Back to Basics: Vulnerability Management with Virtual Machines and Containers
Aug 16, 2023
Back to Basics: Vulnerability Management with Virtual Machines and Containers
Over the last few years, common vulnerabilities and exposures (CVEs) in software have caused disruption in the IT industry. With evolving technologies and developer tools, managing vulnerabilities can be a complex task. Join Pratima as she breaks down this complexity and explores how to build a vulnerability management solution in a hybrid environment with servers, EC2 instances, and container images in an automated way. Additional Resources: Orchestrating multi-step, custom patch processes using AWS Systems Manager Patch Manager (AWS blog post): https://aws.amazon.com/blogs/mt/orche … AWS Security Hub workshop: https://catalog.us-east-1.prod.worksh … AWS Security Hub Automated Response and Remediation Solutions Implementation: https://aws.amazon.com/solutions/impl … How to Setup a Recurring Security Hub Summary Email: https://github.com/aws-samples/aws-se … Check out more resources for architecting in the #AWS cloud:http://amzn.to/3qXIsWN #AWS #AmazonWebServices #CloudComputing #BackToBasics #HybridCloud
Content
6.88 -> Welcome to another episode
of 'Back to Basics', everyone.
10.32 -> I'm Pratima Singh,
11.52 -> and I am here today to talk to you
about vulnerability management
15.92 -> but in an automated way.
17.8 -> Now, why, you might ask?
19.66 -> Well, in recent years, vulnerabilities
have taken the IT community by storm.
25.34 -> Every year there's a record-breaking number of vulnerabilities
28.92 -> that are recorded.
30.58 -> And with a number of application
development frameworks in play
34.06 -> and operating systems,
35.76 -> it can be a real struggle
to patch systems and applications.
40.56 -> But before we dive deeper,
let's form a collective understanding
44.24 -> of what vulnerabilities really are.
47.6 -> Vulnerabilities
don't just magically appear.
50.8 -> They have existed ever since software has.
54.22 -> As with most things,
we humans create them.
57.68 -> They are in the software we write
and in the configurations we build.
62.22 -> A large portion of vulnerabilities
64.18 -> is recorded
in the software that other humans write,
67.58 -> and such software
includes third party libraries
70.4 -> and operating systems
that help us run applications on servers.
74.86 -> And a major portion
of these vulnerabilities
77.22 -> is recorded in operating systems.
80.04 -> Now, earlier on in my career,
when I was a Systems Engineer,
83.64 -> I was responsible
for managing 100 plus servers
86.7 -> and deploying
applications on those servers.
89.7 -> Now, every so often I would
get informed about security updates
93.92 -> that I needed to install on those servers.
96.66 -> It used to take me hours, if not days,
99.46 -> to iterate over the inventory,
manually install updates on the servers,
104.02 -> build manual reports
and reach out to my leads for approval.
108.16 -> And even then, almost always,
I would have missed out a few servers.
113.52 -> Now as much as I could,
I automated the whole system
116.4 -> by building scripts that I would
manually run on those servers.
119.86 -> But then it took me time
to build the reports manually
122.86 -> and also testing because it added
members of the other team to test
127.04 -> and the security
teams for the final approval.
130.3 -> Now, involving other team
members added to the lead time.
134.82 -> As I started using AWS,
137.22 -> I came across
the AWS Systems Manager service.
141.76 -> AWS Systems Manager - That was a game changer for me.
144.42 -> I could manage on-premises servers
and Amazon Elastic Compute Cloud
148.7 -> or EC2 Instances alike
by installing a single agent.
153.56 -> Once the Amazon-SSM-agent was installed
156.62 -> servers and EC2 instances,
159.26 -> essentially the whole
inventory that I managed manually
162.04 -> was discovered
automatically as managed nodes.
166.16 -> With the inventory sorted,
167.76 -> I moved my attention to the Patch Manager.
170.92 -> I could ditch all my makeshift scripts
173.58 -> and use predefined patch baselines
175.92 -> for a range of Linux-based
and Windows operating systems,
179.74 -> including adding approval rules,
a task I used to manage manually.
185.48 -> Now, this reduced the time
I spent on managing patches on servers
189.8 -> to a matter of hours.
191.62 -> Now, as I explored
this service more and more,
194.68 -> I came across the feature
to schedule patching runs
197.92 -> using the maintenance Windows feature.
200.88 -> Now, I no longer had to sit
202.94 -> looking at installations
being done on server by server manually,
207.08 -> and the Patch Manager dashboard
208.98 -> gave me the compliance report automatically
211.66 -> that I used to spend hours
building to get my leads approvals.
216.6 -> As the development teams
started to work with containers,
220.14 -> it became an interesting challenge
221.86 -> to manage
vulnerabilities with Container Images.
225.16 -> Container Images
can be easily overwritten,
227.98 -> which can lead to loss of context
229.9 -> with changes along
with a layer development approach,
233.12 -> which can result
in vulnerabilities hiding in the layers
236.54 -> and only detectable
in the container run-time.
240.36 -> Interestingly, teams could
turn on the tag Immutability feature
244.34 -> in Amazon Elastic Container Registry
or Amazon ECR
248.3 -> to ensure that a container Image
cannot be overwritten by another image
253.46 -> using the same tag
but with different contents.
257.22 -> This ensured uniqueness
of each image pushed to the repository.
262.84 -> Now the teams could
also configure scanning of images
266.22 -> either on push or continually.
269.08 -> But the security team
wanted a single pane of glass view
272.42 -> of the security posture of the entire
IT environment in their organization.
277.44 -> Now, this is where Amazon Inspector
and AWS Security Hub, came in.
282.72 -> Now ECR forwards
all findings to Inspector,
286.68 -> which is an automated
vulnerability management service.
290.62 -> AWS Security Hub
natively integrates with AWS services
295.36 -> like Patch Manager and Amazon Inspector.
299.16 -> It supports cross-account
and cross-region aggregation.
303.06 -> Once all the findings
are consolidated in Security Hub,
306.86 -> the security team
could build insights, alerts,
310.24 -> and even trigger auto-remediation actions
313.14 -> using the custom actions
feature of Security Hub.
317.08 -> Now with Security Hub,
we have been able to tie
319.9 -> our vulnerability management solution
322.14 -> into a neat bow.
324.44 -> Now, in this episode,
325.96 -> we saw how we could build
a vulnerability management solution
329.12 -> in a hybrid environment with servers,
331.76 -> Amazon EC2 instances and Container Images.
335.44 -> We've used services
like AWS Systems Manager,
339.1 -> Amazon ECR,
Amazon Inspector, and AWS Security Hub.
344.6 -> Check out the links
below for more details.
347.3 -> See you next time.
Source: https://www.youtube.com/watch?v=Do6Yk9Dsvc4