Next up at #VelocityConf is @laurentgil [sponsored talk] about the audience vs. the Internet and security risks.
@laurentgil Prefix advertisement/hijacking attacks for DNS servers; falsified resolver results being returned for a phishing Ukrainian server. [ed: doesn't SSL save us from this?] #VelocityConf
Another case study: an anonymous Dyn customer that sounds a lot like ZocDoc who got attacked by a botnet. #VelocityConf
ah, no, not a botnet, a crawler that was trying to steal ZocDoc's dataset.
Another case: Data Intelligence stealing other peoples' hard-computed flight pricing data by crawling it. #VelocityConf
[ed: and yeaaaah that shit is *expensive* to create, yo. QPX licenses are expensive for one-off computation, and the Google Flights cache is incredibly expensive to compute. --a former Google Flights SRE] #VelocityConf
And peoples' entire internet in a country can be taken down, or access can be subverted by Russia to spearphish journalists, government officials, etc. c.f. Trump-Kim Jong Un summit in Singapore [fin] #VelocityConf
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Final talk I'll be getting to at #VelocityConf before I dash to Toronto: @IanColdwater on improving container security on k8s.
@IanColdwater She focuses on hardening her employer's cloud container infrastructure, including doing work on k8s.
She also was an ethical hacker before she went into DevOps and DevSecOps. #VelocityConf
She travels around doing competitive hacking with CTFs. It's important to think like an attacker rather than assuming good intents and nice user personas that use our features in the way the devs intended things to be used. #VelocityConf
My colleague @sethvargo on microservice security at #VelocityConf: traditionally we've thought of traditional security as all-or-nothing -- that you put the biggest possible padlock on your perimeter, and you have a secure zone and untrusted zone.
@sethvargo We know that monoliths don't actually work, so we're moving towards microservices. But how does this change your security model?
You might have a loadbalancer that has software-defined rules. And you have a variety of compartmentalized networks. #VelocityConf
You might also be communicating with managed services such as Cloud SQL that are outside of your security perimeter.
You no longer have one resource, firewall, loadbalancer, and security team. You have many. Including "Chris." #VelocityConf
The problems we're solving: (1) why are monoliths harder to migrate? (2) Should you? (3) How do I start? (4) Best practices #VelocityConf
.@krisnova is a Gaypher (gay gopher), is a k8s maintainer, and is involved in two k8s SIGs (cluster lifecycle & aws, but she likes all the clouds. depending upon the day). And she did SRE before becoming a Dev Advocate! #VelocityConf
"just collect data and figure out later how you'll use it" doesn't work any more. #VelocityConf
We used to be optimistic before we ruined everything.
Mozilla also used to not collect data, and only had data on number of downloads, but its market share went down because they weren't measuring user satisfaction and actual usage. #VelocityConf