DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...

Page created by Gordon Shaw
 
CONTINUE READING
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
DEV5059: Using Machine Learning
to Make DevSecOps a Reality
Oracle Code One

Vijay Tatkar
Director, Product Management
Oracle Management Cloud
October 25, 2018

                               Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, timing, and pricing of any
features or functionality described for Oracle’s products may change and remains at the
sole discretion of Oracle Corporation.

                                        Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal/Restricted/Highly Restricted
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Program Agenda

        1   Defining terms
        2   Why DevSecOps is Perfect for Machine Learning
        3   Making Machine Learning Smarter for SecOps
        4   Demo
        5   Q&A

                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Data Breaches are Exploding World-Wide
         11M                 1B
       Premera               Yahoo                   Carphone
      Blue Cross US Voters Dec ’16
  200M Mar ‘15                                       Warehouse
                                                                                                                                S. Korea
                191M, Dec 15                          Aug ’15
 Experian                       154M                                                                                            Jan ‘14
                                                             Vodafone                         Espionage
Mar ’14 56M         32M         US Voter
                                                        2.4M Oct ‘13
     Home Depot Ashley          Jun ‘16                                                       Kaspersky                           20M       Japan
       Sep ‘14 Madison                 15M                         2M        Hacking            Jun ‘15                     Credit Bureau
             77M                     T-Mobile           4M
                                                                             Team
                                                                             Jul ‘15
           Edmodo
                   Jul ’15 4.6M
                                      Oct ’15         Talk Talk                                                                   12M        22M
                           Scottrade                  Oct 15 2M            400GB                                                Telecom     Benesse
  150M      May
           76M  ‘17TBs IP Oct ’15
                                CIA                            IP Theft    50M
                  Sony                                Orange                                                    Education
 Adobe JPMC Nov                Apr US
                                   ‘17 OPM, 22M                         Turkish Govt
        143M        Sabre
                                       Jun ’15        Feb/Apr ‘14
                                                                          Apr  ‘16       30M         5M           Jul ‘14
 Oct ‘13 Oct ‘14 ’14
                   Mar ‘16   93M                                                                   VTech
                                                                                      BSNL Telco Nov ‘15
      Equifax               Mexico Voter                                                Journal
      July ‘17        80M Apr ‘16                                                3.2M Jul ‘15
             150M Anthem                                                                           55M
                                                                              Debit cards       Philippines
    98M      eBay      Feb ‘15                                                  Oct ‘16                                42M
                                                                                                 Voter list       Cupid Media
  Target May ‘14            400M                                                                  Apr ‘16
                                                                                                                      Jan ’13
   DEC ‘13            Friend Finder                                                                       Kmart
                           Dec ‘16              4 out of 5 breaches
                                                                                                          Oct ‘15

                                                were human errors!

                                                             Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Program Agenda

        1   Defining terms
        2   Why DevSecOps is perfect for machine learning
        3   Making Machine Learning Smarter for SecOps
        4   Demo
        5   Q&A

                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Defining Terms (source: wikipedia.com)
• Machine Learning
  – Machine learning is the subfield of computer science that gives computers the ability to learn without being
    explicitly programmed. Evolved from the study of pattern recognition and computational learning theory in
    artificial intelligence, machine learning explores the study and construction of algorithms that can learn
    from and make predictions on data.
• DevSecOps
  – DevSecOps is a practice that aims at integrating security into every aspect of an application lifecycle from
    design to development, testing, production, and ongoing operations. DevSecOps is increasingly being used
    in the context of cloud deployments where organizations already have DevOps teams and tools in place to
    integrate, automate and monitoring every aspect of the development lifecycle from development to
    production.
• Systems Management or IT Operations Management
  – IT Operations is responsible for the smooth functioning of the infrastructure and operational environments
    that support application deployment to internal and external customers, including the network
    infrastructure; server and device management; computer operations; IT infrastructure library (ITIL)
    management; and help desk services for an organization.

                                                   Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
DevSecOps is changing Development and Operations
Cloud is forcing an evolution away from established practices
• Developer Trends               • Security                                                               • Operations transformation
  –   Microservices                – Loss of “Fortress” or                                                       –     Docker
  –   Continuous Integration         “Perimeter” of protection                                                   –     Kubernetes
  –   High Frequency Releases      – Cyber Kill Chain                                                            –     Hybrid Clouds
  –   Open Source Frameworks       – 2000: Thrill seeking Geeks                                                  –     Continuous Deployment
  –   Real time Data pipelines     – 2008: Profit seeking insiders                                               –     Zero Downtime releases
  –   SPARK, Cassandra, Kafka      – Now: Highly organized cyber                                                 –     Chef, Ansible, Jenkins
                                     syndicates, nation states
  –   Akka, Scala
  –   Jenkins

                                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
The Cyber Security Kill-Chain
             Research

                        Infiltration

                                                Discovery

           Bad Guys                                                                   Good Guys

                                                  Capture

                        Exfiltration

                                 Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Program Agenda

        1   Defining terms
        2   Why DevSecOps is perfect for machine learning
        3   Making Machine Learning Smarter for SecOps
        4   Demo
        5   Q&A

                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEV5059: Using Machine Learning to Make DevSecOps a Reality - Oracle Code One Vijay Tatkar Director, Product Management Oracle Management Cloud ...
Developers Need To Increase Code Security Awareness
Because fixing code at development is 60x cheaper than a patch
• Top Security threat concerns:*                                                   Simple Preventions:
  –   Phishing: 43%                                                                       – 93% of breaches could have been easily
  –   SQL Injection: 49%                                                                    prevented (*Online Trust Alliance Report)
                                                                                            • Regularly patch & update software
  –   DDoS: 46%
                                                                                            • Block fake emails via authentication
  –   XSS: 37%
                                                                                            • Train engineers to recognize phishing attacks
• Protect yourself:                                                                       – Do risk assessments
  – Static Checking, Dynamic Checking tools:                                              – Encrypt end-to-end
      • Coverity, FindBugs, AppScan, HP Fortify, Lint, Analyzer
                                                                                          – Ensure that devices & servers are configured
  – Appropriate privileges to bots, agents
  – Data types and sensitivity
  – Build system controls: add logging, event
    monitoring, configuration
                  * Source: Dzone survey of >1000 developers: 2016

                                                                     Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Four Drivers in Modern-Day Cybersecurity
Security posture must be Asset-, Identity and Hybrid Cloud-Aware – at DevOps speed

Protected Assets = Data                     Perimeter = Identity                             Model = Hybrid Cloud                                    Driver = Innovation
• “Protect the data, forget the         • “IAM leaders should adopt these                 • “The secure use of public clouds                      • “The reality is business leaders
  perimeter, says PwC security            identity life cycle best practices …              requires explicit effort on the part                    are moving full speed ahead, with
  chief”                                  to properly establish an identity                 of the customer.”                                       or without you…”
                                          perimeter. ”

                       -- Silicon Republic Interview with Kris McKonkey, PwC Cybersecurity Partner, Nov 2015
                       -- IGA Best Practices, Gartner, Aug 2016
                       -- Jay Heiser, Gartner Analyst, Nov 2015
                       -- Neil MacDonald, Gartner Analyst, Nov 2017

                                                                         Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Program Agenda

        1   Defining terms
        2   Why DevSecOps is perfect for machine learning
        3   Making Machine Learning Smart for SecOps
        4   Demo
        5   Q&A

                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Oracle Management Cloud
First Cloud Native Management and Security Solution
                                                                                    Application
                                                                                   Performance
                        Global threat feeds                                         Monitoring
END USER                Cloud access
EXPERIENCE / ACTIVITY
                        Identity
                                              Infrastructure
                                                                                                                                                     Unified, Intelligent
                        Real users                                                                                               Orchestration
                                               Monitoring                                                                                            Management
APPLICATION             Synthetic users
                                                                                                                                                     Platform
                        App metrics
                        Transactions
MIDDLE TIER
                        Server metrics                                                                                                               Powered by
                        Diagnostics logs                                                                                                             Machine Learning
DATA TIER                                       Log                                                                                         IT
                        Host metrics          Analytics                                                                                  Analytics
                        VM metrics
                        Container metrics
VIRTUALIZATION TIER                                                                                                                                  Auto-remediation
                        Configuration
                        Compliance
                        Tickets & Alerts                       Configuration                                   Security
INFRASTRUCTURE TIER                                            & Compliance                                   Monitoring &
                        Security & Network                                                                     Analytics
                        events

                                                                 Copyright © 2018 Oracle and/or its affiliates. All rights reserved. |
ML Is Ideally-Suited for Security & Management
• Massive Data Volume     • Data Is Highly-Patterned                                           • Need Insights, Not Data

 Terabytes of telemetry    Unified metric and log                                                    We know the kinds of
 generated every day       data can be understood                                                    questions we want to ask
 overwhelm humans          by purpose-built ML
                                                                                                                     Is what I’m seeing
                                                                                                  What caused the        normal or
                                                                                                    problem?             abnormal?

                                                                                                 What do I need to   What problem is
                                                                                                 pay attention to    coming up in the
                                                                                                   right now?          near future?

                                   Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Unified Data Informs Both Security and Management
• Example: Configurations/Topology • Example: Performance metrics

                                                                               – Time-series performance data from
                                                                                 end-user to disk across hybrid estate
        >3800           >5600            >49000                                – Modeled and correlated over time for
        Number of property settings available in
   basic installs of Oracle Database, Exalogic, Exadata
                                                                                 anomaly detection and forecasting

  Why security cares:            Why ops cares:                                      Why security cares:                             Why ops cares:
  misconfigurations             misconfigurations                                      anomalies may                               root cause analysis
   leave data and IT            cause majority of                                    indicate malware or                            of issues; outage
    assets exposed             performance issues                                        ransomware                                     prevention

                                                          Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Security Monitoring & Analytics
• Cloud-native
• Built on integrated OMC platform
• Continuous monitoring, analytics-
  driven, and self-learning
• Automated response
• Has identity context
• ML models, rules, and correlation
  for high fidelity threat detection

                                       Copyright © 2018 Oracle and/or its affiliates. All rights reserved. |
Configuration & Compliance Cloud Service
Continuous Compliance Across Hybrid Cloud Estate

• Maintain industry and regulatory
  compliance (STIG, GDPR, etc.)

• Enforce company-specific
  compliance across hybrid clouds

• ML driven configuration drift
  management

                                     Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Program Agenda

        1   Defining terms
        2   Why DevSecOps is perfect for machine learning
        3   Making Machine Learning Smart for SecOps
        4   Demo
        5   Q&A

                              Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
DEMO: Decoding the Cyber Kill Chain
    A “Spearfish” starts a chain of threat events

                                          Kill Chain is a sequence:                                                  We will decode some
                                           – Recon: Suspicious User                                                  threat types:
                                             Activity                                                                      –   WebAccessAnomaly
                                           – Infiltration: Hijacked Account                                                –   MultipleFailedLogins
                                           – Lateral Movement: Malicious                                                   –   BruteForceAttack
                                             User Behavior
Mary Baker gets infected                                                                                                   –   CASBAlertO365
•   Sets in motion a Cyber “Kill Chain”    – Exfiltration: Data exposure
                                                                                                                           –   SQLAnomaly
                                                                                                                           –   TargetAccountAttacks
                                                                                                                           –   MultipleAccountCreation
                                                                                                                           –   LocalAccountCreation

                                                  Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |                             19
The Cyber Security Kill-Chain & How to prevent Threats
      Security       Research
    Intelligence
                                  Infiltration
                              Apps &
                           Network Logs                   Discovery                               DB Security

                   Bad Guys                                                                     Good Guys
                                Correlation &
                                                            Capture
                                 ML models

                                                                    Auto-
                                  Exfiltration
                                                                 remediation

                                           Copyright © 2017, Oracle and/or its affiliates. All rights reserved.
How to protect yourself
• Continuous Monitoring             • Algorithms and Insights                                              • Automated Security
  – Continuous monitoring of          – Purpose-built ML to                                                       – Auto-response to critical
    Users, Applications and             dynamically set baselines to                                                alerts
    Databases to reduce Mean            detect and correlate                                                      – Orchestrate playbooks to
    time to Detect (MTTD)               anomalies                                                                   trigger auto-remediation
  – Continuous assessment of          – Enrichment of log data with                                               – Quick forensics and
    users and entity behavior for       rich security categorization                                                automated ticketing to reduce
    anomaly detection                 – Real-time snapshot of your                                                  mean time to respond (MTTR)
  – Identify Anomalous                  security and compliance                                                   – Real-time snapshot of security
    behavior, suspicious                posture for better risk                                                     and compliance posture
    activities and policy               management
    violations                        – Deep Security monitoring
  – Ensure the right security           for Database and
    controls are on your IT             Applications

                                               Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Key Takeaways
• DevSecOps depends on “SecOps”
  speed matching “DevOps” speed
• The DevSecOps problem is well-suited
  to machine learning
 BUT…

• Machine Learning must be matured
• Unified data and context increases the
  effectiveness of ML and analysis

                                   Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Oracle POVs on ML-Enabled Management & Security

https://www.forbes.com/sites/oracle/2017/04/25/is-your-systems-management-software-smart-enough/

                                                                                                                     https://developer.oracle.com/code

      https://www.darkreading.com/vulnerabilities---threats/the-soc-is-deadlong-live-the-soc/a/d-id/1329284?         https://www.forbes.com/sites/oracle/2017/07/10/cant-stop-cyberattacks-teach-your-computer-to-do-it/

                                                                                                        Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
For More Information

Cloud.oracle.com/management
Cloud.oracle.com/security

#MgmtCloud       community.oracle.com/mgmtcloud
@OracleMgmtCloud

                                             Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
You can also read