Skip to content

Commit 204664c

Browse files
committed
updated slides and images
1 parent bbe9a68 commit 204664c

File tree

6 files changed

+88
-24
lines changed

6 files changed

+88
-24
lines changed

slides/Slides.md

Lines changed: 88 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
marp: true
33
theme: default
4-
footer: 'https://hachyderm.io/@Chrisayers - @Chris_L_Ayers - https://chris-ayers.com'
4+
footer: 'https://chris-ayers.com'
55
style: |
66
.columns {
77
display: grid;
@@ -13,6 +13,11 @@ style: |
1313
grid-template-columns: repeat(3, minmax(0, 1fr));
1414
gap: 1rem;
1515
}
16+
img[alt~="center"] {
17+
display: block;
18+
margin: 0 auto;
19+
}
20+
1621
@import 'https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.1/css/all.min.css'
1722
---
1823

@@ -22,6 +27,19 @@ style: |
2227

2328
---
2429

30+
![bg left:40%](./img/portrait.jpg)
31+
32+
## Chris Ayers
33+
### Senior Customer Engineer<br>Microsoft
34+
35+
<i class="fa-brands fa-twitter"></i> Twitter: @Chris\_L\_Ayers
36+
<i class="fa-brands fa-mastodon"></i> Mastodon: @Chrisayers@hachyderm.io
37+
<i class="fa-brands fa-linkedin"></i> LinkedIn: - [chris\-l\-ayers](https://linkedin.com/in/chris-l-ayers/)
38+
<i class="fa fa-window-maximize"></i> Blog: [https://chris-ayers\.com/](https://chris-ayers.com/)
39+
<i class="fa-brands fa-github"></i> GitHub: [Codebytes](https://github.com/codebytes)
40+
41+
---
42+
2543
<div class="columns">
2644
<div>
2745

@@ -84,7 +102,9 @@ Vulnerabilities can be a simple omitted property.
84102

85103
[A05:2021 – Security Misconfiguration](https://owasp.org/Top10/A05_2021-Security_Misconfiguration/)
86104

87-
![contain](./img/owasp.png)
105+
<br />
106+
107+
![50% center](./img/owasp.png)
88108

89109

90110
---
@@ -101,23 +121,24 @@ We can't just do security in production after everything is built, we need to go
101121
Each of these tools does similar things and are SAST (Static Analysis Security Tooling).
102122
With Terraform you can analyze in a few ways.
103123

104-
1) hcl files
105-
1) hcl files after interpolation and parsing
124+
1) HCL files
125+
1) Terraform Plan
106126

107127
---
108128

109129
# Rule customization
110130

111-
- ignoring rules
112-
- overriding rules
113-
- adding custom rules
131+
- Ignoring rules
132+
- Overriding rules
133+
- Add custom rules
114134

115135
---
116136

117137
# Security Tooling - OSS
118138

119139
<div class="columns">
120140
<div>
141+
<br />
121142
There are many open-source tools as well as commercial solutions. We can integrate these tools in our local environments as well as our pipelines to secure things earlier.
122143
</div>
123144
<div>
@@ -137,32 +158,55 @@ There are many open-source tools as well as commercial solutions. We can integra
137158

138159
# tfsec
139160

140-
tfsec is a static analysis security scanner for your Terraform code.
161+
tfsec is a static analysis security scanner for your Terraform code supported by Aquasecurity.
141162

142-
Designed to run locally and in your CI pipelines, developer-friendly output and fully documented checks mean detection and remediation can take place as quickly and efficiently as possible
163+
Designed to run locally and in your CI pipelines, developer-friendly output and fully documented checks.
143164

144-
![bg right fit](./img/tfsec-demo.gif)
165+
- OPA/Rego Policies
166+
- VS Code Extension
167+
- GitHub Actions
168+
169+
![bg right 90%](./img/tfsec-demo.gif)
145170

146171
---
147172

148173
# Terrascan
149174

150-
Terrascan allows us to automate the compliance and security scans against a pre-defined set of policies or custom policies as part of the CI process.
175+
Terrascan has support for Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize), Docker and even GitHub. Supported by Tenable and now integrated into nessus.
176+
177+
Terrascan has a large number of built in policies as well as support for custom OPA/Rego Policies.
151178

152-
It has support for Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize).
179+
![bg right 90%](./img/terrascan.png)
153180

154181
---
155182

156183
# Checkov
157184

158185
Checkov is another tool that lets us do scanning and compliance.
159186

187+
Checkov is by BridgeCrew and python based. Checkov, like terrascan, supports Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize) and Docker.
188+
189+
![bg right 90%](./img/checkov.png)
190+
191+
---
192+
193+
# Bonus Tool - Terraform Compliance
194+
195+
https://terraform-compliance.com/
196+
197+
BDD and Cucumber testing!
198+
199+
![bg right drop-shadow 90%](./img/terraform-compliance.png)
200+
160201
---
161202

162203
# Using Multiple Tools
163204

164-
Because these tools are independent and all scan the raw HCL or interpreted HCL, you can get different rules and better compliance.
205+
## Defense in Depth
165206

207+
Because these tools are independent and all scan the raw HCL or interpreted HCL, you can get different rules and potentially better compliance.
208+
209+
You can also hit a Signal to Noise problem.
166210

167211
---
168212

@@ -180,36 +224,51 @@ Because these tools are independent and all scan the raw HCL or interpreted HCL,
180224
Pre-commit Hooks run before code gets committed to a git repo.
181225
You do it yourself or use the precommit framework.
182226

183-
<!-- Insert pre-commit / pre-merge image -->
227+
<br />
228+
229+
![center](./img/githooks.png)
230+
184231

185232
---
186233

187234
# IDE Integration
188235

189-
- extensions for vscode
190-
- DevContainers
236+
- Extensions for VSCode
237+
- [tfsec](https://marketplace.visualstudio.com/items?itemName=tfsec.tfsec)
238+
- [checkov](https://marketplace.visualstudio.com/items?itemName=Bridgecrew.checkov)
239+
- DevContainer features
240+
- [tfsec](https://github.com/dhoeric/features/tree/main/src/tfsec)
241+
- [terrascan](https://github.com/devcontainers-contrib/features/tree/main/src/terrascan)
242+
- [checkov](http://github.com/devcontainers-contrib/features/tree/main/src/checkov)
191243

192244

193245
---
194246

195247
# Pipeline integration
196248

197-
lots of marketplace extensions
198-
pr commenter
199-
Sample workflows for tfsec, terrascan, checkov
249+
- GitHub Marketplace Extensions
250+
- [tfsec action](https://github.com/marketplace/actions/tfsec-action)
251+
- [Run tfsec PR commenter](https://github.com/marketplace/actions/run-tfsec-pr-commenter)
252+
- [Terrascan IaC scanner](https://github.com/marketplace/actions/terrascan-iac-scanner)
253+
- [Checkov GitHub Action](https://github.com/marketplace/actions/checkov-github-action)
254+
255+
---
256+
257+
# DEMOS
200258

201259
---
202260

203261
# Backend providers
204262

205263
- AzureRM
206-
- docs
264+
- Docs for other providers
207265

208266
---
209267

210268
# Overriding backend provider configuration
269+
211270
- Check docs
212-
- use environment vars
271+
- Use environment vars
213272

214273
<!-- show vars or link -->
215274
---
@@ -225,6 +284,8 @@ Auth based on repo, environment, branch
225284

226285
Putting it all together
227286

287+
Using https://github.com/tenable/KaiMonkey
288+
228289
---
229290

230291
# Questions
@@ -248,9 +309,12 @@ Putting it all together
248309
<div>
249310

250311
## Contact
251-
<i class="fa fa-twitter"></i> [@Chris_L_Ayers](https://twitter.com/Chris_L_Ayers)
252-
<i class="fa fa-mastodon"></i> https://hachyderm.io/@Chrisayers
253-
<i class="fa fa-linkedin"></i> [chris-l-ayers](https://www.linkedin.com/in/chris-l-ayers/)
312+
313+
<i class="fa-brands fa-twitter"></i> Twitter: @Chris\_L\_Ayers
314+
<i class="fa-brands fa-mastodon"></i> Mastodon: @Chrisayers@hachyderm.io
315+
<i class="fa-brands fa-linkedin"></i> LinkedIn: - [chris\-l\-ayers](https://linkedin.com/in/chris-l-ayers/)
316+
<i class="fa fa-window-maximize"></i> Blog: [https://chris-ayers\.com/](https://chris-ayers.com/)
317+
<i class="fa-brands fa-github"></i> GitHub: [Codebytes](https://github.com/codebytes)
254318

255319
</div>
256320
</div>

slides/img/checkov.png

141 KB
Loading

slides/img/githooks.png

7.07 KB
Loading

slides/img/portrait.jpg

163 KB
Loading
28.1 KB
Loading

slides/img/terrascan.png

89.6 KB
Loading

0 commit comments

Comments
 (0)