Tom Leaman Profile picture
Husband, father, Director of Observability @ Warner Bros. Discovery, wannabe woodworker, baker, 3D printer. Opinions 100% my own

Jun 12, 2019, 14 tweets

Afternoon talks starting with @aaronrinehart on “Security Precognition - applying chaos to security” #VelocityConf

First, what’s Resilience and how it applies to Chaos? Resilience is all about the incident that never happened.

#VelocityConf

We are covering a *lot* during this session... Pictures are worth a thousand words here.

#VelocityConf

And it’s time for the mandatory Death Star diagram outlining complexity in our systems slide. It’s used a lot but serves as a constant reminder that: we 👏cannot 👏fully 👏grok 👏how 👏our👏 systems 👏operate.

#VelocityConf

We are still designing stateful security in a stateless world... which is concerning - @aaronrinehart #VelocityConf

There are two different types of complexity:
1) Essential, or intentional, complexity (think business functionality)
2) Accidental complexity - inherent complexity that occurs based on design but not necessitated by business function

#VelocityConf

Personally, I’m not sold on the “Accidental” complexity terminology. I think most complexity is intentional or considered up front. I’d probably lean more on “no longer desirable” complexity.

#VelocityConf

Security tends to have a very blame centric culture and is highly reactive to incidents. We need to get more proactive! Chaos Engineering can help here. - @aaronrinehart #VelocityConf

Putting problems and pain, like security incidents, at the feet of developers is a great method of incentivizing preemptive approaches. This is based on the fact that people operate differently when they expect things to fail.

@aaronrinehart’s meme game is strong

#VelocityConf

Chaos Engineering can be used to initiate objective feedback loops about security effectiveness.

Use Chaos to validate your *assumptions* of how security systems operate with *reality*

#VelocityConf

What’s the difference between security chaos and traditional red, blue, purple testing?

Chaos is geared more towards cascading elements than “whether a breach is possible”

Note: Chaos security testing isn’t a replacement for the other types of tests!

#VelocityConf

We tend to focus a lot of our energy on Malicious attacks (because let’s face it... it’s cool) but the majority of incidents are generated by Human Error (not a thing) and system glitches.

#VelocityConf

Diving in to how to run security chaos via Chaos Slingr.

“What would happen if someone accidentally or maliciously introduced a misconfigured port? Would we automatically detect and reject?”

#VelocityConf

Here’s a huge list of potential experiments. These aren’t “attacks” per sr but things that can occur during application and system development journeys.

#VelocityConf

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling