Back

DevOps D-Day 2023: Innovations and Perspectives in DevSecOps - Part 2

Image Slider

February 12, 2024

DEVOPS D-DAY 2023, an iconic event in the DevOps field, marked a turning point with the participation of 1,200 IT professionals, 20 partners, 35 sessions, and 40 speakers. This eighth edition, held at the Orange Vélodrome, was a platform for discussion and discovery of the latest advances in DevOps, cloud computing, and open source technologies.

Frédéric Pillet: LACEWORK, from code to cloud 

With a background in computer engineering, Frédéric Pillet is passionate about new technologies and innovative approaches such as DevOps and zero trust. A former employee of Dynatrace and Splunk, he recently joined Lacework, attracted by the new perspectives its solution opens up for cloud security.

Cloud security and its challenges

Contrary to what one might think, the subject of cloud security is not entirely the responsibility of the security team.  

Indeed, right from the introduction on the presentation of cloud security issues, Frédéric sets the tone by drawing a clear line between what we know about security and the emerging field of cloud security. 

Firstly, the risks that differ due to an extensive, evolving attack surface that is not always immediately apparent.
The importance lies in controlling and reducing exposure within your cloud infrastructure. 

Next, a context in which a security team, often small, faces a multitude of risks while constantly trying to determine where to focus its efforts. The goal is not to pile problem upon problem, but to unify tools and methods.

A desire to reduce costs in a "dollar-hungry" environment while simplifying the daily lives of teams through consolidation, which tends to make security more robust and sustainable. 

A collaboration that affirms that cloud security is a team sport where going it alone is a big mistake. Security is not an expert in the cloud, so you have to fight with the right weapons. The cloud brings a lot of automation and allows controls to be moved upstream without slowing down developers' work (integration of analytics into pipelines). 

Finally, detection, because it is impossible to cover all risks and it is inevitable that every company will be attacked at some point. In response to this, behavioral analysis is essential in this type of environment. 

 

Covering all security needs  

From Build to Run, several needs are highlighted: 

Code security, or identifying all assets and detecting misconfigurations, compliance violations, or code vulnerabilities during the integration phase, is essential. 

Vulnerability management, which carries out the core mission of discovering vulnerabilities in hosts and containers from design to execution. 

The security posture, which uses risk assessment to identify all assets, detect misconfigurations, and compliance violations through multi-cloud monitoring. 

Threat detection, which detects malicious behavior by continuously analyzing all user and cloud entity behavior (machine learning).

 

LACEWORK Solution 

From the outset of the LACEWORK solution presentation, we quickly understand that it is positioned as a response to the challenge of vulnerability management by integrating a CNAPP ( Cloud Native Application Protection Platform) approach. 
The goal is to bring clarity to vulnerability visibility and management, as well as to correct the most risky vulnerabilities upstream in the production chain (shift left approach).

 

CNAPP, CWPP & CSPM

Frédéric's demonstration takes us through a use case that scans the vulnerabilities of an Infrastructure as Code project and its workload (Host, Node k8s, Containers), introducing the CWPP (Cloud Workload Protection Platform) feature. 

A dashboard summarizing the scan results clearly highlights areas of concern (identification of high vulnerability, CVE Score, risk management). On the one hand, vulnerability noise is reduced through cloud data correlation, and on the other hand, risks are identified and explained through a combination of public and commercial vulnerability data sources. 
This combination results in an explanatory and educational text on the criteria identified, enabling initial management questions to be answered: What is the vulnerability? How can I resolve it?  

In addition, beyond vulnerability management, the dashboard allows us to display alerts related to the security posture adopted by our cloud provider. 
The solution will enable us to define a desired state in terms of cloud security via a list of best practices (S3 bucket not open in public flow, connection to an AWS account with a non-root user, etc.) and examine the Cloud Provider's log data in order to flag any deviant behavior.  
This is known as CSPM ( Cloud Security Posture Management), which offers a multitude of benefits such as greater visibility in identifying security risks, improved regulatory compliance (GDPR, HIPAA, etc.), risk reduction, and better collaboration between security and operations teams thanks to a centralized platform. 

 

Lacework AI 

Finally, as the icing on the cake, LACEWORK has developed a GenAI (generative artificial intelligence) assistant, more commonly known as the Vulnerability Chatbot Assistant. 
This Chatbot Assistant, powered by generative AI, will simplify the understanding and processing of compliance alerts, thereby promoting a proactive approach to risk management through simple correspondence. 

Quite impressive, but LACEWORK doesn't stop there! Generative AI tools are only effective when using reliable data. Lacework has created a unique architecture (hosted on-premises) that allows it to manage the immense volume, velocity, and variety of cloud data to detect known and unknown threats.  
 
The combination of information generated by Lacework Polygraph's machine learning and LLM assistance technology therefore offers customers a significant advantage, enabling them to achieve better results faster.  

 

Cyril Cuvier: NEUVECTOR, secure your deployments before and during execution

With over 10 years of experience as a systems administrator in production and cloud architecture, Cyril then crossed over to "the dark side of the force with manufacturers," taking on pre-sales and sales roles for VMware at DELL Technologies, then as a solution architect at Lenovo, before joining SUSE France in a pre-sales role focused on DEVOPS topics.

 

NEUVECTOR Solution

A technician through and through, Cyril looks beyond the challenges and various security requirements to focus primarily on presenting the NEUVECTOR solution and its powerful capabilities in securing containers in real time and throughout their lifecycle. 

 

Risk profiling & vulnerability management 

Like these competitors, NEUVECTOR will enable users to benefit from the security posture management adopted by their Cloud Service Provider (CSPM) by providing, through robust tools, assurance of container compliance through the automation of security audits and the generation of detailed reports (risk scores), facilitating the maintenance of current compliance standards (PCI, HIPAA, etc.). 

 

Cloud Workload Protection Platform 

The solution also offers scanning of all types of workloads and registries, detecting vulnerabilities in cloud environments and enabling critical risks to be prioritized in order to block attack vectors. 

 

Ease of integration 

Leveraging the experience of Rancher (SUSE), NEUVECTOR offers seamless integration with CI/CD tools and container orchestration solutions, enabling smooth workflow automation and easy implementation and enforcement of security policies throughout the development cycle. 

However, NEUVECTOR stands out and excels in the field of intrusion detection and prevention, and it is on this subject that Cyril offers us a scenario in a context that is familiar to us all. 

 

Real-time container security 

To put this into context, Cyril suggests drawing an analogy between real-time container security and managing security at a nightclub! (An opportunity to hit the dance floor in a professional setting). 

Like a nightclub bouncer, who operates on the principle that there is no such thing as zero risk at night and that zero trust is the rule, he summarizes what he calls "automated behavioral-based zero trust" in three distinct rules, namely:

  • Discover: identifies application behavior (learning mode) 

  • Monitor: alerts you to the first abnormal behavior of an application 

  • Protect: rejects any abnormal behavior from an application 

Once the context has been explained, Cyril moves on to a demonstration that will allow us to see in real time how this principle is applied to container security. 

 

Admission Control 

Just as a nightclub manager would do, a list of rules validating or denying entry authorization (control rules) is communicated in advance. The example given for this configuration is: 

  1. Refusal of any deployment containing unscanned images 

  1. Mandatory scan of the Docker registry 

  1. Rule for admission control based on CVE scoring (Common Vulnerability Scoring) 

Once the rules have been established, we will be able to refine our configuration by adding a rule that will reject any CVE score that is high, and a number of CVEs, just as in a nightclub where the manager wants to apply a specific admission rule. 

To return to our analogy, no basketball and no groups of more than 6 people! 

 

Discover 

Once the briefing is over, each bouncer takes up their position and opens their eyes wide to enter behavior learning mode.

Thanks to an advanced detection system, the solution continuously scans network traffic and container activities, as well as inspecting processes within containers. 
When analyzing behaviors, this step allows us to create authorized behavior rules for containers. Once advanced discovery and rules have been recorded (e.g., no curl on URL from the identified Pod), we move on to the monitoring step. 

 

Monitoring 

This step will, upon detection of behavior that deviates from the learned rules, create a security event for this behavior and categorize this newly learned rule as a Warning. 

Example: a curl on a URL from the Pod.

Our bouncer alerts us to any unusual behavior and stands ready to take action! 

 

Protect

Our party is in full swing and our bouncer is at the height of his concentration, ready to quarantine any deviant behavior already detected. 

NEUVECTOR offers a full stack defense strategy that not only secures network traffic, but also inspects and controls processes within containers. It is this multi-layered approach that guarantees comprehensive security, blocking abnormal behavior. 

Example: the return of the execution of a curl from the Pod 

Since this behavior has already been detected and identified as deviant, as soon as it appears, the curl process is blocked and the container carrying this process is quarantined to prevent the vulnerability from spreading. 

 

Analyze

NEUVECTOR offers the ability to view authorized or blocked connections and identify suspicious behavior through a detailed view of network traffic between your containers, where violations are highlighted with color codes (Network Map). 

We also highlight the ability to list all our assets (namespaces, pods, services), create and manage custom rules for containers, and assess the security risks associated with your images, nodes, or containers via a dedicated dashboard displaying vulnerabilities. pods, services), create and manage custom rules for containers, assess the security risks associated with your images, nodes, or containers via a dedicated dashboard displaying vulnerabilities, manage incorrect configurations and other issues, and finally verify container compliance with specific standards such as PCI-DSS (Payment Card Industry Data Security Standard) or HIPAA (Health Insurance Portability and Accountability Act). 

 

This scenario shows us that managing the security of our containers in real time is no easy task and, above all, a matter of split seconds! 

NEUVECTOR meets this need precisely, setting itself apart in a remarkable way. 

 

Conclusion: DevOps D-DAY 2023, the challenge of securing the cloud

The years go by, and each one is less like the last at the Velodrome. The DevOps philosophy and methodology has given way to its counterparts FinOps and DevSecOps, just as euphoria has given way to seriousness. 

Gone are the days when novelty seemed devoid of problems and complexity. Now it's time to take stock and make sure we're no longer taken advantage of, as some have learned the hard way. 

The emergence of the cloud quickly confronted us with new issues in terms of security and resource management, highlighting the need to adapt to the new practices governed by this cloud-based continent. 

As with any discovery of new lands, the work undertaken requires new rules and new tools in order to make the most of what we knew how to do on our old continent. 

This year's DevOps Day 2023 perfectly reflects this beginning of change, as well as the feedback from several years of Cloud Exploitation with robust proof of concept (shift left, think automation, CNAPP) and the emergence of new centralized tools (NEUVECTOR, LACEWORK) that respond to the challenges of security and Cloud cost reduction. 

However, this edition also shows a decline in interest in DevOps philosophy and its application, which can only be a hindrance if culture does not keep pace with technology. 

 

Loïc Quesnel

DevOps Consultant 

Azure confidential virtual machines cover
March 20, 2024

Azure confidential virtual machines

Enhancing cloud security is one of the main challenges facing businesses...
Learn more
Sign&Go: the French access management tool cover
February 28, 2024

Sign&Go: the French access management tool

Paul Bresnu, cybersecurity expert, presents Sign&Go, the access management tool...
Learn more
Original solution for managing secrets cover
February 3, 2024

Original solution for managing secrets

Lucille AUBRY, Cybersecurity Consultant at Squad, presents a solution...
Learn more
Data Management with Apache NIFI cover
January 10, 2024

Data Management with Apache NIFI

Mickaël DANGLETERRE, Cloud Architect and DevSecOps, takes you on a journey into Data M...
Learn more
DevOps D-Day: Innovation and Perspectives in DevSecOps cover
December 20, 2023

DevOps D-Day: Innovation and Perspectives in DevSecOps

Lionel GAIROARD, DevSecOps Practice Leader at Squad, offers you a comprehensive overview...
Learn more