Q: More than 80 percent of the respondents in F5's recent ‘State of Application Delivery' survey said they are moving to a hybrid cloud environment to take advantage of the increased flexibility and cost advantages. What are the security implications of this trend for enterprises?
Mike Convertino: The security implications can be very significant and center on the loss of visibility into application behavior, logging, and control. Most IaaS providers don't provide a sufficient level of visibility into the SDN structure that services your applications, nor do they provide the same level of auditability expected out of typical datacenter security components. Some don't even have parity with industry best practices in the logging from virtual firewalls that they provide. IaaS providers pass the responsibility for security down to the customer to carry out at the instance level.
It gets even worse when you make the move to SaaS solutions. SaaS providers often provide even less visibility to how security controls are enforced and provide even less visibility to monitoring tools. The net result is a markedly decreased security level.
Our focus is on restoring visibility into the behavior of your cloud apps by providing a high performance view into all application traffic, allowing organizations to dynamically add additional layers of intelligence to their security portfolio. The F5 security platform is designed to enable organizations to mitigate confidentiality risks by authenticating and authorizing the right people to the right information, while providing data integrity and availability by effectively countering application attacks.
Q: How can DevOps help improve application security?
Convertino: I've heard that sometimes security people think of DevOps as an ungovernable group of cowboys that thumbs its nose at any restriction – including security restrictions. The truth is that DevOps needs security and security needs DevOps. With the increasing number and the rise in effectiveness of attacks versus applications today, DevOps already recognizes that it needs security embedded in its core development and testing elements from the start. It must, in order to ensure the survival of the business and its reputation.
Developing both feature verification and security tests at the beginning of the development process ensures that that previously released features don't regress and new vulnerabilities are not opened. Speed does not have to be the enemy of security; proper orchestration and automation can be the key to quickly identify security flaws and accelerate the release schedule.
DevOps done right is the very future of security. We view our solutions as an important part of an application's infrastructure, offering the ability to rapidly enforce protection against issues exposed in orchestrated testing, while keeping the speed and flexibility of the DevOps agile model intact.
Q: What do you want attendees at Black Hat USA to know about the trends that are driving the need for technologies such as those from F5?
Convertino: Consumer-led work styles and mobile-first approaches have paved the way for "anytime, anywhere" access to data. There's an app for everything: organizations now offer a variety of apps to both employees and consumers to drive greater productivity, meet business demands, and ultimately achieve a superior competitive advantage. But, as organizations deliver a higher volume of sensitive data through applications, they introduce a higher level of risk.
It's a given that today's users are everywhere, and the apps they rely on can be anywhere—from private datacenters to the public cloud.
Technology is clearly trading convenience for visibility. Cybercriminals are taking advantage of this, targeting the identities used to access data and apps themselves – knowing that attacking these far-flung resources is far less likely to be noticed than storming the front gates of an organization's own datacenter. It takes a fully integrated set of security solutions that restore enterprise app visibility, but it doesn't stop there. The same solution must protect privacy, simplify and integrate identity and authentication, protect them from intrusions, and halt volumetric and computational denial of service threats in any environment.