Why Every DevOps Engineer Should Be Using Ziti
After working in the DevOps space for almost a decade, there are a few common traits that you’ll find among most of us:
- We don’t actually know what we do for a living
- We love to automate EVERYTHING
- We wire systems together and make things work
- We don’t like administrating systems – we build systems to administrate other systems
Over the last decade we’ve seen an explosion in technology that allows us to automate and orchestrate on a level that’s never been seen before. We develop faster, deploy faster, we innovate. But in a world that has an ever-increasing need for security, we are also the troublemakers.
In order to wire systems together, we need access to EVERYTHING. Even more than that, we can grant incredible super powers to the automation systems that we build. We create systems that are absolute goldmines for hackers to exploit. Take any of the big technology names in the DevOps space, and imagine the devastation that an exploit can bring if one of these systems becomes compromised. Salt, Kubernetes, Jenkins, Ansible, your Data Warehouse. Something they all have in common – they all have incredible access grants within systems, and they all have access to a disturbing amount of data if it falls into the wrong hands.
Since removing access to these systems is not feasible, how do we continue to build tools that allow us to move at a breakneck speed without compromising our security and creating a massive attack vector?
Ziti is a software-only programmable network overlay for zero trust networking (Ziti is the open source and NetFoundry is the SaaS option)
As a DevOps Engineer, I like tools that act like a Swiss Army Knife. Anything that solves a variety of problems and allows me to continue to move quickly makes it into my repertoire and becomes a tool that I come back to over and over again, regardless of where I’m working. Ziti provides a way for you to set up access controls quickly and easily, while raising the standard for “least permissions” at the network level. (read more about ziti here)
Lock Down Your Tools
This is all cloud orchestrated, programmable software – spun up and down minutes:
If you’re reading this, I probably don’t need to explain the terrifying compromises that happened in the last year with Solarwinds or TravisCI, but just in case you didn’t, you should go read those articles now and then you’ll understand perfectly why this next topic is critical. A CI/CD system is a perfect example of a “system managing a system”. It typically has elevated access and is designed to deploy and execute code in all of the places you care about. Hackers know this, they target these systems and dream about deploying and executing their own code inside of your systems. Knowing that hackers are looking for endpoints just like these would often keep me up at night. We can’t afford to leave our critical systems exposed anymore, we need to make them dark. The methodology for securing any of your sensitive resources is the same whether it’s a data warehouse, a build server, or an API.
- Shut down your traditional ingress ports
- Place an Edge Router (cloud orchestrated software) inside of the private network space
- Grant service access to only the endpoints that need it
When I think about “locking things down”, this is typically synonymous to all kinds of breakage and end-user disruption. When doing this sort of work in the past it’s very difficult to validate success short of waiting for users to complain. However, NetFoundry’s console paired with Ziti makes this incredibly easy. I could see if the project was going to be successful *before* making the cutover. Ziti’s traffic intercept will work whether a service is dark or not. Enroll your end-users, watch the traffic come into the Console, and verify everything ahead of time. After running two migrations with this method, switchover day was a non-event both times because users had already been accessing the services with Ziti for weeks.
Developer, DevOps and NetOps Access
If you’re putting on your security hat, this phrase alone should make you cringe. As nice as it would be to keep access locked down once you’re in production, sometimes things go wrong, and you need to let your developers log into instances, databases, and message brokers to solve a problem. Most companies don’t like to admit it, but too many are still using shared credentials to interact with their application dependencies, so when it comes to assigning developers secure access, this creates a security nightmare. These types of resources generally live inside of a private VPC or DC, so opening them up to a developer often means exposing the entire VPC to that user. In a “least permissions” world, this is not ideal. What Ziti allows me to do is isolate that network access and separate access by application, team, or environment.
Step Up Your Visibility
Have you ever had to determine who accessed a resource based on network traffic? Just in case you haven’t, it’s really terrible. Traditional network traffic monitoring is built around IPs and Ports, and from that information you can maybe extract the “who” and the “what”. Netfoundry introduces a whole new generation of network visibility, where all traffic monitoring is built around trusted identities (endpoints) and services (user defined slices of traffic). For every byte of traffic that passes over Ziti, we know who initiated the traffic, what service was being accessed, and what time the traffic was passed. No additional interpretation is required.
The world is changing, and tightened security is the new standard. You don’t need to slow down to raise the bar with your access controls, you just need the right tools in your tool belt. Lock down your favorite tools, sleep better at night, and go back to automating all of the things.
Most of us in the security, tech and networking worlds are cynics, and for good reason. Meanwhile, the marketeers have flocked to use and abuse the Zero Trust terms. So here are links to enable you to quickly filter through the noise and judge for yourself if you want to learn a bit more before diving into the SaaS or open source:
Watch me use NetFoundry to do simple, Zero Trust data collection in 10 minutes (video)
Watch me secure my CI/CD pipeline (another 10ish minute video)
Watch (video) Platform9 use Ziti to secure programmable Kubernetes network overlays
Download a whitepaper to get into the gritty details
Schedule a briefing or demo with a product expert