33
RED HAT SECURITY ROADMAP Josh Bressers Security Strategist @joshbressers

RED HAT SECURITY ROADMAP

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: RED HAT SECURITY ROADMAP

RED HAT SECURITY ROADMAP

Josh BressersSecurity Strategist@joshbressers

Page 2: RED HAT SECURITY ROADMAP

ROADMAP

Page 3: RED HAT SECURITY ROADMAP

NOT CRYSTAL BALL

Page 4: RED HAT SECURITY ROADMAP

RED HAT ECOSYSTEM

RHEL FOUNDATION

GLIBC + GCCKERNEL

LSM

CRYPTO

CGROUPS

NAMESPACES

MEMORY PROTECTIONS

STACK PROTECTOR

RANDOMIZATION

RANDOMIZATION

FORTIFY SOURCE

LIBRARIES

CRYPTO

STACK PROTECTOR

FORTIFY SOURCE

APPLICATIONS

CRYPTO

SECURE DEFAULTS

FORTIFY SOURCE

RELEASE

SIGNATURES

SUPPORT

SECURITY UPDATES

END OF LIFE

SELINUX

MANAGEMENT / SCANNING/ INSIGHTS

CERTIFICATIONS

HARDENED BUILD HARDENED BUILD

SECURITY DOCS

FILESYSTEM ENCRYPTION

AUTHENTICATION

IDENTITY

NETWORKING

ROP PROTECTION

RANDOMIZATION

Page 5: RED HAT SECURITY ROADMAP

Secure Usage

Secure Technologies

Secure Platform

Secure Foundation

Page 6: RED HAT SECURITY ROADMAP

FOUNDATION

Page 7: RED HAT SECURITY ROADMAP

MAINTENANCE DEPRECATION VISION

● Security updates● Bug fixes● Certifications● Modify defaults● Minor features

● Watch research● Proactive

deprecation

● New algorithms● Better system

management● Library

improvements

Page 8: RED HAT SECURITY ROADMAP

MAINTAIN INVEST

Product Compliance ● FIPS● Common Criteria● SCAP

● OSPP 4● Faster certifications● Easier to use and deploy

Procedural Compliance

● PCI● HIPAA● SOX

● Continuous monitoring● Guidance● Better defaults● SCAP profiles

Page 9: RED HAT SECURITY ROADMAP

• gcc/glibc security enhancements– ROP, MPX– Memory protections– Better warning

• Boot Time Security– TPM– Secure Boot

• Whitelisting

Page 10: RED HAT SECURITY ROADMAP

• Selinux• Container Isolation• USBGuard• Systemd

– Private /tmp– Protected /usr /home /etc

Page 11: RED HAT SECURITY ROADMAP

• Encryption– IPsec L3 encryption tunnels with hardware offload– MACSec L2 encryption for Hosts and VMs

• reduces the need for full mesh of L3 IPsec tunnels at the application level.

• Network Isolation– with overlay tunnels using VXLAN, GRE, MPLS.– HW offload with NICS available as well

Page 12: RED HAT SECURITY ROADMAP

SELinux Enablement

Resource Segregation (RADOS)

Encryption

Network Bound Disk Encryption

Page 13: RED HAT SECURITY ROADMAP

FEATURES

Page 14: RED HAT SECURITY ROADMAP

• Measuring the runtime environment– Common Logging– Audit

Page 15: RED HAT SECURITY ROADMAP

QEMU

CPU - RAM - DEVICES

KERNEL KV

M

IOM

MU

VM

QEMU

VMK

VM

IOM

MU

DISK

Page 16: RED HAT SECURITY ROADMAP

CPU - RAM - DEVICES

KERNEL KV

M

IOM

MU

VMVMK

VM

IOM

MU

DISKQEMU QEMU

Page 17: RED HAT SECURITY ROADMAP

• JBoss EAP 7.1– Elytron security subsystem

• Replaces PicketBox/JAAS• Single security subsystem for configuring Management and

Application security – Common Criteria Certification

• RH-SSO (Keycloak) 7.1 – SSSD integration with RHEL IdM– Node.js client– OpenID Connect Certification

• API Management– Integrate 3scale into our portfolio

Page 18: RED HAT SECURITY ROADMAP

Today it is difficult to boot a VM with an encrypted disk.

Page 19: RED HAT SECURITY ROADMAP

What if we could store the secret in the network?Very defined security use cases, separated keys from unlocking material

VM

SECRETS

Page 20: RED HAT SECURITY ROADMAP
Page 21: RED HAT SECURITY ROADMAP

SCAN

RUN

RUN

SER

VIC

ESBUILD

BUILD

BUILD

Page 22: RED HAT SECURITY ROADMAP

• SCAP workbench• Ever improving rules• Compliance verification• SCAP Certification

LabPractical OpenSCAP: Security, standard compliance, and reporting

Page 23: RED HAT SECURITY ROADMAP

RELEASE

Page 24: RED HAT SECURITY ROADMAP

• Security problems and solutions– Red Hat Portal

• Security HOWTOs– Red Hat online guides

• Compliance and remediations rules– SCAP Security Guide

Page 25: RED HAT SECURITY ROADMAP

• Responsible adult in the room for high touch issues

• Delivery of Ansible playbooks along with Labs & Insights rules

• Evolve with the security environment

Page 26: RED HAT SECURITY ROADMAP

• Vulnerability service API• SWID• Full portfolio OVAL support• CVSSv3

– CVSSv2 until 2017

Page 27: RED HAT SECURITY ROADMAP

MANAGEMENT & IDENTITY

Page 28: RED HAT SECURITY ROADMAP

Patching - Inspection - Configuration Management

Page 29: RED HAT SECURITY ROADMAP

• SSSD and IPA in containers• Better AD support• Cached authentication• Smart Card authentication• Better SSSD compatibility• Session recording

Page 30: RED HAT SECURITY ROADMAP

• Red Hat Insights– Machine learning / Anomaly detection

• CloudForms– Smart State Analysis

• Audit– Human understandable audit trail– Audit analysis functionality

Page 31: RED HAT SECURITY ROADMAP

• Focus on containers• Compliance is coming!

– Brace yourselves• Monitoring industry direction• Invent the future

• Tell us what you need

WHERE DO WE GO NEXT?

Page 32: RED HAT SECURITY ROADMAP

Wednesday, 4:45 PM - 5:45 PM– 2005

Page 33: RED HAT SECURITY ROADMAP