This chapter contains security considerations in a DevOps context. This is especially important as security practices are considered as not agile and therefore slow down the time between a code commit and acceptance into normal production. By considering this topic in the first place and integrating security aspects into a DevOps organization, the mentioned consideration might become obsolete. The following topics are common candidates for security discussions:
- Security audits
While security audits are imminent, coordination between Dev and Ops becomes crucial. Especially while considering infrastructure-as-code. - Securing the deployment pipeline
The deployment pipeline itself is an attractive target for malicious attackers. - Microservice architecture
Adoption of microservice architecture introduce new security challanges.
Security
Security is defined through the acronym CIA:
- Confidentiality
prevents unauthorized people from accessing information. - Integrity
prevents unauthorized people from modifying information. - Availability
ensures that authrized people can access information.
In this context authorization addresses two elements: Who is trying to access or modify information and do they have the right to perform the operation they requested?
A common wise saying in security is “Do not roll your own”; thats due to errors that may creep in can be subtle. Own teams won’t find those errors while they provide an avenue for an attacker to compromise systems. Another common wise saying is “defense in depth”, which indicates that any attack must circumvent numerous different defenses to compromise a system. As there is no 100% security, the question about security is always, how much an attacker is willing to spend on compromising the system. Therefore security contains different aspects:
- Ability that individualys cannot deny the operations they performed on the data in a system
- Security Controls such as encryption, security patches within a time frame; those can be preventive, detective or corrective
Security Threats
When taking the point of view of an attacker, a new perspective is taken into consideration when designing a system or subsystem. Microsoft has introduced the acronym STRIDE for such a threat model which impairs the CIA aspects of security:
- Spoofing identify
Illegally accessing and using another users’s authentication information,such as username and password. - Tampering with data
Data tampering involves the malicious modification of data. - Repudiation
Those threads are associated with users who deny performing an action without other parties having a way to prove otherwise. - Information disclosure
Includes the exposure of information to individuals who are not supposed to have access to it. - Denial of service
Compromises availability of a system to valid users. - Elevation of privilege
Thread that unpreviliged users gain previledged access and therefore sufficient access to compromise or impair the entire system.