Date: Mon, 21 Sep 2020 20:00:00 -0400
<div class="wp-block-jetpack-markdown"><h3>Summary</h3> <p>Servers and services that have any exposure to the public internet are under a constant barrage of attacks. Network security engineers are tasked with discovering and addressing any potential breaches to their systems, which is a never-ending task as attackers continually evolve their tactics. In order to gain better visibility into complex exploits Colin O’Brien built the Grapl platform, using graph database technology to more easily discover relationships between activities within and across servers. In this episode he shares his motivations for creating a new system to discover potential security breaches, how its design simplifies the work of identifying complex attacks without relying on brittle rules, and how you can start using it to monitor your own systems today.</p> <h3>Announcements</h3> <ul> <li>Hello and welcome to Podcast.__init__, the podcast about Python and the people who make it great.</li> <li>When you’re ready to launch your next app or want to try a project you hear about on the show, you’ll need somewhere to deploy it, so take a look at our friends over at Linode. With the launch of their managed Kubernetes platform it’s easy to get started with the next generation of deployment and scaling, powered by the battle tested Linode platform, including simple pricing, node balancers, 40Gbit networking, dedicated CPU and GPU instances, and worldwide data centers. Go to <a href="https://www.pythonpodcast.com/linode?utm_source=rss&utm_medium=rss">pythonpodcast.com/linode</a> and get a $60 credit to try out a Kubernetes cluster of your own. And don’t forget to thank them for their continued support of this show!</li> <li>This portion of Python Podcast is brought to you by Datadog. Do you have an app in production that is slower than you like? Is its performance all over the place (sometimes fast, sometimes slow)? Do you know why? With Datadog, you will. You can troubleshoot your app’s performance with Datadog’s end-to-end tracing and in one click correlate those Python traces with related logs and metrics. Use their detailed flame graphs to identify bottlenecks and latency in that app of yours. Start tracking the performance of your apps with a free trial at <a href="https://www.pythonpocast.com/datadog?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">pythonpodcast.com/datadog</a>. If you sign up for a trial and install the agent, Datadog will send you a free t-shirt.</li> <li>You listen to this show to learn and stay up to date with the ways that Python is being used, including the latest in machine learning and data analysis. For more opportunities to stay up to date, gain new skills, and learn from your peers there are a growing number of virtual events that you can attend from the comfort and safety of your home. Go to <a href="https://www.pythonpodcast.com/conferences?utm_source=rss&utm_medium=rss">pythonpodcast.com/conferences</a> to check out the upcoming events being offered by our partners and get registered today!</li> <li>Your host as usual is Tobias Macey and today I’m interviewing Colin O’Brien about Grapl, an open source platform for detection and response of system security incidents</li> </ul> <h3>Interview</h3> <ul> <li>Introductions</li> <li>How did you get introduced to Python?</li> <li>Can you start by describing what Grapl is and the problem that you are trying to solve with it? <ul> <li>What was your original motivation to create it?</li> </ul> </li> <li>What were the existing options for security detection and response, and how is Grapl differentiated from them?</li> <li>Who is the target audience for the Grapl project?</li> <li>How is the Grapl system architected? <ul> <li>How has the design of the system evolved since you first began working on it?</li> <li>How much effort would it be to separate the Grapl architecture from AWS to migrate it to other environments?</li> </ul> </li> <li>What have you found to be the benefits of splitting the implementation of the system between Rust for the system and Python for the exploration? <ul> <li>What challenges have you faced as a result of working across those languages?</li> </ul> </li> <li>What data sources does Grapl use to build its graph of events within a system?</li> <li>Can you talk through the overall workflow for someone using Grapl?</li> <li>What are some examples of the types of exploits that you can identify with Grapl?</li> <li>What are some of the most interesting, unexpected, or innovative ways that you have seen Grapl used?</li> <li>What are some of the most interesting, unexpected, or challenging lessons that you have learned while building it?</li> <li>When is Grapl the wrong choice?</li> <li>What do you have planned for the future of Grapl?</li> </ul> <h3>Keep In Touch</h3> <ul> <li><a href="https://github.com/insanitybit?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">insanitybit</a> on GitHub</li> <li><a href="https://www.linkedin.com/in/colindobrien/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">LinkedIn</a></li> <li><a href="https://twitter.com/InsanityBit?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">@InsanityBit</a> on Twitter</li> </ul> <h3>Picks</h3> <ul> <li>Tobias <ul> <li><a href="https://books.disney.com/artemis-fowl/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Artemis Fowl</a> book series by Eoin Colfer</li> <li><a href="https://movies.disney.com/artemis-fowl?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Artemis Fowl</a> Movie</li> </ul> </li> <li>Colin <ul> <li><a href="https://github.com/PyO3/pyo3?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">PyO3</a></li> </ul> </li> </ul> <h3>Closing Announcements</h3> <ul> <li>Thank you for listening! Don’t forget to check out our other show, the <a href="https://feeds.fireside.fm/pythonpodcast/rss">Data Engineering Podcast</a> for the latest on modern data management.</li> <li>Visit the <a href="https://www.pythonpodcast.com?utm_source=rss&utm_medium=rss">site</a> to subscribe to the show, sign up for the mailing list, and read the show notes.</li> <li>If you’ve learned something or tried out a project from the show then tell us about it! Email <a href="mailto:hosts@podcastinit.com">hosts@podcastinit.com</a>) with your story.</li> <li>To help other people find the show please leave a review on <a href="https://itunes.apple.com/us/podcast/podcast.-init/id981834425?mt=2&uo=6&at=&ct=&utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">iTunes</a> and tell your friends and co-workers</li> <li>Join the community in the new Zulip chat workspace at <a href="https://www.pythonpodcast.com/chat?utm_source=rss&utm_medium=rss">pythonpodcast.com/chat</a></li> </ul> <h3>Links</h3> <ul> <li><a href="https://github.com/grapl-security/grapl?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Grapl</a></li> <li><a href="https://www.graplsecurity.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Grapl Security</a></li> <li><a href="https://en.wikipedia.org/wiki/Security_information_and_event_management?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">SIEM == Security Information and Event Management</a></li> <li><a href="https://www.rapid7.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Rapid7</a></li> <li><a href="https://www.metasploit.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Metasploit</a></li> <li><a href="https://www.rapid7.com/products/insightidr/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Insight IDR</a></li> <li><a href="https://www.erlang.org/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Erlang</a></li> <li><a href="https://dgraph.io/graph-db?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">DGraph</a></li> <li><a href="https://www.splunk.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Splunk</a></li> <li><a href="https://www.elastic.co/elasticsearch/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Elasticsearch</a></li> <li><a href="https://aws.amazon.com/lambda/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">AWS Lambda</a></li> <li><a href="https://sysdig.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Sysdig</a></li> <li><a href="https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Sysmon</a></li> <li><a href="https://aws.amazon.com/cloudtrail/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">AWS CloudTrail</a></li> <li><a href="https://aws.amazon.com/guardduty/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Guard Duty</a></li> <li><a href="https://www.openfaas.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">OpenFaaS</a></li> <li><a href="https://aws.amazon.com/sqs/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">AWS SQS</a></li> <li><a href="https://aws.amazon.com/dynamodb/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">DynamoDB</a></li> <li><a href="https://github.com/PyO3/pyo3?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">PyO3</a></li> <li><a href="https://en.wikipedia.org/wiki/Dropper_(malware)?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Dropper Malware</a></li> <li><a href="https://attack.mitre.org/techniques/T1563/001/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">SSH Session Hijacking</a></li> <li><a href="https://www.vagrantup.com/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">Vagrant</a></li> </ul> <p>The intro and outro music is from Requiem for a Fish <a href="http://freemusicarchive.org/music/The_Freak_Fandango_Orchestra/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">The Freak Fandango Orchestra</a> / <a href="http://creativecommons.org/licenses/by-sa/3.0/?utm_source=rss&utm_medium=rss" rel="noopener" target="_blank">CC BY-SA</a></p> </div> <p></p> <img alt="" height="0" src="https://analytics.boundlessnotions.com/piwik.php?idsite=1&rec=1&url=https%3A%2F%2Fwww.pythonpodcast.com%2Fgrapl-network-security-episode-282%2F&action_name=Flexible+Network+Security+Detection+And+Response+With+Grapl+-+Episode+281&urlref=https%3A%2F%2Fwww.pythonpodcast.com%2Ffeed%2F&utm_source=rss&utm_medium=rss" style="border: 0; width: 0; height: 0;" width="0" />