devseccon asia 2017 arun n: securing chatops

20
Join the conversation #devseccon Extending and securing Chat-Ops Arun N

Upload: devseccon-limited

Post on 19-Mar-2017

102 views

Category:

Presentations & Public Speaking


0 download

TRANSCRIPT

Page 1: DevSecCon Asia 2017 Arun N: Securing chatops

Join the conversation #devseccon

Extending and securing Chat-Ops

Arun N

Page 2: DevSecCon Asia 2017 Arun N: Securing chatops

Introduction

• Arun Narayanaswamy• 14 years in Dev & Ops• Worked at large enterprises including Fortune 1• Entrepreneur, Student, Photographer and Traveler…

• Disclaimer:• “The opinions expressed, software references and any content in this

presentation are solely mine and they do not represent my employer.”

Page 3: DevSecCon Asia 2017 Arun N: Securing chatops

How many of you use Chat @ Work?

techcrunch.com

Page 4: DevSecCon Asia 2017 Arun N: Securing chatops

ChatOps Architecture – How does it work?

© http://nordicapis.com

Page 5: DevSecCon Asia 2017 Arun N: Securing chatops

Chat Apps – Big Players!

• Instant messaging on steroids• Your ‘whatsapp’ for business!• Collaboration

• Integrated workspace - Text, audio, video• All alerting and messaging in one place• Share, Search & Integrate

• Chat-ops!• Fun

Page 6: DevSecCon Asia 2017 Arun N: Securing chatops

Bots– Big Players!

• Hubot

errbot.io

lita.io

operable.io

Page 7: DevSecCon Asia 2017 Arun N: Securing chatops

Hubot – Why?

• CoffeeScript on Node.js based• Active development - Github• Easy integration with third part api’s• Deployable on Heroku, AWS• Works with Slack and HipChat (and more)

• What’s chat without Hubot?

Page 8: DevSecCon Asia 2017 Arun N: Securing chatops

Typical CD Workflow

• Revolves around the orchestrator • Data need to be consolidated into Splunk/ELK/Jenkins etc.• Now better with• Containers• New-gen monitoring

Page 9: DevSecCon Asia 2017 Arun N: Securing chatops

CI-CD – Data Flow Bot InteractionsChat Notifications

HipChat / Hubot - Workflow

Page 10: DevSecCon Asia 2017 Arun N: Securing chatops

Risk

Potential Loopholes (With and without ChatOps)

Page 11: DevSecCon Asia 2017 Arun N: Securing chatops

Potential Loopholes : Focus today!

Page 12: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 13: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes : Hardware keys

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 15: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes : Soft keys

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 16: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes : Roles

2FA

Hardware Tokens

Software Tokens

Roles• Custom

Code• Hubot Auth

2FA

Multiple Rooms

AWS IAM Policies

Page 17: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes : Rooms

2FA

Multiple Rooms

AWS IAM Policies

• Restricted Channels• Private Channels• Different Instance of Chat

System• 2FA on Chat system itself

Page 18: DevSecCon Asia 2017 Arun N: Securing chatops

Plugging in the loopholes : IAM (AWS)

2FA

Multiple Rooms

AWS IAM Policies

• Policies on what each system can run• Better control on AWS/Heroku where the bots run

Page 19: DevSecCon Asia 2017 Arun N: Securing chatops

Summary

© http://nordicapis.com

Page 20: DevSecCon Asia 2017 Arun N: Securing chatops

Join the conversation #devseccon

Thank you!

linkedin.com/in/arun-n