Golden rules of Cloud drift management
https://racinggames.gg/gran-turismo/how-to-make-a-drift-car-in-gran-turismo-7/

Golden rules of Cloud drift management

For my third year of IT security drift management in Azure, I would like to share considerations from what I've gleaned over time. In a nutshell, the operating model I'm going to put forward is an early bird version of Carl Nygard's point-in-time compliance, the main difference is that our controls are not always blocking devOps pipelines.

No alt text provided for this image

Some of the ideas expressed here are opinionated and very organization-dependent, so use your best judgment and don't take them all for granted...

Rule #1: the more immutability by design, the merrier. Your landing zone must be architected in such a way as to limit the number of hotspots where deployments are permitted to drift. Because managing drift is way more costly than preventing it. And because drift reconciliation is often a manual operation that simply doesn't scale.

Rule #2: don't get in the way of your devOps. Be consistent with your own decisions: as soon as you have accepted to mitigate a risk with a detective control (and what best example of a detective control than drift management?), there is absolutely no need to implement a checkpoint in the IaC pipeline [*]. Which is a very good thing for your business, because devOps are magicians that turn business requirements into business value.

Rule #3: commit to a devSecOps operating model. Injecting no checkpoints doesn't mean being deprived of first-class security! A model has to be shared where roles and responsibilities are delineated, where people know one another, what they do and why they do it. An "ivory control tower" clad with knobs, whistles, colorful indicators and endless multidimensional spreadsheets is likely to yield an epic fail here.

Rule #4: decouple the devOps "ground truth" from the security/compliance "ground truth". Each team has its own source of truth with its own rationale, freshness, versioning semantics, grain and accuracy. When in doubt, be driven by agility: centralization brings complexity, stiffness, and discontent.

Rule #5: security/compliance must adjust to devOps continuously, never the opposite. In the Cloud, cybersecurity is not a static business resting on heavyweight sets of "validated practices", "derogations", ... It is a lively bottom-up activity, with security constantly trying to catch up devOps activity and rethinking its role as a rail guard along the way. "This developer is doing something suspicious! Or... Maybe I'm retarded, this guy is an expert and I should try to understand his behavior?"

Rule #6: monitoring drift is meaningless without an accurate, real-time inventory of drifting objects. So far, I believe no single tool has proven to perform great drift management AND great inventory at the same time. What's more, inventory is not magic: it will not auto-discover the assets you need to supervise without being fed with some structured, business dependent clues. (A lot of progress has been recently achieved here... still, auto-discovery remains an hazardous undertaking).

[*] Unless you wish to implement a second-level control, but this is out of scope.

Catalin Vieru

GenAI Principal Architect - Strategic Accounts

2 年

Becomes Via Dolorosa!

Lars Kamp

I write about cloud security and capital markets.

2 年

"inventory is not magic: it will not auto-discover the assets you need to supervise without being fed with some structured, business dependent clues." --> what you're looking for in the "clues"? do you have an example on hand?

要查看或添加评论,请登录

Christophe Parisel的更多文章

  • "Ultimate" weapon against your AI-powered apps

    "Ultimate" weapon against your AI-powered apps

    What will kill your AI apps? A design error..

    4 条评论
  • Adversarial lateral motion in Azure PaaS: are we prepared?

    Adversarial lateral motion in Azure PaaS: are we prepared?

    Lateral motion techniques are evolving in PaaS, and we should be worried. Let's discuss a risk confinement approach.

    19 条评论
  • How will Microsoft Majorana quantum chip ??compute??, exactly?

    How will Microsoft Majorana quantum chip ??compute??, exactly?

    During the 2020 COVID lockdown, I investigated braid theory in the hope it would help me on some research I was…

    16 条评论
  • Zero-shot attack against multimodal AI (Part 2)

    Zero-shot attack against multimodal AI (Part 2)

    In part 1, I showcased how AI applications could be affected by a new kind of AI-driven attack: Mystic Square. In the…

    6 条评论
  • Zero-shot attack against multimodal AI (Part 1)

    Zero-shot attack against multimodal AI (Part 1)

    The arrow is on fire, ready to strike its target from two miles away..

    11 条评论
  • 2015-2025: a decade of preventive Cloud security!

    2015-2025: a decade of preventive Cloud security!

    Since its birth in 2015, preventive Cloud security has proven a formidable achievement. By raising the security bar of…

    11 条评论
  • Exploiting Azure AI DocIntel for ID spoofing

    Exploiting Azure AI DocIntel for ID spoofing

    Sensitive transactions execution often requires to show proofs of ID and proofs of ownership: this requirements is…

    10 条评论
  • How I trained an AI model for nefarious purposes!

    How I trained an AI model for nefarious purposes!

    The previous episode prepared ground for today’s task: we walked through the foundations of AI curiosity. As we've…

    19 条评论
  • AI curiosity

    AI curiosity

    The incuriosity of genAI is an understatement. When chatGPT became popular in early 2023, it was even more striking…

    3 条评论
  • The nested cloud

    The nested cloud

    Now is the perfect time to approach Cloud security through the interplay between data planes and control planes—a…

    8 条评论

社区洞察

其他会员也浏览了