Skip to content
- Unhappy DevOps Family
- Unsupport Software
- Releases outside of primetime
- etc
- Focus on Process as a common problem
- Manage Change that Affects Multiple teams
- Throughputs vs Outputs
- Repeatability
- Extensibility
- Visability
- Safety
- Australian based Bank
- Transition for last 30 years for a bank to a layered based security model (all the way down to the server in the datacentre)
- In 2017 moved to the cloud and infrastructure in the cloud
- What makes a bank – licensed to operate
- Must demonstrate control of the process
- Reports problems to regulator
- Identifyable business Processes
- All Humans
- If you use a pipeline there are no humans in the process. These machine process needs to conform to the same control
- Archetecture naturally resistent to change. Change requires a complex process
- ITIL
- 2FA required for everything
- Secrets everywhere
- Disruption
- Dynamic Systems with constant updates
- Immutable containers
- Changes done via code
- Live system changes
- Code and automation drives things
- Dynamic CMDB – High Levels of abstraction
- But you still have a secrets problems
- Secrets Management
- Not just a place to store passwords
- But also a Chain of Trust
- If Pipelines make the change who owns it, who audits it?
- Vault becomes a bit of audit by saying who used something (person or process)
- Why another tool ?
- Created a pattered on how thing will be deployed. Got Security to okay it. Build it in a pipeline
- Vault placed in the highest security area
- But less-secure areas needed to talk to it.
- Lots of zones internally. Some in Cloud, DMZ
- Some talk via API gateway to main vault
- Had a Vault replica that had a copy of some secrets and could be used by those zones that were not allowed to to the secrets zone
- Learnings
- This is hard, especially in the cloud
- If Pipelines are doing the change, that must be kept secure. Attribution, notification and real-time analytics
- Declarative manifests of change (code, scripts, tools) require more strict access controls
- Avoid direct point-to-point connections