attack surface and the ability to use organizations’ own tools against them, according to one of Europe’s top threat researchers.

Tom Van de Wiele, principal technology and threat researcher at Finnish security firm WithSecure, speaking at the recent Sphere 2022 conference in Helsinki, said that over the past decade companies had become acutely aware of how their development environments can undermine application security.

They’d begun to consider what level of security they can bake into the development process. But building in scans and tests, and managing credentials and access more tightly, is not enough, he said.

Larger Attack Surface

The sheer scale of the cloud native ecosystem presented a much larger attack surface, which is exacerbated by the role of volunteers producing open source software that “gets included into a kind of black box” whether the code is delivered as an off-the-shelf product, custom project or by an external supplier.

Suffering From Structure

A large part of WithSecure’s business involves security consulting, Van de Wiele explained, and when it came to red teaming, “A lot of companies over the last five years as an objective for our tests have said ‘could you please start with our DevOps environment,’” he said.

What has become clear from this work is that “a lot of companies are suffering from their own structure,” he noted.

This is often because they will call in a specialist who is given privileges on the underlying user accounts to set up one part of the tool chain, say infrastructure as code. Then another consultant is pulled in for another stage, say Bitbucket, and is also given privileges.

“The problem these companies have, is they lose the oversight,” said Van de Wiele. This results in situations where a bank’s entire DevOps infrastructure is predicated on a single service account or a handful of user accounts. “People are on the beach, hammering nails into things, but no one really knows what we’re building, let alone if it’s going to go over the horizon.”

Opt-In Model

The problem was further explained by WithSecure CTO Christine Bejerasco. She said cloud platforms had clearly evolved security-wise.

“One nice thing about the model is it’s opt-in. So, for instance, you have all of this network traffic, ingress and egress blocked by default, and then you open it up bit by bit.”

This should make it harder to make a mistake, she said. “But of course, the moment you start tweaking things, and the bigger your cloud platform or your cloud estate becomes, the more mistakes you can have.”

The nature of the cloud meant that these misconfigurations should be easily picked up by logging, “they’re very auditable.” But, she continued, this demands a different way of thinking about security. “It’s not about the threat attacking you anymore. It’s about how you set up your system … helping people before the threat actors get into their cloud setup.”

A Question of Tooling

Addressing all these problems is partly a question of tooling, said Van de Wiele. So, in addition to ensuring source code and vulnerability scanning are integrated into the pipeline, companies need to segregate services, components and containers, and ensure transport between them is encrypted.

And organizations also need to understand how to quickly remediate software as it moves through the CI/CD pipeline

“Like that default setting? It turns out someone is abusing that worldwide and selling ransomware through that,” he said. “How flexible are you as a company to be able to make those changes while the sausage is being made? Or while there’s a new update for a piece of software that you need to incorporate? How resilient are you in adding those changes?”

Priorities, Focus, Risk Management

But they also need to realize security is a question of priorities, focus and risk management – and developers are not the best people to be making these calls.

“When you say DevOps, you think developers, techies, and that’s fine, but you need people in the departments as well that are able to tie the technical risk to the business risk,” Van de Wiele said. “And that sometimes gets forgotten, because not all of this is a technical decision.”

For example, he says, a customer bolting two commercial products together may be able to introduce scanning to find vulnerabilities. “But whatever you’re going to find, you won’t be able to fix anyway. Because you have to pick up the phone and call to say, ‘Hey, when can we expect an update?’”

Moreover, “Security is more than just sprinkling security on top and ticking a bunch of boxes,” he said. “It’s looking at what is going to bite us in the ankles. What can we live with? And then working your way backward to say, ‘OK, what changes do we need? And of course, what budget and people do we need to make this happen and to make this liveable?’”

Credential Management, Developer Distinctions

Organizations must also ensure “credential management is kept away from the actual application developers,” he said.

“A Java developer, they don’t need access to the .NET environment,” he said. The problem is most companies don’t make these distinctions. “They go, ‘Well, it says developer here. And if it sounds like a duck and looks like a duck…’”

And, no matter how much a developer or a team advocates for a given approach or framework, the organization needs to understand exactly what this means for the attackers trying to break into their systems.

“Too many times I hear in meeting rooms, ‘But the framework takes care of that,’” said Van de Wiele. “But guess what we’re using as ethical hackers against you? If we have to run a payload somewhere, instead of writing two lines of code, well, using your framework, it’s now one sentence. You’re making things easier for me.”

Group Created with Sketch.
THE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.