Home Cyber Security Palo Alto Networks CTO Talks Securing ‘Code to Cloud’

Palo Alto Networks CTO Talks Securing ‘Code to Cloud’

0
Palo Alto Networks CTO Talks Securing ‘Code to Cloud’

[ad_1]

The Palo Alto logo on a screen and more info about the company on a phone.
Picture: Timon/Adobe Inventory

Palo Alto Networks held its annual Code to Cloud Cybersecurity Summit Thursday, specializing in cloud, DevOps and safety. Consultants mentioned developments, alternatives and challenges with coding and the cloud.

Not too long ago, Palo Alto Networks’ Unit 42 issued a cloud menace report discovering that the typical safety workforce takes six days to resolve a safety alert. Its State of Cloud-Native Safety Survey revealed 90% of organizations can not detect, comprise and resolve cyberthreats inside an hour. Unit 42 additionally not too long ago revealed new API menace analysis, which discovered that 14.9% of assaults in late 2022 focused cloud-hosted deployments.

Among the many audio system on the occasion was Ory Segal, chief expertise officer at Palo Alto Networks Prisma Cloud, who joined a panel on how cloud safety might be aligned with the aggressive growth cycle beneath which builders work.

Previous to the occasion, he spoke to TechRepublic about defending the software program growth course of and cloud-native software platforms (CNAPP). (Determine A)

Determine A

Ory Segal, chief technology officer at Palo Alto Networks.
Ory Segal, chief expertise officer at Palo Alto Networks.

Soar to:

CNAPP as a platform

TR: What constitutes a CNAPP (cloud-native software safety platform) now? What falls beneath that banner, and the way do you untangle the completely different approaches to it with regards to DevOps safety, with regards to … [reducing] vulnerabilities in purposes lifted to the cloud or written for cloud environments?

Segal: Totally different corporations get to the purpose the place they are often thought-about CNAPPs primarily based on their journey. Some began from container safety, like Twistlock (acquired by Palo Alto Networks) or Aqua safety, for instance. Some arrived … from cloud safety posture administration. So it actually is determined by who you ask. However I like Gartner’s perspective: The emphasis is on holistic cloud native safety, so it’s not about “cloud safety,” “workload safety” or “code safety.” It’s about offering a platform that lets you apply the appropriate kinds of safety controls all through the event lifecycle, from the second you begin coding to the cut-off date when you find yourself deployed and monitoring the workloads. And beneath that fall many, many various classes of merchandise, not all of which might be straight regarded as part of CNAPP.

TR: What are some good examples of CNAPP inside the growth cascade or cycle? Is CNAPP a blanket time period for any DevSecOps?

Segal: So clearly, scanning infrastructure-as-code templates as you develop software program to just remember to will not be embedding any form of dangers or misconfigurations on the left; doing software program composition evaluation to keep away from or forestall the danger [of bad code or vulnerabilities] from getting deployed. Even doing static evaluation, one thing that right this moment we’re exploring however will not be but providing, however I feel SAST (static software safety testing), DAST (dynamic software safety testing) and IAST (interactive software safety testing), all of that are software safety testing on the whole, are elements of that.

SEE: Sticking to the normal playbook is a mistake for cloud safety (TechRepublic)

TR: And additional to the appropriate extra towards manufacturing?

Segal: After which as you construct the product, scanning and securing artifacts, accompanying the method of deployment to the cloud, monitoring and defending the workloads as they run. And that features runtime safety, WAF (net software firewall), [application programming interface] safety, and issues which are extra associated truly to safety operations facilities, monitoring the workloads.

Securing the software program growth pipeline

TR: With all of those purposes that fall beneath CNAPP, is there an space that’s not sufficiently addressed by many of the options obtainable?

Segal: Sure, on prime of that, and one thing that we’re at the moment exploring because of our acquisition of Cider Safety — and one thing that the majority disregard or haven’t but thought of — is the safety of the CI/CD (steady integration/steady growth) pipeline itself, which in trendy growth environments constitutes very subtle and complicated purposes by themselves.

TR: However isn’t the CI/CD pipeline simply the beads within the necklace, because it had been? What, in concrete phrases, is the excellence between the CI/CD pipeline and the step-wise DevOps code-to-cloud processes?

Segal: It’s not the applying that you’re constructing on your prospects, however somewhat the applying that you’re utilizing to construct your personal software program; third-party libraries that you just’re bringing in, for instance, or if we’re utilizing Jenkins or CircleCI to construct code and generate artifacts, are we securing these factors as nicely? As a result of I can write probably the most safe cloud-native software and deploy it, but when any individual can one way or the other tamper with the pipeline itself — with my construct and deployment course of — the entire safety that I’m embedding in my very own code will not be worthwhile.

TR: As a result of any individual can simply poison the pipeline.

Segal: They will embed malware, as we noticed occur to SolarWinds in 2020 and have seen quite a few occasions these days. And so that is one thing that we’re additionally now contemplating part of CNAPP, regardless that you gained’t usually see it described that approach.

How the general public cloud creates vulnerabilities for CI/CD

TR: How are cloud-based, open-sourced codebases and hybrid work affecting CI/CD?

Segal: The way in which we used to construct software program — and I’m not speaking in regards to the languages and the frameworks, I’m speaking merely in regards to the construct course of itself — we’d run supply code administration regionally, on a server, not even an information middle, however our personal IT infrastructure. We’d pull and push code regionally, construct after which burn it on a CD and ship it to our prospects. In the present day, many of the organizations that we work with use some form of GIT repository, utterly on the general public web, and utilizing increasingly companies to do the construct. Jenkins, GitLab, CircleCI, for instance, most of that are consumed as build-as-a-service platforms.

TR: So, not native in any sense and never protected inside a fringe?

Segal: In essence, your entire workflow is hosted on the general public web to some extent. Moreover, builders usually use their very own laptops to develop, usually accessing their GIT repositories by means of a browser. And in the event that they occur to obtain and reply to a phishing e mail or different social engineering assault, they might be susceptible to the actor manipulating them and stealing, for instance, session tokens from the browser, which might then give the attacker direct entry to the GitHub repository. From there, they will start to poison the event course of. So from the perspective of zero belief, we’re exposing probably the most delicate factors in the way in which we develop software program right this moment, so it’s not very nicely managed. So, no, there isn’t any perimeter anymore.

Defending the provision chain

TR: By way of defending the provision chain, going again to different merchandise designed to make sure the hygiene of the CI/CD pipeline, I’m conscious of merchandise, some open supply on the market, like in-toto, which assures signatures for each step within the growth course of, so there are not any factors left invisible and susceptible.

Segal: I’ve checked out that undertaking. We not too long ago, a couple of months in the past, acquired an organization in Israel, a startup known as Cider, that was actually a pioneer on this house. And as a part of that acquisition, we’re creating a brand new safety module that applies safety guardrails to the CI/CD pipeline.

TR: What does this do for safety groups?

Segal: For a safety particular person, it “activates the lights,” illuminating the event pipelines, as a result of right this moment IT safety software groups are utterly out of the loop with regards to this CI/CD course of, resulting from the truth that we have now shifted from a waterfall mannequin to a delivery mannequin, and which means massive percentages of our prospects are pushing code a number of occasions a day — or a number of occasions every week. There’s lots of aggressive stress for groups to develop and push increasingly new issues each week, so builders are tremendous busy with coding performance. Even anticipating them to make use of static code evaluation is a bit on the market. On this paradigm, the IT safety or software safety groups can’t be the choke factors. They can’t be blockers; they have to be perceived as aiding.

TR: And what does that imply in apply?

Segal: Meaning they can not cease processes to scan each code that’s being pushed. And so they positively don’t have any visibility into the character of CI/CD pipelines, or the place builders are pushing code to, or what the artifacts and dependencies are or whether or not or not there are dangers, corresponding to whether or not build-as-a-service plugins have entry to code.

TR: By ‘artifacts,’ you imply binaries?

Segal: It could possibly be binaries, container pictures, serverless perform code and even EC2 (Amazon’s cloud computing platform) pictures. It contains all of the third-party packages, packaged normally as pictures or capabilities able to get pushed to the cloud.

Palo Alto Networks Prisma Cloud to reinforce CI/CD safety

TR: So you might be popping out with a Palo Alto Prisma Cloud product particular to securing CI/CD.

Segal: Sure, we’re planning so as to add a CI/CD safety module to the Prisma Cloud platform to assist safe the software program provide chain. You begin by onboarding your cloud accounts, your code repositories, your construct processes. After which we begin scanning all the things. We’ll scan your code on the left. We’ll scan these associated artifacts — the container pictures, for instance — when they’re constructed, and we’ll apply runtime safety on the appropriate. And the entire thing is ruled and operated by the Cloud Safety workforce, which is answerable for the end-to-end course of for all the things till you push it to the cloud. It’s ensuring that the cloud account is safe, ensuring that you just don’t have any property with dangers being deployed to the cloud.

SEE: Why cloud safety has a “forest for bushes” downside (TechRepublic)

TR: Clearly, shifting left is paramount as a result of after getting deployed to the cloud flawed or susceptible codebases, you’ve created a hydra, proper?

Segal: One line of code, for instance, in a file that you just write, goes right into a repository that may generate a number of container pictures that get deployed into many, many various clusters on a number of cloud accounts. And so when you had been to play that form of whack-a-mole and assault the issue on the appropriate, you would need to go and repair and patch hundreds of situations of the identical downside.

How Palo Alto Networks avoids the ‘hydra downside’

TR: Should you wait till it’s already on the market, you might be coping with not one downside, however hundreds.

It turns into a disseminated downside. How do you repair that?

Segal: Give it some thought this fashion: You make a mistake within the code of a purchasing cart performance in your software, which is now deployed to five,000 containers which are operating redundantly to help the site visitors on a number of clouds — Google Cloud, AWS, Azure, no matter — in a number of areas. Now, you get a scanning alert from the runtime facet saying you’ve 5,000 situations which are susceptible. In case your platform is clever sufficient, you possibly can map all of it the way in which again to that dangerous line of code and that particular code dedicated by that particular developer. You’ll be able to open a ticket to that developer to repair the issue and resolve it in these hundreds of situations. Additionally, you’ll want to prioritize these points: Let’s say you’re trying on the outcomes on the code stage, and also you see a thousand issues that it’s important to repair. How have you learnt which downside is probably the most extreme? Should you now have data from the dwell surroundings, you possibly can establish susceptible code being utilized in a manufacturing mission-critical surroundings, versus an issue that’s solely in your staging surroundings, which isn’t as extreme and is definitely not an imminent menace. These are the sorts of issues {that a} CNAPP permits you, supposedly, to do.

TR: Properly, that’s crucial as a result of it saves lots of time doubtlessly?

Segal: That’s proper, as a result of there are hundreds of thousands of potential dependencies and actually you solely must deal with those which are related. Having that runtime visibility, and never solely trying on the static facet, is what could make an enormous distinction. In Prisma Cloud, for instance, our Cloud Workload Safety registers which software program packages are literally loaded into reminiscence within the operating containers. And that is gold. This knowledge is precisely what you want in an effort to know how one can prioritize what you need to repair first.

[ad_2]