The Wayback Machine - https://web.archive.org/web/20160410211753/http://cloudcomputing.sys-con.com/node/3737966

Welcome!

@CloudExpo Authors: Pat Romanski, Gene Kim, Yeshim Deniz, Carmen Gonzalez, Elizabeth White

Related Topics: @DevOpsSummit, Containers Expo Blog, @CloudExpo

@DevOpsSummit: Blog Feed Post

Infrastructure as (Someone Else’s) Code By @DMacVittie | @DevOpsSummit #DevOps

The rush to integrate has created a consumption level of new & previously unheard of modules that is astounding

We are rapidly approaching a world where the bulk of datacenter day-to-day operations are automated. The major application provisioning tools are integrating with infrastructure vendor APIs to give operations the power to control and monitor the datacenter – including things like SAN and networking gear – through their systems. To my mind this is a very cool development, but before we rush headlong into this world, let’s have a frank discussion about the nature of infrastructure, the nature of these integrations, and the nature of hackers. Because it’s never all sunshine and unicorns, and automation is no exception.

WhatDoesItDo

The rush to integrate has created a consumption level of new and previously unheard of modules that is astounding. If a module meets a pent up desire, thousands of organizations are using it in production practically overnight. This makes sense as more and more enterprises move to a more complete automation infrastructure, but it is not without its risks, and you really should consider those risks before the 2am phone call comes. Which of course, we all hope never will.

Integrations
As mentioned, the major application provisioning providers are working closely with infrastructure vendors to integrate infrastructure into the realm of what they can manage. SaltStack, Puppet, and Ansible, for example, are integrated with products from infrastructure vendors like Cisco, EMC, and F5. The nature of these integrations is often that the vendor does the development, which is cool, because who knows the product better than the vendor?

But that brings one planning point into the equation. What to do if the vendor drops support for your chosen provisioning platform? While this could be an issue for the entire relationship, it is more likely to come into play when a vendor EOLs a product. These solutions are almost all open source, but it is the nature of Open Source in the enterprise that this is not a major differentiator. Except for extreme need, most organizations never work through the source code for providers – particularly complex, multi-layered providers – to make certain they can maintain it. Not that there is no interest, but in the enterprise, that kind of free time is a rare commodity, so it is only done at need.

So I suggest you have a plan. Know what steps you will take if a vendor ends support in a middleware DevOps tool, and you need that support continued. The plan doesn’t have to be complex, just have thought through it so you’re not making it up on the spot when the situation arises.

While you’re thinking about it, make certain the vendor-provided plug-ins are indeed open source, because that changes the “what would we do” equation a little if it can just be pulled from the market entirely, and you don’t have access to the source.

Infrastructure
Just a reminder that infrastructure is the center of your world. If you have one of these modules, and it causes problems, it could potentially impact a lot more than just one service. You know that, but it implies a much greater need for quality assurance of modules than you would use for, say, an apache config/install module. The potential impact is huge, and we’ve seen when DevOps tools propagate problems across server farms, it could be so much worse if they do the same across networking gear.

This is more important when you find that module designed by a user that does exactly what you need. Make certain that it’s solid code. Bring it in, do a code review – no, I’m not kidding. This is code going to change things on your core infrastructure, due diligence is absolutely recommended. I’d say “required” instead of recommended, but to some extent the tolerance of your organization for risk figures into the equation. But if I’m a customer of yours? Consider it required.

Attackers
Do you know what a bad actors’ dream scenario is? It is infrastructure as code. Given the opportunity to submit code to such a project, this is a golden opportunity. The attackers could stop messing with applications, and just get back doors into infrastructure. That’s a scary scenario. And it will happen.

This is another area that is a bigger concern when you are grabbing modules developed by users of a provisioning tool than when using tools implemented with vendor assistance, though in an open source and massive code reuse world, there is always a risk of both purposeful and inadvertent tainting of codebases.

Most enterprises today have a security team. They need to go over these modules before they are implemented – in production for sure, but I’d recommend this review before deploying in test too. The usual reason an organization doesn’t do this step is availability of resources as opposed to delivery timelines. Considering the number of man-hours a module like this can save over the long term, an investment up-front to make certain it’s safe is not too much investment. Stretch timelines or free up resources. I know that’s easier said than done, I’ve been management on high-visibility teams in enterprises. But the possible negative impacts are massive, and definitely worth the effort to get them reviewed.

A last word
Others have written more extensively about these concerns, since there is only so much one can cram into a blog and expect you to read it, I recommend seeking out some of those other sources and reading them.

The problem we have with security generally is that these risks as a percent chance are pretty slim. Most organizations will not suffer if they ignore this post and others like it. But the ones that do will suffer greatly. I don’t wish to over-exaggerate the risks, they are relatively small on a per-enterprise basis, though I think this type of problem will inevitably impact some of us. Of course the vendors – both application provisioning and infrastructure – do not want to be the source of problems with automated infrastructure, so they are watching also. But the risk is still there, and it’s worth a few extra man-hours to make sure there are not problems in the modules you choose to use. The network you save could be your own.

Read the original blog entry...

More Stories By Don MacVittie

Don MacVittie is currently a Senior Solutions Architect at StackIQ, Inc. He is also working with Mesamundi on D20PRO, and is a member of the Stacki Open Source project. He has experience in application development, architecture, infrastructure, technical writing, and IT management. MacVittie holds a B.S. in Computer Science from Northern Michigan University, and an M.S. in Computer Science from Nova Southeastern University.

@CloudExpo Stories
NetComm Wireless Limited has announced that Verizon Wireless has certified the NetComm Wireless 4G LTE Light Industrial M2M Router (NWL-25) for use on the Verizon Wireless Private Network. The offering delivers a cost-effective solution for LTE/XLTE network coverage, and addresses public network security and privacy concerns by enabling the direct transfer of data from wireless Machine-to-Machine (M2M) devices to internal enterprise systems over a segregated private network.
SYS-CON Events announced today that BMC Software has been named "Siver Sponsor" of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. BMC is a global leader in innovative software solutions that help businesses transform into digital enterprises for the ultimate competitive advantage. BMC Digital Enterprise Management is a set of innovative IT solutions designed to make digital business fast, seamless, and optimized from mainframe to mo...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
As the world moves towards more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack and NetFlix, is at the heart of Cloud Foundry – a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS.
SYS-CON Events announced today that SuperAdmins will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. SuperAdmins specializes in providing high-quality IT infrastructure services for MSPs, hosting and cloud providers. Services they offer include 24/7 NOC - Remote monitoring of the key equipment/services.
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection.
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, will describe how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He wi...
Mellanox Technologies has announced a new line of InfiniBand router systems. The new EDR 100Gb/s InfiniBand Routers enable a new level of scalability critical for the next generation of mega data-center deployments as well as expanded capabilities for data center isolations between different users and applications. The network router delivers a consistent, high-performance and low latency router solution that is mission critical for high performance computing (HPC), cloud, Web 2.0, machine learn...
SYS-CON Events announced today CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. CrowdReviews.com is the first buyer’s guide that ranks products and services based on client reviews.
Talari has announced two changes in its executive leadership team. Mark Masur, who currently serves as Talari Chairman of the Board, has taken over the responsibility of Chief Executive Officer, succeeding Emerick Woods, the company’s previous CEO. In addition, John Dickey, co-founder and current Chief Technology Officer, has been promoted to President and Chief Operating Officer.
@DevOpsSummit taking place June 7-9, 2016 at Javits Center, New York City, and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
VASCO Data Security International has announced that eSignLive ™, the e-signature choice for government organizations, has worked with Cloud Services Provider (CSP) Project Hosts to deliver its electronic signature solution in a FedRAMP SaaS-level compliant cloud. U.S. government agencies can now implement e-signatures in the cloud and meet GSA security requirements. Electronic signatures have proven cost-effective, efficient and able to improve service for government organizations for more tha...
SYS-CON Events announced today that EastBanc Technologies will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. EastBanc Technologies has been working at the frontier of technology since 1999. Today, the firm provides full-lifecycle software development delivering flexible technology solutions that seamlessly integrate with existing systems – whether on premise or cloud. EastBanc Technologies partners with p...
SYS-CON Events announced today that RackN Inc, a software company focused on building a Hybrid DevOps platform for CIOs that need to take back operational control over their Hybrid IT platforms will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY.
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
Avnet Memec - Silica, StarChip, and Trusted Objects have announced their partnership for the deployment of an optimized security platform, encompassing a family of certified secure elements with tailored security protocols from sensor to enterprise server and unique personalization services aimed at serving every customer for the Industry 4.0 and the IoT markets. The initial solution relies on a low-cost, low-power secure 32-bit microcontroller supplied by StarChip, with a dual certification fr...
SYS-CON Events announced today that MobiDev will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 200 develope...