Join us at SANS Secure March 2021
Secure Asia Pacific is a part of the Secure March 2021 event - our largest-ever regional online event with over 30 SANS Live Online Courses being presented on Asia Pacific-friendly time zones. You will be able to avail of all of our core courses as well as exciting new releases like SEC510: Multicloud Security Assessment and Defense, MGT516: Managing Security Vulnerabilities: Enterprise and Cloud and SEC588: Cloud Penetration Testing.
If you don't see the course you need at Secure Asia Pacific 2021 please check out the roster offered at our other Secure March events:
* Most classes at Secure Japan 2021 will be available in both English with Japanese language translation. Please contact us at AsiaPacific@sans.org for further information.
Associated Certification: GIAC Cloud Security Automation (GCSA)
The Cloud Moves Fast. Automate to Keep Up.
SEC540 provides development, operations, and security professionals with a methodology to build and deliver secure infrastructure and software using DevOps and cloud services. Students will explore how DevOps principles, practices, and tools of DevOps can improve the reliability, integrity, and security of on-premise and cloud-hosted applications.
SEC540 examines the Secure DevOps methodology and its implementation using lessons from successful DevOps security programs. Students will gain hands-on experience using popular tools such as Jenkins, GitLab, Puppet, Vault, and Grafana to automate Configuration Management ("Infrastructure as Code"), Continuous Integration (CI), Continuous Delivery (CD), cloud infrastructure, containerization, micro-segmentation, Functions as a Service (FaaS), Compliance as Code, and Continuous Monitoring.
The lab environment starts with an on-premise CI/CD pipeline that automatically builds, tests, and deploys infrastructure and containerized applications. Leveraging the Secure DevOps toolchain, students perform a series of labs injecting security into the CI/CD pipeline using a variety of security tools, patterns, and techniques. After laying the DevSecOps foundation, students put their DevSecOps skills to work by deploying and managing a real-world cloud infrastructure. Hands-on exercises deploy containerized workloads in the cloud, integrate on-premise configuration management with Puppet, and manage secrets with HashiCorp Vault and Cloud Key Management Service (KMS). Students analyze and fix cloud infrastructure vulnerabilities, perform cloud-hosted application vulnerability scanning, and defend microservices using tools such as API Gateway and FaaS. Cloud security compliance tools help monitor the infrastructure using code-drive Web Application Firewall (WAF) services, continuous auditing with CloudMapper, and continuous monitoring with Cloud Custodian.
SEC540 Will Prepare You To:
Understand the Core Principles and Patterns behind DevOps
Map and Implement a Continuous Delivery/Continuous Deployment Pipeline
Understand the DevSecOps Methodology and Workflow
Integrate Security into Production Operations
Move Your DevOps Workloads to the Cloud
Consume Cloud Services to Secure Cloud Applications
SEC540 goes well beyond traditional lectures and immerses students in hands-on application of techniques during each section of the course. Each lab includes a step-by-step guide to learning and applying hands-on techniques, as well as a "no hints" approach for students who want to stretch their skills and see how far they can get without following the guide. This allows students, regardless of background, to choose a level of difficulty they feel is best suited for them - always with a frustration-free fallback path.
SEC540 also offers students an opportunity to participate in NetWars Bonus Challenges each day. The gamified environment allows students to compete against each other in a race to win the SEC540 challenge coin, while also providing more hands-on experience with the cloud and DevOps toolchain.
NOTICE TO STUDENTS:
WHAT YOU WILL RECEIVE:
SEC540 starts by introducing DevOps practices, principles, and tools. We will examine how DevOps works, how to work in DevOps, and the importance of culture, collaboration, and automation.
We'll use case studies of DevOps "Unicorns" - the Internet tech leaders that have created the DevOps DNA - to consider how and why these leaders succeeded and to examine the keys to their DevOps security programs.
We'll then look at Continuous Delivery, which is the DevOps automation engine. We'll explore how to build up a Continuous Delivery or Continuous Deployment pipeline, including how to fold or wire the DevSecOps security controls into the Continuous Delivery pipeline, and how to automate security checks and tests in Continuous Delivery.
CPE/CMU Credits: 8
Building on the ideas and frameworks developed in section 1, we'll examine how Cloud Infrastructure as Code can quickly and consistently deploy new infrastructure and services. Using modern automated configuration management tools like Puppet, Chef, and Ansible, we'll also cover how to enforce desired state configuration for cloud-hosted virtual machines. Since workloads are moving into container services, we'll explore the container security issues associated with tools such as Docker and Kubernetes.
CPE/CMU Credits: 8
Configuration Management as Code
Students start the day reviewing container orchestration options and scanning and testing their cloud infrastructure code for common cloud misconfiguration vulnerabilities. Correcting and committing infrastructure code changes will trigger an automated infrastructure pipeline to harden the cloud infrastructure code. Next, we will explore cloud continuous integration and delivery tools and leverage serverless computing to perform static analysis and software supply chain vulnerability scans before releasing containers into the orchestration services. We then shift focus to production and operations by building continuous security monitoring using Grafana, CloudWatch, and Slack. Section 3 wraps up with cloud data protection, exploring the various encryption services, how to implement secrets management in the cloud, and how to integrate on-premise secrets with cloud resources.
CPE/CMU Credits: 8
Securing Cloud Architecture
Security Scanning in CI/CD
Continuous Security Monitoring
Data Protection and Secrets Management
In this section we'll leverage cloud security services to lock down functional and high-availability systems. Students start by deploying a security patch to an application using blue/green environments to minimize downtime. Shifting focus, we move on to protecting static website content served by a Content Delivery Network (CDN) using private key signing. The second half of the day explores the world of microservices, protecting APIs with an API Gateway, and deploying serverless functions to manage authorization, data entitlements, and access control.
CPE/CMU Credits: 8
Blue/Green Deployment Options
Secure Content Delivery
Microservice Security
Serverless Security
Expanding on the foundation from previous sections, DevSecOps practitioners now shift to leveraging cloud services to automate security compliance. We start by deploying and configuring a cloud web application firewall with monitoring, attack detection, and active defense capabilities to catch and block bad actors. Next, we implement continuous compliance scanning for cloud misconfigurations. Finally, we work on enforcing policy as code to detect and correct cloud configuration drift.
CPE/CMU Credits: 6
Runtime Security Automation
Continuous Auditing
Cloud Security Monitoring
Important! Bring your own system configured according to these instructions!
A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will likely leave the class unsatisfied because you will not be able to participate in hands-on exercises that are essential to this course. Therefore, we strongly urge you to arrive with a system meeting all the requirements specified for the course.
!!! IMPORTANT NOTICE !!!
Mandatory: Students must bring their own AWS and Azure accounts to complete the cloud exercises. Please ensure you have done the following before class starts:
6. From the left navigation bar, select "Limits."
7. Verify that you have at least 10vCPUs for On-Demand Standard (A, C, D, H, I, M, R, T, Z) instances.
8. If your limits are less than 10 vCPUs, please start by creating a new t2.micro instance. Creating a new instance often causes the limits to increase automatically. If your limits do not automatically increase (wait 30 minutes to check again), request an increase to open a ticket with the AWS support team. More details can be found in the AWS EC2 Service Limits documentation.
Microsoft Azure
1. Browse to the Azure Portal.
2. Register for a personal 12-month free account.
BRING YOUR OWN LAPTOP CONFIGURED USING THE FOLLOWING DIRECTIONS:
A properly configured system is required for each student participating in this course. Before starting your course, carefully read and follow these instructions exactly:
Mandatory Host Hardware Requirements
Mandatory Host Operating System Requirements
You must use a 64-bit laptop with one of the following operating systems that have been verified to be compatible with course VMware image:
Mandatory Software Requirements
Prior to class, ensure that the following software is installed on the host operating system:
In summary, before beginning the course you should:
Your course media will now be delivered via download. The media files for class can be large, some in the 40 - 50 GB range. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as you get the link. You will need your course media immediately on the first day of class. Waiting until the night before the class starts to begin your download has a high probability of failure.
SANS has begun providing printed materials in PDF form. Additionally, certain classes are using an electronic workbook in addition to the PDFs. The number of classes using eWorkbooks will grow quickly. In this new environment, we have found that a second monitor and/or a tablet device can be useful by keeping the class materials visible while the instructor is presenting or while you are working on lab exercises.
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.
"There is value whether entry, mid- to manager." - Alex Rams
Course Prerequisites
Courses or equivalent experiences that are prerequisites for SEC540:
Preparing for SEC540
Students taking SEC540 will have the opportunity to learn and use a number of DevOps and cloud tools during the hands-on exercises. Getting a head start on the following tools, technologies, and languages will help students enjoy their lab experience:
"SEC540 helped me understand the complex ecosystem of DevOps. I came away with a well-rounded understanding of how the different technologies work together and how security needs to be tied into the CI/CD aspect. More than that, I found a new enthusiasm to learn and explore DevOps. Eric Johnson, our instructor was the best person to teach this course as he is a practitioner of these technologies and he very gladly gave his time to help and answer questions during the labs. The labs were very well designed to drill the concepts home." - Uday Pothakamury, Citi
"It has helped me get a better handle on the SEC DEV OPS concepts." - Fausto Franco, NYS ITS
"Definitely makes security in Dev Ops more relatable and concrete. Love that we are asked to fix issues." - Stephen Germain, Disney
"Great course! Excellent instructor! Lots of hands-on! Met my expectations definitely and I will absolutely recommend it to other people." - Sandro Blatter, SBB
"DevOps and the cloud are radically changing the way that organizations design, build, deploy, and operate online systems. Leaders like Amazon, Etsy, and Netflix are able to deploy hundreds or even thousands of changes every day, continuously learning, improving, and growing - and leaving their competitors far behind. Now DevOps and the cloud are making their way from Internet 'Unicorns' and cloud providers into enterprises.
"Traditional approaches to security can't come close to keeping up with this rate of accelerated change. Engineering and operations teams that have broken down the 'walls of confusion' in their organizations are increasingly leveraging new kinds of automation, including Infrastructure as Code, Continuous Delivery and Continuous Deployment, microservices, containers, and cloud service platforms. The question is: Can security take advantage of the tools and automation to better secure its systems?
"Security must be reinvented in a DevOps and cloud world."
- Ben Allen, Jim Bird, Eric Johnson, and Frank Kim
"Instructor's insight and knowledge of the materal and how to apply it in real life scenarios was very valuable." - Chris Turvey, Southeastern Grocers