SlideShare a Scribd company logo
Docker and PCI-DSS – Lessons learned in
a security sensitive environment
Dr. Udo Seidel
Chief Architect & Digital Evangelist
Agenda
PCI-DSS
2.2.2
5.2
8.1.3
10.2.2
Lessons Learned
SecOps
Security Architekt
KISS
...
Introduction
About Udo
About Amadeus
Behind the scenes
The overall trigger
Here comes docker
Framework details
Introduction
About Udo and Amadeus
About me :-)
● Teacher of mathematics and physics
● PhD in experimental physics
● Started with Linux in 1996
● With Amadeus since 2006
● Before:
– Linux/UNIX trainer
– Solution Engineer in HPC and CAx environment
● Now: Architecture & Technical Governance aka CTO
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment
Behind the scenes
More details about our Docker journey
The overall trigger
● Customer project
– New customer
– New requirements
– New chances and challenges
● Changes on Amadeus side
– Personnel changes
– Digitalization
– Externally driven
Here comes docker
● Huge topic at Red Hat Summit: April 2014
● Internal discussions
– 'Native' joint interest of OPS and DEV
– DEV & OPS Architects: April 2014
– Introduction to project architecture: Summer 2014
● Why?
– The 'usual suspects'
– Solution of traditional OPS-DEV challenge
● Application patch management
● Administrative access
Framework details
● Technical
– Openstack as IaaS
● 3 installations
● Vmware based
– Management
● Orchestration via Openshift
● Teaming up with Red Hat
● Security
– Internal
● Corporate Office
● Global Operations Office
● SOC
● Community
– External
● PCI-DSS
● SSAE-16
● ISO 27001
PCI-DSS
● Payment Card Industry – Data Security Standard
● VISA, MasterCard, American Express, …
● Administration via Council
● 6 Control objectives
– Build and maintain secure network
– Protect cardholder data
– Maintain a vulnerability management
program
– Implement strong access control
measures
– Regularly monitor and test networks
– Maintain an information security policy
● Current version: 3.1 (115 pages)
Some of the hick-ups
The hypervisor is insecure!
Physical separation rules!
Who is responsible for firewall policies?
Who is responsible for network topology?
PCI-DSS
Some case studies
Before you start
Don't overcomplicate things.
Re-use what is already there.
It might be easier than you think.
Requirement 2.2.2
Enable only necessary services, protocols, daemons, etc., as required for
the function of the system.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– Even better due to separation of software, processes, ..
Requirement 2.2.2 - Amadeus
Enable only necessary services, protocols, daemons, etc., as required for
the function of the system.
● See previous slide :-)
● Grouping of Containers
– Openshift Pods
– Smalles Deployable Unit
– Application Unit (Component)
Requirement 5.2
Ensure that all anti-virus mechanisms are maintained as follows: Are kept
current, Perform periodic scans, Generate audit logs which are retained per
PCI DSS Requirement 10.7.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– No real change to world without Docker
Requirement 5.2 - Amadeus
Ensure that all anti-virus mechanisms are maintained as follows: Are kept
current, Perform periodic scans, Generate audit logs which are retained per
PCI DSS Requirement 10.7.
● See previous slide :-)
● Scanning discussion
– Scan engine towards Container - internal
– Container towards Scan engine - external
Requirement 8.1.3
Immediately revoke access for any terminated users.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Avoid personal users
– Review of Docker file and software source
● Overall
– Even better due separation of software, processes, ..
– Big Plus: 'Hands-off'
Requirement 8.1.3 - Amadeus
Immediately revoke access for any terminated users.
● See previous slides :-)
● Jump server for access
– Personal users via directory service
– Only place with personal users
● Application users
– Container and Host level
– Special treatment ..anyway
– Shell to be removed (soon)
Requirement 10.2.2
Implement automated audit trails for all system components to reconstruct
all actions taken by any individual with root or administrative privileges.
● Outside Docker
– Business as usual
– Re-use existing
● Inside Docker
– Similar to outside
– Review of Docker file and software source
● Overall
– Even better due separation of software, processes, ..
– Big Plus: 'Hands-off'
Requirement 10.2.2 - Amadeus
Implement automated audit trails for all system components to reconstruct
all actions taken by any individual with root or administrative privileges.
● See … (you should be able to complete it yourself)
● Jumpserver only for these activities
– Questions similar to scanning
– Access secured via SSH keys
Amadeus Big Picture
Amadeus PCI-DSS (8.1.3/10.2.2)
Amadeus PCI-DSS (2.2.2/5.2)
Additional Amadeus inside
● Patching via re-creation
● Self-build Docker registry
● Definitive Media Library
– Source of truth
– Connection to Software Factory
● Different security/network zones
– External separation via Loadbalancer
– Internal via Openshift placement rules
● Encryption for data at
– Flight (SSH, TSL)
– Rest (HSM)
Lessons learned
The information you were coming here
General advice
Don't overcomplicate things.
Re-use what is already there.
People before technology!
Security Architect
● Dedicated role/responsibility
● Technical and soft skills
● Sufficient standing
● Internally
● Externally
Early involvement
● Business goal
● Win-win situation
● Give and take
Common language
● Internal education
● External consultancy
● Vendors
● Customers
● Re-use existing dictionaries
SecOps
● Member of DevOps team
● Remember: Security Champions for OPS
● Communication link to security organization
KISS
● Helicopter view for solution finding
● Always different solutions available
Team up
● Internally
● DevOps and security organisation
● DevOps and line organisation
● Externally
● Vendors
● Community
● Partners
Added value
Mobility
Abstraction/Separation
Ease to use
Summary
30+ slides condensed in one … or two
Take-Away
● Don't underestimate non-technical side
● Don't forget what you already have
● 'Walk&talk' a lot
Outlook
● Journey to be continued
● 'Porting' of other Amadeus applications
● Domino effect
—Louis Pasteur
“Fortune favors the
prepared mind.”
3
4
Thank you!
Dr. Udo Seidel
@useidel
useidel@amadeus.com

More Related Content

What's hot (20)

PDF
Effective Data Pipelines with Docker & Jenkins - Brian Donaldson
Docker, Inc.
 
PPTX
How to be successful running Docker in Production
Docker, Inc.
 
PDF
DCSF19 How Docker Simplifies Kubernetes for the Masses
Docker, Inc.
 
PDF
Networking Overview for Docker Platform
Aditya Patawari
 
PDF
DCSF19 CMD and Conquer: Containerizing the Monolith
Docker, Inc.
 
PPTX
Windows Server and Docker - The Internals Behind Bringing Docker and Containe...
Docker, Inc.
 
PDF
Docker and the Linux Kernel
Docker, Inc.
 
PDF
Docker Security and Content Trust
ehazlett
 
PDF
The Dockerfile Explosion and the Need for Higher Level Tools by Gareth Rushgrove
Docker, Inc.
 
PPTX
Docker 101 Checonf 2016
Patrick Chanezon
 
PDF
Online Meetup: What's new in docker 1.13.0
Docker, Inc.
 
PDF
Docker London: Container Security
Phil Estes
 
PPTX
Windows Server Containers- How we hot here and architecture deep dive
Docker, Inc.
 
PDF
Docker serverless v1.0
Thomas Chacko
 
PDF
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Phil Estes
 
PDF
Docker Security Deep Dive by Ying Li and David Lawrence
Docker, Inc.
 
PDF
Docker Introduction
Sparkbit
 
PDF
runC: The little engine that could (run Docker containers) by Docker Captain ...
Docker, Inc.
 
PDF
Docker for Ops - Scott Coulton, Puppet
Docker, Inc.
 
PPT
Docker introduction
Phuc Nguyen
 
Effective Data Pipelines with Docker & Jenkins - Brian Donaldson
Docker, Inc.
 
How to be successful running Docker in Production
Docker, Inc.
 
DCSF19 How Docker Simplifies Kubernetes for the Masses
Docker, Inc.
 
Networking Overview for Docker Platform
Aditya Patawari
 
DCSF19 CMD and Conquer: Containerizing the Monolith
Docker, Inc.
 
Windows Server and Docker - The Internals Behind Bringing Docker and Containe...
Docker, Inc.
 
Docker and the Linux Kernel
Docker, Inc.
 
Docker Security and Content Trust
ehazlett
 
The Dockerfile Explosion and the Need for Higher Level Tools by Gareth Rushgrove
Docker, Inc.
 
Docker 101 Checonf 2016
Patrick Chanezon
 
Online Meetup: What's new in docker 1.13.0
Docker, Inc.
 
Docker London: Container Security
Phil Estes
 
Windows Server Containers- How we hot here and architecture deep dive
Docker, Inc.
 
Docker serverless v1.0
Thomas Chacko
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Phil Estes
 
Docker Security Deep Dive by Ying Li and David Lawrence
Docker, Inc.
 
Docker Introduction
Sparkbit
 
runC: The little engine that could (run Docker containers) by Docker Captain ...
Docker, Inc.
 
Docker for Ops - Scott Coulton, Puppet
Docker, Inc.
 
Docker introduction
Phuc Nguyen
 

Viewers also liked (20)

PPTX
DockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker Brings
Docker, Inc.
 
PPTX
DockerCon EU 2015: Docker Monitoring
Docker, Inc.
 
PPTX
Docker Security workshop slides
Docker, Inc.
 
PPTX
A Survey of Container Security in 2016: A Security Update on Container Platforms
Salman Baset
 
PPTX
Docker Networking: Control plane and Data plane
Docker, Inc.
 
PDF
Docker by Example - Basics
Ganesh Samarthyam
 
PDF
Verizon rp pci report-2015-en_xg
CMR WORLD TECH
 
PPTX
Docker & Apcera Better Together
Simone Morellato
 
PDF
Running the Oracle SOA Suite Environment in a Docker Container
Guido Schmutz
 
PDF
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Jérôme Petazzoni
 
PDF
Docker From Scratch
Giacomo Vacca
 
PPTX
Building a REST API Microservice for the DevNet API Scavenger Hunt
Ashley Roach
 
PDF
Docker containers & the Future of Drupal testing
Ricardo Amaro
 
PPTX
How To Train Your APIs
Ashley Roach
 
PDF
Microservice architecture
Slim Ouertani
 
PDF
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Zach Hill
 
PDF
Drupal workshop ist 2014
Ricardo Amaro
 
PDF
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Nathen Harvey
 
PDF
Drupalcamp es 2013 drupal with lxc docker and vagrant
Ricardo Amaro
 
PPTX
DATA CENTER
Shekar Reddy
 
DockerCon EU 2015: Cultural Revolution - How to Mange the Change Docker Brings
Docker, Inc.
 
DockerCon EU 2015: Docker Monitoring
Docker, Inc.
 
Docker Security workshop slides
Docker, Inc.
 
A Survey of Container Security in 2016: A Security Update on Container Platforms
Salman Baset
 
Docker Networking: Control plane and Data plane
Docker, Inc.
 
Docker by Example - Basics
Ganesh Samarthyam
 
Verizon rp pci report-2015-en_xg
CMR WORLD TECH
 
Docker & Apcera Better Together
Simone Morellato
 
Running the Oracle SOA Suite Environment in a Docker Container
Guido Schmutz
 
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Jérôme Petazzoni
 
Docker From Scratch
Giacomo Vacca
 
Building a REST API Microservice for the DevNet API Scavenger Hunt
Ashley Roach
 
Docker containers & the Future of Drupal testing
Ricardo Amaro
 
How To Train Your APIs
Ashley Roach
 
Microservice architecture
Slim Ouertani
 
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Zach Hill
 
Drupal workshop ist 2014
Ricardo Amaro
 
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Nathen Harvey
 
Drupalcamp es 2013 drupal with lxc docker and vagrant
Ricardo Amaro
 
DATA CENTER
Shekar Reddy
 
Ad

Similar to DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment (20)

PPTX
Container security Familiar problems in new technology
Frank Victory
 
PDF
DevSecOps: The Open Source Way
Black Duck by Synopsys
 
PDF
Don’t have a Meltdown! Practical Steps for Defending Your Apps
Docker, Inc.
 
PDF
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
Daniel Oh
 
PPTX
Overcoming Security Challenges in DevOps
Alert Logic
 
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
PDF
Security for AWS: Journey to Least Privilege
Lacework
 
PPTX
Security for AWS : Journey to Least Privilege (update)
dhubbard858
 
PDF
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
Codemotion
 
PDF
Immutable Infrastructure Security
Ricky Sanders
 
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
PDF
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
PDF
Securing the Container Pipeline
Salesforce Engineering
 
PDF
Container Security
Salman Baset
 
PDF
Securing containers
Sathyajith Bhat
 
PDF
Introduction to DevSecOps
Setu Parimi
 
PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
VMware Tanzu
 
PPTX
Containers and Security for DevOps
Salesforce Engineering
 
PDF
How secure is your Docker Container pipeline?
Manideep Konakandla
 
PDF
Security practices in OpenShift
Nenad Bogojevic
 
Container security Familiar problems in new technology
Frank Victory
 
DevSecOps: The Open Source Way
Black Duck by Synopsys
 
Don’t have a Meltdown! Practical Steps for Defending Your Apps
Docker, Inc.
 
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
Daniel Oh
 
Overcoming Security Challenges in DevOps
Alert Logic
 
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
Security for AWS: Journey to Least Privilege
Lacework
 
Security for AWS : Journey to Least Privilege (update)
dhubbard858
 
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
Codemotion
 
Immutable Infrastructure Security
Ricky Sanders
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Securing the Container Pipeline
Salesforce Engineering
 
Container Security
Salman Baset
 
Securing containers
Sathyajith Bhat
 
Introduction to DevSecOps
Setu Parimi
 
Building a DevSecOps Pipeline Around Your Spring Boot Application
VMware Tanzu
 
Containers and Security for DevOps
Salesforce Engineering
 
How secure is your Docker Container pipeline?
Manideep Konakandla
 
Security practices in OpenShift
Nenad Bogojevic
 
Ad

More from Docker, Inc. (20)

PDF
Containerize Your Game Server for the Best Multiplayer Experience
Docker, Inc.
 
PDF
How to Improve Your Image Builds Using Advance Docker Build
Docker, Inc.
 
PDF
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 
PDF
Securing Your Containerized Applications with NGINX
Docker, Inc.
 
PDF
How To Build and Run Node Apps with Docker and Compose
Docker, Inc.
 
PDF
Hands-on Helm
Docker, Inc.
 
PDF
Distributed Deep Learning with Docker at Salesforce
Docker, Inc.
 
PDF
The First 10M Pulls: Building The Official Curl Image for Docker Hub
Docker, Inc.
 
PDF
Monitoring in a Microservices World
Docker, Inc.
 
PDF
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
Docker, Inc.
 
PDF
Predicting Space Weather with Docker
Docker, Inc.
 
PDF
Become a Docker Power User With Microsoft Visual Studio Code
Docker, Inc.
 
PDF
How to Use Mirroring and Caching to Optimize your Container Registry
Docker, Inc.
 
PDF
Monolithic to Microservices + Docker = SDLC on Steroids!
Docker, Inc.
 
PDF
Kubernetes at Datadog Scale
Docker, Inc.
 
PDF
Labels, Labels, Labels
Docker, Inc.
 
PDF
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Docker, Inc.
 
PDF
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 
PDF
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
Docker, Inc.
 
PDF
Developing with Docker for the Arm Architecture
Docker, Inc.
 
Containerize Your Game Server for the Best Multiplayer Experience
Docker, Inc.
 
How to Improve Your Image Builds Using Advance Docker Build
Docker, Inc.
 
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 
Securing Your Containerized Applications with NGINX
Docker, Inc.
 
How To Build and Run Node Apps with Docker and Compose
Docker, Inc.
 
Hands-on Helm
Docker, Inc.
 
Distributed Deep Learning with Docker at Salesforce
Docker, Inc.
 
The First 10M Pulls: Building The Official Curl Image for Docker Hub
Docker, Inc.
 
Monitoring in a Microservices World
Docker, Inc.
 
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
Docker, Inc.
 
Predicting Space Weather with Docker
Docker, Inc.
 
Become a Docker Power User With Microsoft Visual Studio Code
Docker, Inc.
 
How to Use Mirroring and Caching to Optimize your Container Registry
Docker, Inc.
 
Monolithic to Microservices + Docker = SDLC on Steroids!
Docker, Inc.
 
Kubernetes at Datadog Scale
Docker, Inc.
 
Labels, Labels, Labels
Docker, Inc.
 
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Docker, Inc.
 
Build & Deploy Multi-Container Applications to AWS
Docker, Inc.
 
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
Docker, Inc.
 
Developing with Docker for the Arm Architecture
Docker, Inc.
 

Recently uploaded (20)

PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
July Patch Tuesday
Ivanti
 
Biography of Daniel Podor.pdf
Daniel Podor
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 

DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensitive environment

  • 1. Docker and PCI-DSS – Lessons learned in a security sensitive environment Dr. Udo Seidel Chief Architect & Digital Evangelist
  • 2. Agenda PCI-DSS 2.2.2 5.2 8.1.3 10.2.2 Lessons Learned SecOps Security Architekt KISS ... Introduction About Udo About Amadeus Behind the scenes The overall trigger Here comes docker Framework details
  • 4. About me :-) ● Teacher of mathematics and physics ● PhD in experimental physics ● Started with Linux in 1996 ● With Amadeus since 2006 ● Before: – Linux/UNIX trainer – Solution Engineer in HPC and CAx environment ● Now: Architecture & Technical Governance aka CTO
  • 6. Behind the scenes More details about our Docker journey
  • 7. The overall trigger ● Customer project – New customer – New requirements – New chances and challenges ● Changes on Amadeus side – Personnel changes – Digitalization – Externally driven
  • 8. Here comes docker ● Huge topic at Red Hat Summit: April 2014 ● Internal discussions – 'Native' joint interest of OPS and DEV – DEV & OPS Architects: April 2014 – Introduction to project architecture: Summer 2014 ● Why? – The 'usual suspects' – Solution of traditional OPS-DEV challenge ● Application patch management ● Administrative access
  • 9. Framework details ● Technical – Openstack as IaaS ● 3 installations ● Vmware based – Management ● Orchestration via Openshift ● Teaming up with Red Hat ● Security – Internal ● Corporate Office ● Global Operations Office ● SOC ● Community – External ● PCI-DSS ● SSAE-16 ● ISO 27001
  • 10. PCI-DSS ● Payment Card Industry – Data Security Standard ● VISA, MasterCard, American Express, … ● Administration via Council ● 6 Control objectives – Build and maintain secure network – Protect cardholder data – Maintain a vulnerability management program – Implement strong access control measures – Regularly monitor and test networks – Maintain an information security policy ● Current version: 3.1 (115 pages)
  • 11. Some of the hick-ups The hypervisor is insecure! Physical separation rules! Who is responsible for firewall policies? Who is responsible for network topology?
  • 13. Before you start Don't overcomplicate things. Re-use what is already there. It might be easier than you think.
  • 14. Requirement 2.2.2 Enable only necessary services, protocols, daemons, etc., as required for the function of the system. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – Even better due to separation of software, processes, ..
  • 15. Requirement 2.2.2 - Amadeus Enable only necessary services, protocols, daemons, etc., as required for the function of the system. ● See previous slide :-) ● Grouping of Containers – Openshift Pods – Smalles Deployable Unit – Application Unit (Component)
  • 16. Requirement 5.2 Ensure that all anti-virus mechanisms are maintained as follows: Are kept current, Perform periodic scans, Generate audit logs which are retained per PCI DSS Requirement 10.7. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – No real change to world without Docker
  • 17. Requirement 5.2 - Amadeus Ensure that all anti-virus mechanisms are maintained as follows: Are kept current, Perform periodic scans, Generate audit logs which are retained per PCI DSS Requirement 10.7. ● See previous slide :-) ● Scanning discussion – Scan engine towards Container - internal – Container towards Scan engine - external
  • 18. Requirement 8.1.3 Immediately revoke access for any terminated users. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Avoid personal users – Review of Docker file and software source ● Overall – Even better due separation of software, processes, .. – Big Plus: 'Hands-off'
  • 19. Requirement 8.1.3 - Amadeus Immediately revoke access for any terminated users. ● See previous slides :-) ● Jump server for access – Personal users via directory service – Only place with personal users ● Application users – Container and Host level – Special treatment ..anyway – Shell to be removed (soon)
  • 20. Requirement 10.2.2 Implement automated audit trails for all system components to reconstruct all actions taken by any individual with root or administrative privileges. ● Outside Docker – Business as usual – Re-use existing ● Inside Docker – Similar to outside – Review of Docker file and software source ● Overall – Even better due separation of software, processes, .. – Big Plus: 'Hands-off'
  • 21. Requirement 10.2.2 - Amadeus Implement automated audit trails for all system components to reconstruct all actions taken by any individual with root or administrative privileges. ● See … (you should be able to complete it yourself) ● Jumpserver only for these activities – Questions similar to scanning – Access secured via SSH keys
  • 25. Additional Amadeus inside ● Patching via re-creation ● Self-build Docker registry ● Definitive Media Library – Source of truth – Connection to Software Factory ● Different security/network zones – External separation via Loadbalancer – Internal via Openshift placement rules ● Encryption for data at – Flight (SSH, TSL) – Rest (HSM)
  • 26. Lessons learned The information you were coming here
  • 27. General advice Don't overcomplicate things. Re-use what is already there. People before technology!
  • 28. Security Architect ● Dedicated role/responsibility ● Technical and soft skills ● Sufficient standing ● Internally ● Externally Early involvement ● Business goal ● Win-win situation ● Give and take Common language ● Internal education ● External consultancy ● Vendors ● Customers ● Re-use existing dictionaries
  • 29. SecOps ● Member of DevOps team ● Remember: Security Champions for OPS ● Communication link to security organization KISS ● Helicopter view for solution finding ● Always different solutions available Team up ● Internally ● DevOps and security organisation ● DevOps and line organisation ● Externally ● Vendors ● Community ● Partners
  • 31. Summary 30+ slides condensed in one … or two
  • 32. Take-Away ● Don't underestimate non-technical side ● Don't forget what you already have ● 'Walk&talk' a lot
  • 33. Outlook ● Journey to be continued ● 'Porting' of other Amadeus applications ● Domino effect
  • 34. —Louis Pasteur “Fortune favors the prepared mind.” 3 4