September 19–20, 2016: Training
September 20–22, 2016: Tutorials & Conference
New York, NY

A dystopian look at immutable infrastructure and other cloud security lies

Sam Bisbee (Threat Stack)
3:50pm–4:30pm Wednesday, 09/21/2016
Infrastructure reimagined Cloud, Security Beekman Audience level: Intermediate
Average rating: ****.
(4.00, 3 ratings)

Prerequisite knowledge

  • Familiarity with commonly used Linux shell tools (sudo, apt-get, etc.)
  • What you'll learn

  • Understand how to benchmark your current security practices based on how others are implementing security
  • Gain a set of recommendations on how to improve your posture, both for security and compliance requirements
  • Description

    Many of today’s popular tools and architectures, like immutable infrastructure, promise security and compliance benefits. Yet their implementations do not always deliver, often because of overlooked complexities. Go to any conference, and you will find plenty of people spreading religion on how to run your environment the same way they do, plying automation to derive velocity, security, and compliance. Topics like immutable infrastructure, blue-green deployments, and the future of serverless architectures are all great in theory but are not based in our current reality. All too often organizations are hyperfocused on migrating their platform to a container management system instead of building their infrastructure to achieve quality velocity and security metrics.

    Sam Bisbee offers a data-driven, semi-dystopian look at how organizations are actually implementing security in the cloud, based on observed behaviors and data. The answer is surprisingly bad given how big of a game the cloud and DevOps communities talk. In an effort to keep dystopian humor at a minimum, Sam will turn these observations into data-driven recommendations.

    Topics include:

    • How and why people use sudo
    • How often organizations upgrade their software and how they are doing so
    • The types of detection and prevention systems deployed
    • Are software releases automated, or are humans still manually pushing tarballs around?
    • Are named accounts used, or is everyone logging in as the Ubuntu user?
    • The average life-cycle of an instance in AWS and how long an adversary could dwell in it
    Photo of Sam Bisbee

    Sam Bisbee

    Threat Stack

    As the chief technology officer at Threat Stack, Sam Bisbee is responsible for leading the company’s strategic technology road map for its continuous security monitoring service, purpose built for cloud environments. Sam brings highly relevant experience in distributed systems in public, private, and hybrid cloud environments as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in February 2014), a leader in the database-as-a-service space, where he played a senior technical and product role.