Тёмный

35C3 - Sneaking In Network Security 

media.ccc.de
Подписаться 209 тыс.
Просмотров 11 тыс.
50% 1

media.ccc.de/v/35c3-9603-snea...
Enforcing strong network segmentation, without anyone noticing
Highly compartmentalized network segmentation is a long-held goal of most blue teams, but it's notoriously hard to deploy once a system has already been built. We leveraged an existing service discovery framework to deploy a large-scale TLS-based segmentation model that enforces access control while automatically learning authorization rules and staying out of the way of developers. We also did it without scheduling downtime or putting a halt to development. This talk covers how we engineered this, and shares lessons learned throughout the process.
The "hard-shell, soft-center" model of network security has been popular since the invention of networks--building proper internal controls is often skipped when organizations grow quickly, and by the time that scale has been achieved, security teams resort to defending the perimeter. In this talk, I'll show an example of how we took a large modern network to a significantly more secure model by building network segmentation into the existing service discovery framework in use.
Service discovery is a critical part of recent network design, and popular frameworks often offer security features. However, these tend to be difficult to implement after the network has already been established, and don't offer endpoint-to-endpoint solutions. We built a series of extensions to SmartStack, an open-source service discovery framework, that allow it to protect all communications with mutual TLS and offer both authentication and authorization. This was all done in a way that's transparent to the applications on either side, allowing us to migrate to this system without changing any application code or teaching developers the details of the system.
This talk will discuss the technologies used and the challenges encountered in doing this rollout, and will aim to provide useful guidance to other security engineers wishing to make a similar transition.
Maximilian Burkhardt
fahrplan.events.ccc.de/congre...

Опубликовано:

 

29 дек 2018

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
35C3 -  In Soviet Russia Smart Card Hacks You
38:16
Просмотров 9 тыс.
35C3 -  Security Nightmares 0x13
1:11:33
Просмотров 171 тыс.
Редакция. News: 128-я неделя
57:33
Просмотров 1,6 млн
What is a Protocol? (Deepdive)
18:14
Просмотров 163 тыс.
35C3 -  The Mars Rover On-board Computer
43:19
Просмотров 67 тыс.
Turns out REST APIs weren't the answer (and that's OK!)
10:38
35C3 -  Safe and Secure Drivers in High-Level Languages
1:01:57
35C3 ChaosWest -  Track me, if you … oh.
51:38
Просмотров 56 тыс.
The $5 Mid-2000s Mini PC - Thrift Store Finds
32:43
Просмотров 63 тыс.
Coding a Web Server in 25 Lines - Computerphile
17:49
Просмотров 331 тыс.
35C3 -  Die verborgene Seite des Mobilfunks
1:00:45
Просмотров 393 тыс.