SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Open Source and Security:
Engineering Security by Design



Jeremy Brown
Manager, Solution Architects
Red Hat

December 2011
Overview
 What has Open Source got to do with Security?

 Red Hat – Enforcing Security by Design

 Re-inventing the engagement model

 Virtualisation and mobility – Cloudforms
What has Open Source to do with security?
Security is fundamental and needs the scientific approach of peer
review

If you translate the scientific approach of peer review to software,
the only way to do it is to be Open Source
If you use Solaris, AIX, HP UX, SCO or SCADA you need
to understand that OpenSource is the feeder for your world
93% of all major internet traffic moves using OpenSource
derived architecture, predominantly on Linux, enterprises
secured by Red Hat account for almost 70% of all workloads
87% of all Clouds run on OpenSource, Amazon AWS,
Rackspace, Google, Facebook, Yahoo etc (IDC, Forrester data)
Sunk by Windows NT
http://www.wired.com/science/discoveries/news/1998/07/13987
Security in Depth – Open Source evolution


The OpenSource community historically with it's release early,
release often / peer review / fast fix history is traditionally the
most proven security release model in computing.
If you are concerned about how your platforms evolve you need
to have engagement with Red Hat – sooner rather than later

Security is a LOT more than CERT advisories and version
control – what risk your data and reputation ?
Red Hat – Enforcing Security By Design
We employ 70% of all of the contributors to the mainstream
Linux kernel projects / technologies.
SELinux (NIST adopted), sVirt, SPICE, Gluster, Apache,
LibVirt, KVM – all Red Hat led projects by staff on our payroll

Linux technologies empower DAX, NYSE, NEXT, FTSE

Linux in Defence is already in use in NATO, US, Australia

Ever increasing government adoption of certified Linux
partnering with Red Hat in supported programmes
Red Hat – Security Certifications and
Accreditations

Red Hat Enterprise Linux is the most certified operating
system available today.
RHEL has passed the Common Criteria process 13 times on four
different hardware platforms.
Red Hat Enterprise Linux 5 has even received Common Criteria
certification at Enterprise Assurance Level 4 (EAL 4+) under the
Controlled Access Protection Profile (CAPP), Label Security
Protection Profile (LSPP) and the Role-Based Access Control
Protection Profile (RBACPP), providing a level of security and a
feature set that was previously unheard-of from a mainstream
operating system.
JBoss Enterprise Application Platform is Common Criteria certified
at EAL 2+.
Red Hat – Reacting to Security Threat
Fourteen year track record in CERT advisory publication and
patch creation.
Industry leading reaction speed to patch creation, testing,
documentation and push not just to our supported customer
subscription base but to the entire community (which will
appear often months later in Oracle Linux, SuSE, Ubuntu,
and AIX 5.x).

Acknowledged by US Gov, NIST, Symantec & CERT as
the most prolific security patching and release of any
software vendor including Microsoft.
Red Hat – Reacting to Security Threat




      Source: http://www.awe.com/mark/blog/20110520.html
Red Hat – Security in Depth - Realtime
Microsoft time to patch release on ave 14-17 days for minor
system security releases, often longer, 9-11 days for major
system vulnerabilities in cycle – rarely sub 7 days for a patch

Red Hat average time to release a patch is one day, often
the release of a documented advisory and the release of both
fix AND source to customer and the wider community is less
than 18-24 hours post discovery. Sometimes quicker.

This is part of the Red Hat commitment to security and
our stance on reputation protection and end user value
for our subscription customers across the board.
Virtualisation / Mobility – new threats
Cloud – new security audit / accreditation / threat fabric / GRC

Misunderstood / non defined audit model for vendors

Risk of vendor non compliance / governance control

Mobility of data and application – what can we migrate ?

Understanding the hidden costs of Cloud aligned to security

Vendor selection process – involving Red Hat at Day One

Understanding security within cloud application lifecycle
Virtualisation Vulnerabilities
IBM X-Force 2010 Mid-Year Trend and Risk Report




  ftp://public.dhe.ibm.com/common/ssi/ecm/en/wgl03003usen/WGL03003USEN.PDF
Engagement Model
Are you a consumer of technology or do you see yourself as
a thought leader / decision maker in platform evolution ?
Understanding how / when to engage – event or vendor driven ?
Picturing risk and building threat fabric models – modelling risk
Protecting core platforms from zero day attack and exploit
Re-educating sovereign governments around accreditation
and empowering the future of your IT ownership
Reducing core implementation costs / protecting platforms/data
Delivering the ability to protect at sovereign territory level with
confidence and with backup from Red Hat globally and locally
Cloud introduces new management challenges
Moving ahead – next steps
We are already engaged with Governments and Agency’s
around the world.

We are MORE than a Linux OS provider!! We are an Open
Source company and Security is at the heart of what we do

Red Hat are part of the evolution of where you are already going

How can we assist you ? Accreditation / Applications / Ambition

Security of platforms and architecture – Red Hat should be part
of your business as usual process – we're here to help you

Engage with your local Red Hat EMEA organisation
Thanks for listening

Questions? - jeremy@redhat.com

Más contenido relacionado

La actualidad más candente

Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
Steve_Harris_Resume_May_31_2016
Steve_Harris_Resume_May_31_2016Steve_Harris_Resume_May_31_2016
Steve_Harris_Resume_May_31_2016Steven Harris
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityEC-Council
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and securityDenis Jakuzza
 

La actualidad más candente (20)

SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
Steve_Harris_Resume_May_31_2016
Steve_Harris_Resume_May_31_2016Steve_Harris_Resume_May_31_2016
Steve_Harris_Resume_May_31_2016
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and security
 

Destacado

London DevOps Meetup - PaaS as a platform for devops
London DevOps Meetup - PaaS as a platform for devopsLondon DevOps Meetup - PaaS as a platform for devops
London DevOps Meetup - PaaS as a platform for devopsJeremy Brown
 
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...Jeremy Brown
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
 
Docker and DevOps - Why it matters
Docker and DevOps - Why it mattersDocker and DevOps - Why it matters
Docker and DevOps - Why it mattersJeremy Brown
 
Government ICT 2.0 - Removing The G-Cloud Lock In
Government ICT 2.0 - Removing The G-Cloud Lock InGovernment ICT 2.0 - Removing The G-Cloud Lock In
Government ICT 2.0 - Removing The G-Cloud Lock InJeremy Brown
 
Creating compelling user experiences through APIs
Creating compelling user experiences through APIsCreating compelling user experiences through APIs
Creating compelling user experiences through APIsJeremy Brown
 
Virtualisation at Ringo
Virtualisation at RingoVirtualisation at Ringo
Virtualisation at RingoJeremy Brown
 
Outside in thinking - How APIs can help open up your business
Outside in thinking - How APIs can help open up your business Outside in thinking - How APIs can help open up your business
Outside in thinking - How APIs can help open up your business Jeremy Brown
 
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsAPIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsJeremy Brown
 

Destacado (9)

London DevOps Meetup - PaaS as a platform for devops
London DevOps Meetup - PaaS as a platform for devopsLondon DevOps Meetup - PaaS as a platform for devops
London DevOps Meetup - PaaS as a platform for devops
 
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...
Agile, DevOps, Continuous Delivery and Lean - How do you tie it all together ...
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Docker and DevOps - Why it matters
Docker and DevOps - Why it mattersDocker and DevOps - Why it matters
Docker and DevOps - Why it matters
 
Government ICT 2.0 - Removing The G-Cloud Lock In
Government ICT 2.0 - Removing The G-Cloud Lock InGovernment ICT 2.0 - Removing The G-Cloud Lock In
Government ICT 2.0 - Removing The G-Cloud Lock In
 
Creating compelling user experiences through APIs
Creating compelling user experiences through APIsCreating compelling user experiences through APIs
Creating compelling user experiences through APIs
 
Virtualisation at Ringo
Virtualisation at RingoVirtualisation at Ringo
Virtualisation at Ringo
 
Outside in thinking - How APIs can help open up your business
Outside in thinking - How APIs can help open up your business Outside in thinking - How APIs can help open up your business
Outside in thinking - How APIs can help open up your business
 
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsAPIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
 

Similar a Open Source and Security: Engineering Security by Design - Prague, December 2011

Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Lucy Huh Kerner
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline SecurityJames Wickett
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 

Similar a Open Source and Security: Engineering Security by Design - Prague, December 2011 (20)

Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
2011 NASA Open Source Summit - Brian Stevens
2011 NASA Open Source Summit - Brian Stevens2011 NASA Open Source Summit - Brian Stevens
2011 NASA Open Source Summit - Brian Stevens
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Top Cloud Threats
Top Cloud ThreatsTop Cloud Threats
Top Cloud Threats
 
Csathreats.v1.0
Csathreats.v1.0Csathreats.v1.0
Csathreats.v1.0
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 

Más de Jeremy Brown

2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products
2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products
2019 Agile-Lean Ireland - Awesome Teams Build Awesome ProductsJeremy Brown
 
DOES London - APIs for DevOps Teams, Creating Open Culture Bubbles
DOES London - APIs for DevOps Teams, Creating Open Culture BubblesDOES London - APIs for DevOps Teams, Creating Open Culture Bubbles
DOES London - APIs for DevOps Teams, Creating Open Culture BubblesJeremy Brown
 
APIs for Teams, Creating Open Culture Bubbles
APIs for Teams, Creating Open Culture BubblesAPIs for Teams, Creating Open Culture Bubbles
APIs for Teams, Creating Open Culture BubblesJeremy Brown
 
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...Jeremy Brown
 
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss Perspective
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss PerspectiveRed Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss Perspective
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss PerspectiveJeremy Brown
 
An Introduction To The Red Hat Model
An Introduction To The Red Hat ModelAn Introduction To The Red Hat Model
An Introduction To The Red Hat ModelJeremy Brown
 
JBoss Enterprise Update - London JBUG May 2013
JBoss Enterprise Update - London JBUG May 2013JBoss Enterprise Update - London JBUG May 2013
JBoss Enterprise Update - London JBUG May 2013Jeremy Brown
 

Más de Jeremy Brown (7)

2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products
2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products
2019 Agile-Lean Ireland - Awesome Teams Build Awesome Products
 
DOES London - APIs for DevOps Teams, Creating Open Culture Bubbles
DOES London - APIs for DevOps Teams, Creating Open Culture BubblesDOES London - APIs for DevOps Teams, Creating Open Culture Bubbles
DOES London - APIs for DevOps Teams, Creating Open Culture Bubbles
 
APIs for Teams, Creating Open Culture Bubbles
APIs for Teams, Creating Open Culture BubblesAPIs for Teams, Creating Open Culture Bubbles
APIs for Teams, Creating Open Culture Bubbles
 
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...
Global CIO Banking Summit - Workshop Cultural Changes to Survive Digital Disr...
 
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss Perspective
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss PerspectiveRed Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss Perspective
Red Hat Forum London 2014 - Delivering Innovation at Speed, A JBoss Perspective
 
An Introduction To The Red Hat Model
An Introduction To The Red Hat ModelAn Introduction To The Red Hat Model
An Introduction To The Red Hat Model
 
JBoss Enterprise Update - London JBUG May 2013
JBoss Enterprise Update - London JBUG May 2013JBoss Enterprise Update - London JBUG May 2013
JBoss Enterprise Update - London JBUG May 2013
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Open Source and Security: Engineering Security by Design - Prague, December 2011

  • 1. Open Source and Security: Engineering Security by Design Jeremy Brown Manager, Solution Architects Red Hat December 2011
  • 2. Overview What has Open Source got to do with Security? Red Hat – Enforcing Security by Design Re-inventing the engagement model Virtualisation and mobility – Cloudforms
  • 3. What has Open Source to do with security? Security is fundamental and needs the scientific approach of peer review If you translate the scientific approach of peer review to software, the only way to do it is to be Open Source If you use Solaris, AIX, HP UX, SCO or SCADA you need to understand that OpenSource is the feeder for your world 93% of all major internet traffic moves using OpenSource derived architecture, predominantly on Linux, enterprises secured by Red Hat account for almost 70% of all workloads 87% of all Clouds run on OpenSource, Amazon AWS, Rackspace, Google, Facebook, Yahoo etc (IDC, Forrester data)
  • 4. Sunk by Windows NT http://www.wired.com/science/discoveries/news/1998/07/13987
  • 5. Security in Depth – Open Source evolution The OpenSource community historically with it's release early, release often / peer review / fast fix history is traditionally the most proven security release model in computing. If you are concerned about how your platforms evolve you need to have engagement with Red Hat – sooner rather than later Security is a LOT more than CERT advisories and version control – what risk your data and reputation ?
  • 6. Red Hat – Enforcing Security By Design We employ 70% of all of the contributors to the mainstream Linux kernel projects / technologies. SELinux (NIST adopted), sVirt, SPICE, Gluster, Apache, LibVirt, KVM – all Red Hat led projects by staff on our payroll Linux technologies empower DAX, NYSE, NEXT, FTSE Linux in Defence is already in use in NATO, US, Australia Ever increasing government adoption of certified Linux partnering with Red Hat in supported programmes
  • 7. Red Hat – Security Certifications and Accreditations Red Hat Enterprise Linux is the most certified operating system available today. RHEL has passed the Common Criteria process 13 times on four different hardware platforms. Red Hat Enterprise Linux 5 has even received Common Criteria certification at Enterprise Assurance Level 4 (EAL 4+) under the Controlled Access Protection Profile (CAPP), Label Security Protection Profile (LSPP) and the Role-Based Access Control Protection Profile (RBACPP), providing a level of security and a feature set that was previously unheard-of from a mainstream operating system. JBoss Enterprise Application Platform is Common Criteria certified at EAL 2+.
  • 8. Red Hat – Reacting to Security Threat Fourteen year track record in CERT advisory publication and patch creation. Industry leading reaction speed to patch creation, testing, documentation and push not just to our supported customer subscription base but to the entire community (which will appear often months later in Oracle Linux, SuSE, Ubuntu, and AIX 5.x). Acknowledged by US Gov, NIST, Symantec & CERT as the most prolific security patching and release of any software vendor including Microsoft.
  • 9. Red Hat – Reacting to Security Threat Source: http://www.awe.com/mark/blog/20110520.html
  • 10. Red Hat – Security in Depth - Realtime Microsoft time to patch release on ave 14-17 days for minor system security releases, often longer, 9-11 days for major system vulnerabilities in cycle – rarely sub 7 days for a patch Red Hat average time to release a patch is one day, often the release of a documented advisory and the release of both fix AND source to customer and the wider community is less than 18-24 hours post discovery. Sometimes quicker. This is part of the Red Hat commitment to security and our stance on reputation protection and end user value for our subscription customers across the board.
  • 11. Virtualisation / Mobility – new threats Cloud – new security audit / accreditation / threat fabric / GRC Misunderstood / non defined audit model for vendors Risk of vendor non compliance / governance control Mobility of data and application – what can we migrate ? Understanding the hidden costs of Cloud aligned to security Vendor selection process – involving Red Hat at Day One Understanding security within cloud application lifecycle
  • 12. Virtualisation Vulnerabilities IBM X-Force 2010 Mid-Year Trend and Risk Report ftp://public.dhe.ibm.com/common/ssi/ecm/en/wgl03003usen/WGL03003USEN.PDF
  • 13. Engagement Model Are you a consumer of technology or do you see yourself as a thought leader / decision maker in platform evolution ? Understanding how / when to engage – event or vendor driven ? Picturing risk and building threat fabric models – modelling risk Protecting core platforms from zero day attack and exploit Re-educating sovereign governments around accreditation and empowering the future of your IT ownership Reducing core implementation costs / protecting platforms/data Delivering the ability to protect at sovereign territory level with confidence and with backup from Red Hat globally and locally
  • 14. Cloud introduces new management challenges
  • 15. Moving ahead – next steps We are already engaged with Governments and Agency’s around the world. We are MORE than a Linux OS provider!! We are an Open Source company and Security is at the heart of what we do Red Hat are part of the evolution of where you are already going How can we assist you ? Accreditation / Applications / Ambition Security of platforms and architecture – Red Hat should be part of your business as usual process – we're here to help you Engage with your local Red Hat EMEA organisation
  • 16. Thanks for listening Questions? - jeremy@redhat.com