<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Eric Estes and David Kovacs, ATOS, Author at IoTAC</title>
	<atom:link href="https://iotac.eu/author/david-kovacsatos-net/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/author/david-kovacsatos-net/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Thu, 05 Aug 2021 10:50:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Eric Estes and David Kovacs, ATOS, Author at IoTAC</title>
	<link>https://iotac.eu/author/david-kovacsatos-net/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Operate &#038; Monitor Phase Methodology</title>
		<link>https://iotac.eu/operate-monitor-phase-methodology/</link>
					<comments>https://iotac.eu/operate-monitor-phase-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Eric Estes and David Kovacs, ATOS]]></dc:creator>
		<pubDate>Thu, 05 Aug 2021 10:50:18 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[honeypots]]></category>
		<category><![CDATA[IoT security]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=8305</guid>

					<description><![CDATA[<p>The operate and monitor phases are the final phases of the SDLC. They are collectively referred to as the maintenance phase and they are commonly thought of as a rather passive part of the process, but nothing could be further from the truth. This is where all the action is....</p>
<p>The post <a href="https://iotac.eu/operate-monitor-phase-methodology/">Operate &#038; Monitor Phase Methodology</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The operate and monitor phases are the final phases of the SDLC. They are collectively referred to as the maintenance phase and they are commonly thought of as a rather passive part of the process, but nothing could be further from the truth. This is where all the action is. This is where real-life threats happen, where vulnerabilities are exploited. Here, you find out exactly how secure your application is, and if you’re up to the task of responding appropriately and in time. The IoTAC’s Security-by-Design methodology offers several ways to improve security at this crucial phase of development.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-8304 size-large" src="https://iotac.eu/wp-content/uploads/2021/08/operate-1-1024x398.png" alt="" width="1024" height="398" srcset="https://iotac.eu/wp-content/uploads/2021/08/operate-1-1024x398.png 1024w, https://iotac.eu/wp-content/uploads/2021/08/operate-1-300x117.png 300w, https://iotac.eu/wp-content/uploads/2021/08/operate-1-768x298.png 768w, https://iotac.eu/wp-content/uploads/2021/08/operate-1-1536x597.png 1536w, https://iotac.eu/wp-content/uploads/2021/08/operate-1.png 1719w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;"><em>Figure 1: Security during Operate/Monitor phase – IoTAC Methodology</em></p>
<p><strong>Operate</strong></p>
<p><img decoding="async" loading="lazy" class="size-medium wp-image-8303 alignright" src="https://iotac.eu/wp-content/uploads/2021/08/operate-2-300x271.png" alt="" width="300" height="271" srcset="https://iotac.eu/wp-content/uploads/2021/08/operate-2-300x271.png 300w, https://iotac.eu/wp-content/uploads/2021/08/operate-2.png 490w" sizes="(max-width: 300px) 100vw, 300px" />Just like in the Release and Deploy phase you should follow the principle of least privilege. Define a small group with the least access required to do the task. Use multi-factor authentication to prevent stolen passwords from being used against you.</p>
<p>Employ and follow a change governance framework. This will help you avoid shortcuts in deployment and recognize environment configuration drift. These benefits are the result of a combination of release automation and carefully designed policies and permissions for infrastructure changes.</p>
<p>Use an issue management tool to report and track bugs and change requests. Always execute a root-cause analysis and share the results with the development team. Make sure that the tool maintains a log of changes for each release.</p>
<p style="text-align: right;"><em>Figure 2: Operate phase activities – IoTAC Methodology</em></p>
<p>Prepare and rehearse for disaster recovery. Implement a backup plan for each component with special attention towards secure storage. Estimate a mean time to recovery (MTTR) and record the actual time in any real recovery event.</p>
<p>Perform active monitoring, if an alert is received or some risk is indicated during monitoring, perform due diligence to alleviate or minimize the impact. Periodically run manual testing tools to evaluate system health.</p>
<p><strong>Monitor</strong></p>
<p>Ensuring application availability and security is a complex task that includes data collection, log analysis, automated self-defence, and alerting.</p>
<p>Monitoring and automatic notification are a must to ensure application and infrastructure health and therefore a smooth user experience. A monitoring tool needs to collect metrics about application performance and be able to present the data graphically to quickly ascertain its status. The tool should be determined during the plan and design phases and depends on your environment. Regardless of the exact tool chosen, you should be able to collect metrics about CPU utilization, RAM usage, requests, errors, response times, and incoming/outgoing network data volume over a certain period. Based on these metrics you can create automated alerts informing the operations team and, in cloud environments, trigger automatic actions to scale the infrastructure as needed. Make sure to include logging of user activities, errors, and hardware failures. Keep in mind these logs should not contain sensitive or personal information but should allow for queries to parse the data and present it for further analysis. When you receive an error, automatically create a notification, and consider creating a ticket as well.</p>
<p>The network is the main way attacks are made so we have to monitor them continuously and raise an alert when suspicious activity is recognized. Such as:</p>
<ul>
<li>Suddenly receive a large number of requests from a specific source</li>
<li>Ports scan or other discovery tools are recognized</li>
<li>Requests try to leverage well-known vulnerabilities</li>
<li>Intrusion detection</li>
</ul>
<p>In addition to network monitoring, we also need a security perimeter. You can accomplish this with a Web Application Firewall (WAF). The WAF can serve as a gateway to your application and helps recognize and prevent malicious requests or Distributed Denial of Service (DDOS) attacks.</p>
<p>Use Runtime Application Self-Protection as a concentric ring of security inside the WAF perimeter. Since RASP runs within your application on a server it is more aware of specific application design, possible vulnerabilities, and can detect and mitigate real-time attacks. It can notify security personnel, terminate a user’s session, send the attacker messages, and in extreme cases shut down the application to avoid the system from being compromised. RASP’s contextual awareness can also reduce the number of false-positive reports from less informed components.</p>
<p>Vulnerability scanning is an extension of the secure hardening verification approach discussed in the Release and Deploy methodology. While scanning on release is important, it is equally important to run the scan in production weekly, and vital to act if problems are discovered.</p>
<p>This scan should cover:</p>
<ul>
<li>OS, service, platform, framework, and component patch level and known vulnerabilities.</li>
<li>Configuration settings of the environment to ensure that best practices are followed.</li>
<li>Endpoint security check using common and newly discovered vulnerabilities.</li>
</ul>
<p>The real key here is to make it a habitual task to scan, evaluate the results, and correct/improve the scan as needed.</p>
<p>The operate and monitor phase methodology may initially appear to be a static process but it is continuous and fluid. Using the proper tools and establishing secure habits you will see your application status, understand vulnerabilities, and repel threats. Cutting-edge security demands vigilance and the IoTAC’s security approach shows you how to meet this demand.</p>
<p>References</p>
<ul>
<li>Runtime application self-protection <a href="https://en.wikipedia.org/wiki/Runtime_application_self-protection">https://en.wikipedia.org/wiki/Runtime_application_self-protection</a></li>
<li>Operating reliable systems  <a href="https://docs.microsoft.com/en-us/devops/operate/operating-reliable-systems-with-devops">https://docs.microsoft.com/en-us/devops/operate/operating-reliable-systems-with-devops</a></li>
<li>Security Content Automation Protocol <a href="https://csrc.nist.gov/projects/security-content-automation-protocol/">https://csrc.nist.gov/projects/security-content-automation-protocol/</a></li>
</ul>
<p>The post <a href="https://iotac.eu/operate-monitor-phase-methodology/">Operate &#038; Monitor Phase Methodology</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/operate-monitor-phase-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Release &#038; Deploy Phase Methodology</title>
		<link>https://iotac.eu/release-deploy-phase-methodology/</link>
					<comments>https://iotac.eu/release-deploy-phase-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Eric Estes and David Kovacs, ATOS]]></dc:creator>
		<pubDate>Thu, 22 Jul 2021 11:34:41 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[honeypots]]></category>
		<category><![CDATA[IoT security]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=8274</guid>

					<description><![CDATA[<p>With all the interconnected devices in the world, integrated seamless communication is a must. This always-available access is seemingly at odds with the goal of security. Additionally, the way in which applications are built has changed over time with many companies merging agile techniques with development and operation processes. The...</p>
<p>The post <a href="https://iotac.eu/release-deploy-phase-methodology/">Release &#038; Deploy Phase Methodology</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With all the interconnected devices in the world, integrated seamless communication is a must. This always-available access is seemingly at odds with the goal of security. Additionally, the way in which applications are built has changed over time with many companies merging agile techniques with development and operation processes. The IoTAC project aims to incorporate security into each step of the software lifecycle, building security into every component and employing new techniques extracted from established industry standards and best practices. Here we will focus on the release and deployment phase, but it should be understood in the larger context of the <a href="https://iotac.eu/technology/#concept">IoTAC security approach</a>.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-8272 size-large" src="https://iotac.eu/wp-content/uploads/2021/07/release-1-1024x398.png" alt="" width="1024" height="398" srcset="https://iotac.eu/wp-content/uploads/2021/07/release-1-1024x398.png 1024w, https://iotac.eu/wp-content/uploads/2021/07/release-1-300x117.png 300w, https://iotac.eu/wp-content/uploads/2021/07/release-1-768x298.png 768w, https://iotac.eu/wp-content/uploads/2021/07/release-1-1536x597.png 1536w, https://iotac.eu/wp-content/uploads/2021/07/release-1.png 1719w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;"><em>Figure 1: Security during Release/Deploy phase – IoTAC Methodology</em></p>
<p>The release and deploy phase methodology is comprised of:</p>
<ol>
<li>Release process automation</li>
<li>Environment management</li>
<li>Performance Testing</li>
<li>Dynamic Application Security Testing</li>
<li>Secure hardening verification approach</li>
</ol>
<p>A key element to a secure release is automation. By using a CI/CD tool like GitLab you can remove error-prone manual steps and ensure consistency. Part of this automation includes checking the origin of the artifacts that your automated process creates. This allows you to sign and verify that the build has not been tampered with and you deploy only what you intended. Your application configuration also needs to be intensified. A common mistake is storing secrets in the source code. This is often overlooked in feature branches, but since the branch history is always available it poses a real threat. If you don’t use a dedicated secret management service, be sure to encrypt your secrets, and regardless of your means of storage only allow the application and a well-defined small group of people access to the settings.</p>
<p>An important piece of the automation pie is to include release pipeline integrity and execution. Again, limit pipeline access to a small well-defined group and ensure changes are monitored and logged. One way to accomplish this is by storing the pipeline definition in the source code repository and enforcing code reviews on branches used to deploy to Staging and Production. As for pipeline execution, it is best to have a manual approval step. This ensures nothing goes to Production without the knowledge and acceptance of key stakeholders. Be sure to log each deployment keeping track of a minimum of when it was deployed, what version, and who approved it.</p>
<p>Managing your environments with security in mind is crucial. Usually, this is broken down into Development, Staging, and Production to serve the needs of various stakeholders. For the development environment, no sensitive production data should be used to avoid accidental leaks. The staging environment should be configured as much like production as is possible including the same automated deployment process. Once the development is completed and all automated tests have run successfully, the application is deployed to the staging environment for further automated and manual testing. The production environment is for the end-users, but the Dev team will need secure access to investigate issues without compromising security. This can be done with monitored jump servers and applying data encryption so that crucial application data is not even available to the maintenance team. The environment setup and configuration must be documented and preferably automated. You can automate using Infrastructure as a Code which is an approach available, for Kubernetes or in Cloud environments.</p>
<p><img decoding="async" loading="lazy" class="size-medium wp-image-8273 aligncenter" src="https://iotac.eu/wp-content/uploads/2021/07/release-2-300x120.png" alt="" width="300" height="120" srcset="https://iotac.eu/wp-content/uploads/2021/07/release-2-300x120.png 300w, https://iotac.eu/wp-content/uploads/2021/07/release-2.png 421w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Performance testing is another key element of application reliability, so it is recommended to perform a volume stress test that simulates requests and client actions. This requires test scenarios that generate a detailed report that can be evaluated and compared for negative impact. If changes are required the whole delivery pipeline should start over. The testing should validate the application is protected from Denial of service (DOS) attacks by either software or hardware components.</p>
<p>Dynamic Application Security Testing (DAST) needs to be implemented as well. DAST focuses on clearly defining a security baseline and having the deployed application employ vulnerability and patch-level scanning. The security baseline is defined for the specific component, including application binaries, application configuration, and infrastructure configuration. This will help to recognize any configuration drift between environments.</p>
<p>The secure hardening verification approach executes security validation in Staging to catch issues before being implemented in Production and it is also run periodically in Production to ensure safe operation. This includes vulnerability scanning of the infrastructure and application code, configuration management, penetration testing, Distributed Denial of Service (DDOS) validation, and following the principle of least privilege. Even with comprehensive automation, some things cannot be easily automated. To fill this gap Red teaming is recommended using a team of security professionals not related to the DEV team. They can perform penetration tests, test for SQL injection, and otherwise, try to infiltrate the system.</p>
<p>Secure release and deployment is not a simple endeavour, but following the release and deploy methodology as part of the IoTAC’s security approach is a surefire way to allow seamless communication with the utmost protection.</p>
<p>References</p>
<ul>
<li>Application and Release Security in GitLab <a href="https://docs.gitlab.com/ee/user/application_security/">https://docs.gitlab.com/ee/user/application_security/</a></li>
<li>Delivering Quality Services <a href="https://docs.microsoft.com/en-us/devops/deliver/delivering-quality-services-with-devops">https://docs.microsoft.com/en-us/devops/deliver/delivering-quality-services-with-devops</a></li>
<li>Security in DevOps <a href="https://docs.microsoft.com/en-us/devops/operate/security-in-devops">https://docs.microsoft.com/en-us/devops/operate/security-in-devops</a></li>
</ul>
<p>The post <a href="https://iotac.eu/release-deploy-phase-methodology/">Release &#038; Deploy Phase Methodology</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/release-deploy-phase-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
