This presentation explains what Continuous Security / DevSecOps is, Why it is important, How it works and What you can do to realized a well-engineered DevSecOps solution in your own organization or enterprise.
This document outlines 5 key practices for modern security success in DevSecOps: 1) Cloud & DevSecOps practices, 2) Pre-Commit controls like the "paved road" of secure templates, 3) Commit controls through CI/CD pipelines, 4) Acceptance controls for supply chain security, and 5) Operations controls for continuous security compliance. The presentation provides examples for implementing controls at each stage to integrate security practices into the DevSecOps workflow.
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Este documento describe la evolución de las prácticas de TI desde los enfoques tradicionales hasta los enfoques ágiles y DevOps. Explica que DevOps surgió para mejorar la colaboración entre los equipos de desarrollo y operaciones. También describe cómo DevSecOps integra la seguridad en todas las fases del ciclo de vida del desarrollo de software de una manera ágil y automatizada.
Funny stories and anti-patterns from DevOps landscapeMikalai Alimenkou
During last several years DevOps became strong buzzword used almost in every project, team and company. But almost everywhere it is used in very funny and strange context. For example, existing ops guys are renamed to DevOps just to sell them to the client for more money. Or DevOps is used as new job title for some magically powerful person who is able to operate cloud environment and modern infrastructure related tools, leading team of old school ops and participating in management meetings. In this talk I’m going to review all different anti-patterns and bad practices in DevOps landscape using stories from my personal experience as Delivery Manager and independent consultant.
Scrum is an agile framework for managing product development projects. It utilizes short "sprints" where self-organizing cross-functional teams work to deliver increments of a product. Scrum roles include the Product Owner who represents stakeholders, the Development Team who does the work, and the Scrum Master who facilitates the process. Scrum ceremonies like daily stand-ups, sprint reviews and retrospectives provide visibility and opportunities to inspect and adapt the process as needed.
¿Queres realizar un proyecto de #DevSecOps y no sabés por dónde empezar?
En estas paginas no te vamos a brindar la receta mágica o la super metodología de #DevSecOps porque eso no existe. En su lugar este E-book está destinado a ser en parte terapéutico y en parte de alerta temprana. “Las historias presentadas no son una hoja de ruta. Lo que hacen es reconocer el fracaso como parte de la base de conocimiento de la comunidad DevSecOps”.
El verdadero aprendizaje, llega a través del fracaso. Si algo sale mal, tenemos que revolver, experimentar, hackear y nuestras mentes están más abiertas a recibir aportes externos.
[2022 DevOpsDays Taipei] 走過 DevOps 風雨的下一步Edward Kuo
This document discusses DevOpsDays Taipei 2022 and the evolution of DevOps. It notes that Taiwan held its first DevOpsDays conference in 2016, and since then DevOps has grown from a little discussed topic to one that most industries now talk about and implement. The document discusses challenges of DevOps like ensuring team members always have work to do and that Agile is not just about quickly writing code. It also discusses database challenges in DevOps like automated provisioning and monitoring. Overall it advocates that with DevOps, many streams can be accommodated, and that there is no single path but what works for each organization.
Here is the small presentation on DevOps to DevSecOps Journey..
- What is DevOps and their best practices.
- Practical Scenario of DevOps practices.
- DevOps transformation Journey.
- Transition to DevSecOps and why we need it.
- Enterprise CI/CD Pipeline.
Capital One DevOps Case Study: A Bank with the Heart of Tech CompanySimform
Many organizations want to adopt DevOps to work their way through digital transformation. This case study of Capital One's journey of adopting DevOps and what distinctive tools and methods they introduced to stay ahead of the competition.
*** DevSecOps: The Evolution of DevOps ***
Have you ever asked yourself the following questions:
What does DevSecOps means?
How is this different from DevOps?
What can we learn from the DevOps movement?
Presentation by James Betteley who shares his experience of shaping DevOps and what he foresees will happen with DevSecOps.
The document discusses the roles in Scrum, an agile software development methodology. It describes the three main roles: the Scrum Team which develops the software; the Product Owner who prioritizes features and represents customers; and the Scrum Master who leads the team and ensures they follow Scrum practices. The roles work together iteratively with the Scrum Team delivering working software increments each sprint while the Product Owner and Scrum Master provide feedback and guidance.
The document provides an overview of the agile software development process. It begins with defining agile as an iterative and adaptive approach to software development performed collaboratively by self-organizing teams. It then discusses agile principles like valuing customer collaboration, responding to change, and delivering working software frequently. The document also covers specific agile frameworks like Scrum and Extreme Programming, the role of user stories, estimation techniques like planning poker, and ceremonies like daily stand-ups, sprint planning and retrospectives. It concludes by comparing agile to the traditional waterfall model and defining some common agile metrics.
In the world of DevSecOps as you may predict we have three teams working together. Development, the Security team and Operations.
The “Sec” of DevSecOps introduces changes into the following:
• Engineering
• Operations
• Data Science
• Compliance
Delivering value early and often, giving ourselves the best opportunity to beat the competition to market, realize revenue and discover insights that we can use to help us improve.
Implementing an Application Security Pipeline in JenkinsSuman Sourav
Performing continuous security testing in a DevOps environment with short release cycles and a continuous delivery pipeline is a big challenge and the traditional secure SDLC model fails to deliver the desired results. DevOps understand the process of built, test and deploy. They have largely automated this process in a delivery pipeline, they deploy to production multiple times per day but the big challenge is how can they do this securely?
This session will focus on a strategy to build an application security pipeline in Jenkins, challenges and possible solutions, also how existing application security solutions (SAST, DAST, IAST, OpenSource Libraries Analysis) are playing a key role in growing the relationship between security and DevOps.
The document discusses agile program and portfolio management. It begins by stating that adopting agile practices requires organizational transformation, not just overlaying processes. It then covers topics like agile competencies across different levels (team, program, portfolio, enterprise), managing work across time horizons (continuous, daily, iteration, release, strategic), and using story maps to decompose work from epics to features to user stories. Finally, it discusses key aspects of agile such as sprinting, velocity, and prioritizing minimally marketable features.
This document summarizes ABN AMRO's DevSecOps journey and initiatives. It discusses their implementation of continuous integration and delivery pipelines to improve software quality, reduce lead times, and increase developer productivity. It also covers their work to incorporate security practices like open source software management, container security, and credentials management into the development lifecycle through techniques like dependency scanning, security profiling, and a centralized secrets store. The presentation provides status updates on these efforts and outlines next steps to further mature ABN AMRO's DevSecOps capabilities.
This document discusses how to implement DevSecOps on AWS for startups. It covers:
- Key principles of DevSecOps like everyone being responsible for security and shifting security left
- The tools and services used in their pipeline including Packer, Terraform, Ansible, SonarQube, AWS Inspector, GuardDuty, and WAF
- How they established policies, used a multi-account approach, implemented access management, and focused on security culture and monitoring
- Their plans to further improve using AWS Config, perform penetration testing, and meet standards like OWASP and PCI DSS
DevOps aims to break down silos between development and operations teams through collaboration and automation. It combines cultural philosophies and tools to help organizations rapidly deliver high quality software. Under the traditional approach, dev and ops teams worked separately with different priorities, leading to slow delivery and finger pointing when problems arose. DevOps establishes a shared culture and goals between the teams through practices like continuous integration, automated testing, and deployment pipelines. While DevOps has no single tool, many tools have emerged to support its goals, such as configuration management, containers, orchestration, and monitoring tools.
Blaze Information Security: The cost of fixing security vulnerabilities in ea...Blaze Information Security
This talk will help developers, project managers, CIO's and anyone included in implementing a new application with an organization, understand the cost of not implementing security in each phase of the software development lifecycle (SDLC). Most projects disregard security in the early phases of the SDLC to prioritize functionality or to complete the project within the deadline. This results in a large cost to the company as these security weaknesses could pose a large amount of risk.
Speed up your XPages Application performanceMaarga Systems
This document discusses best practices for optimizing performance of XPages applications on Domino servers. It covers recommended server hardware and software configurations including memory allocation, enabling server-side caching, and configuring timeouts. Application-level optimizations are also presented such as reducing database lookups, limiting partial refreshes, and properly using scoped variables. Tools for identifying bottlenecks like XPages Toolbox are also mentioned. The document aims to provide guidance for configuring servers and coding applications for optimal performance when deploying and maintaining XPages applications.
Kanban is a lean methodology for managing workflow. It utilizes visual cues like kanban boards and cards to limit work-in-progress (WIP) and optimize flow. Key practices include visualizing the workflow, making policies explicit, managing flow, and continuously improving collaboratively through incremental changes. The overall goals are to balance demand with capacity, improve service delivery, and enable evolutionary change.
In 2009 Patrick Dubois coined the term "DevOps" when he organised the first "DevOpsDays" In Ghent, Belgium. Since then the term has become a term to explain the collaboration between all organisational stakeholders in IT projects (developers, operations, QA, marketing, security, legal, …) to deliver high quality, reliable solutions where issues are tackled early on in the value stream.
But reality shows that many businesses that implement "DevOps" are actually talking about a collaboration between development, QA and operations (DQO). Solutions are being provided but lack the security and/or legal regulations causing hard-to-fix problems in production environments.
In this talk I will explain how the original idea of Patrick to include all stakeholders got reduced to development, QA and operations and why it's so difficult to apply security or compliance improvements in this model. I will also talk about ways to make the DQO model welcoming for security experts and legal teams and why "DevSecOps" is now the term to be used to ensure security is no longer omitted from the value process.
Finally we'll have a vote if we keep the term "DevOps" as an all-inclusive representation for all stakeholders or if we need to start using "DevSecOps" to ensure the business understands can no longer ignore the importance of security.
Think that DevOps is just for product? Think again.
In this webinar, ITSM expert John Custy shows you how to apply DevOps principles to your IT org. This event is for anyone involved in the support and development of IT systems and services. The keys to higher-performing services are so simple, they might surprise you.
Watch the full webinar here: http://atlassian.com/help-desk/how-to-run-it-support-devops-way
Brought to you by JIRA Service Desk. Learn more: http://atlassian.com/service-desk
Yohanes Syailendra discusses DevSecOps implementation at DKATALIS, an Indonesian company. Some key points:
1. DevSecOps shifts security left to earlier stages of development to find and fix vulnerabilities sooner. This allows for faster development times and more secure applications.
2. At DKATALIS, DevSecOps includes threat modeling, static application security testing (SAST), dynamic application security testing (DAST), infrastructure as code scanning, and container security throughout the development pipeline.
3. A successful DevSecOps implementation requires changing culture, processes, and architecture to establish security as a shared responsibility across development and security teams. Automation is also important to scale practices
Intro to Agile Portfolio Governance Presentation Cprime
This webinar will provide guidance on effective ways to conduct Portfolio Management, using our concepts of Agile Governance to simplify and expedite the key decisions. These techniques can applied for Agile, hybrid, and classic plan-driven processes.
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
DevSecOps is a development methodology that combines security measures at every stage of the software development lifecycle in order to provide reliable and secure systems. DevSecOps, in general, increases the benefits of a DevOps service.
Introduction to DevOps in Cloud Computing.pptxLAKSHMIS553566
a collaborative approach to make the Application Development team and the IT Operations team of an organization to seamlessly work with better communication.
Capital One DevOps Case Study: A Bank with the Heart of Tech CompanySimform
Many organizations want to adopt DevOps to work their way through digital transformation. This case study of Capital One's journey of adopting DevOps and what distinctive tools and methods they introduced to stay ahead of the competition.
*** DevSecOps: The Evolution of DevOps ***
Have you ever asked yourself the following questions:
What does DevSecOps means?
How is this different from DevOps?
What can we learn from the DevOps movement?
Presentation by James Betteley who shares his experience of shaping DevOps and what he foresees will happen with DevSecOps.
The document discusses the roles in Scrum, an agile software development methodology. It describes the three main roles: the Scrum Team which develops the software; the Product Owner who prioritizes features and represents customers; and the Scrum Master who leads the team and ensures they follow Scrum practices. The roles work together iteratively with the Scrum Team delivering working software increments each sprint while the Product Owner and Scrum Master provide feedback and guidance.
The document provides an overview of the agile software development process. It begins with defining agile as an iterative and adaptive approach to software development performed collaboratively by self-organizing teams. It then discusses agile principles like valuing customer collaboration, responding to change, and delivering working software frequently. The document also covers specific agile frameworks like Scrum and Extreme Programming, the role of user stories, estimation techniques like planning poker, and ceremonies like daily stand-ups, sprint planning and retrospectives. It concludes by comparing agile to the traditional waterfall model and defining some common agile metrics.
In the world of DevSecOps as you may predict we have three teams working together. Development, the Security team and Operations.
The “Sec” of DevSecOps introduces changes into the following:
• Engineering
• Operations
• Data Science
• Compliance
Delivering value early and often, giving ourselves the best opportunity to beat the competition to market, realize revenue and discover insights that we can use to help us improve.
Implementing an Application Security Pipeline in JenkinsSuman Sourav
Performing continuous security testing in a DevOps environment with short release cycles and a continuous delivery pipeline is a big challenge and the traditional secure SDLC model fails to deliver the desired results. DevOps understand the process of built, test and deploy. They have largely automated this process in a delivery pipeline, they deploy to production multiple times per day but the big challenge is how can they do this securely?
This session will focus on a strategy to build an application security pipeline in Jenkins, challenges and possible solutions, also how existing application security solutions (SAST, DAST, IAST, OpenSource Libraries Analysis) are playing a key role in growing the relationship between security and DevOps.
The document discusses agile program and portfolio management. It begins by stating that adopting agile practices requires organizational transformation, not just overlaying processes. It then covers topics like agile competencies across different levels (team, program, portfolio, enterprise), managing work across time horizons (continuous, daily, iteration, release, strategic), and using story maps to decompose work from epics to features to user stories. Finally, it discusses key aspects of agile such as sprinting, velocity, and prioritizing minimally marketable features.
This document summarizes ABN AMRO's DevSecOps journey and initiatives. It discusses their implementation of continuous integration and delivery pipelines to improve software quality, reduce lead times, and increase developer productivity. It also covers their work to incorporate security practices like open source software management, container security, and credentials management into the development lifecycle through techniques like dependency scanning, security profiling, and a centralized secrets store. The presentation provides status updates on these efforts and outlines next steps to further mature ABN AMRO's DevSecOps capabilities.
This document discusses how to implement DevSecOps on AWS for startups. It covers:
- Key principles of DevSecOps like everyone being responsible for security and shifting security left
- The tools and services used in their pipeline including Packer, Terraform, Ansible, SonarQube, AWS Inspector, GuardDuty, and WAF
- How they established policies, used a multi-account approach, implemented access management, and focused on security culture and monitoring
- Their plans to further improve using AWS Config, perform penetration testing, and meet standards like OWASP and PCI DSS
DevOps aims to break down silos between development and operations teams through collaboration and automation. It combines cultural philosophies and tools to help organizations rapidly deliver high quality software. Under the traditional approach, dev and ops teams worked separately with different priorities, leading to slow delivery and finger pointing when problems arose. DevOps establishes a shared culture and goals between the teams through practices like continuous integration, automated testing, and deployment pipelines. While DevOps has no single tool, many tools have emerged to support its goals, such as configuration management, containers, orchestration, and monitoring tools.
Blaze Information Security: The cost of fixing security vulnerabilities in ea...Blaze Information Security
This talk will help developers, project managers, CIO's and anyone included in implementing a new application with an organization, understand the cost of not implementing security in each phase of the software development lifecycle (SDLC). Most projects disregard security in the early phases of the SDLC to prioritize functionality or to complete the project within the deadline. This results in a large cost to the company as these security weaknesses could pose a large amount of risk.
Speed up your XPages Application performanceMaarga Systems
This document discusses best practices for optimizing performance of XPages applications on Domino servers. It covers recommended server hardware and software configurations including memory allocation, enabling server-side caching, and configuring timeouts. Application-level optimizations are also presented such as reducing database lookups, limiting partial refreshes, and properly using scoped variables. Tools for identifying bottlenecks like XPages Toolbox are also mentioned. The document aims to provide guidance for configuring servers and coding applications for optimal performance when deploying and maintaining XPages applications.
Kanban is a lean methodology for managing workflow. It utilizes visual cues like kanban boards and cards to limit work-in-progress (WIP) and optimize flow. Key practices include visualizing the workflow, making policies explicit, managing flow, and continuously improving collaboratively through incremental changes. The overall goals are to balance demand with capacity, improve service delivery, and enable evolutionary change.
In 2009 Patrick Dubois coined the term "DevOps" when he organised the first "DevOpsDays" In Ghent, Belgium. Since then the term has become a term to explain the collaboration between all organisational stakeholders in IT projects (developers, operations, QA, marketing, security, legal, …) to deliver high quality, reliable solutions where issues are tackled early on in the value stream.
But reality shows that many businesses that implement "DevOps" are actually talking about a collaboration between development, QA and operations (DQO). Solutions are being provided but lack the security and/or legal regulations causing hard-to-fix problems in production environments.
In this talk I will explain how the original idea of Patrick to include all stakeholders got reduced to development, QA and operations and why it's so difficult to apply security or compliance improvements in this model. I will also talk about ways to make the DQO model welcoming for security experts and legal teams and why "DevSecOps" is now the term to be used to ensure security is no longer omitted from the value process.
Finally we'll have a vote if we keep the term "DevOps" as an all-inclusive representation for all stakeholders or if we need to start using "DevSecOps" to ensure the business understands can no longer ignore the importance of security.
Think that DevOps is just for product? Think again.
In this webinar, ITSM expert John Custy shows you how to apply DevOps principles to your IT org. This event is for anyone involved in the support and development of IT systems and services. The keys to higher-performing services are so simple, they might surprise you.
Watch the full webinar here: http://atlassian.com/help-desk/how-to-run-it-support-devops-way
Brought to you by JIRA Service Desk. Learn more: http://atlassian.com/service-desk
Yohanes Syailendra discusses DevSecOps implementation at DKATALIS, an Indonesian company. Some key points:
1. DevSecOps shifts security left to earlier stages of development to find and fix vulnerabilities sooner. This allows for faster development times and more secure applications.
2. At DKATALIS, DevSecOps includes threat modeling, static application security testing (SAST), dynamic application security testing (DAST), infrastructure as code scanning, and container security throughout the development pipeline.
3. A successful DevSecOps implementation requires changing culture, processes, and architecture to establish security as a shared responsibility across development and security teams. Automation is also important to scale practices
Intro to Agile Portfolio Governance Presentation Cprime
This webinar will provide guidance on effective ways to conduct Portfolio Management, using our concepts of Agile Governance to simplify and expedite the key decisions. These techniques can applied for Agile, hybrid, and classic plan-driven processes.
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
DevSecOps is a development methodology that combines security measures at every stage of the software development lifecycle in order to provide reliable and secure systems. DevSecOps, in general, increases the benefits of a DevOps service.
Introduction to DevOps in Cloud Computing.pptxLAKSHMIS553566
a collaborative approach to make the Application Development team and the IT Operations team of an organization to seamlessly work with better communication.
DevOps vs DevSecOps: How to Balance Speed and Security in Software DevelopmentDev Software
DevOps vs DevSecOps are not mutually exclusive but complementary practices. They both aim to deliver software faster and more efficiently but they take different approaches to security.
DevOps focuses on automating the process of software delivery while DevSecOps puts security at the forefront of the process. DevSecOps builds upon DevOps to address vulnerability in the cloud, which requires following specific security guidelines and practices.
DevOps is a software development approach that aims to shorten the systems development life cycle and provide continuous delivery with high software quality. It focuses on collaboration between development and operations teams. Key aspects of DevOps include automation of the software delivery process through tools like Docker and Jenkins, continuous integration and deployment, and monitoring of applications in production. While DevOps can improve speed and collaboration, security challenges arise from development teams prioritizing speed over security and keeping up with the fast pace of changes. Adopting DevSecOps practices like automation, clear security policies, and vulnerability management can help integrate security into the DevOps process.
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
DevSecOps means integrating security practices into the DevOps workflow from the beginning. The goal is to make everyone responsible for security and implement security decisions at the same speed as development and operations. This helps find vulnerabilities early and improve overall security. Implementing DevSecOps requires planning, building, deploying, monitoring and improving security continuously. It provides benefits like improved compliance and identifying issues earlier.
In 1993 the Telecommunications Information Networking Architecture Consortium (TINA-C) defined a Model of a Service Lifecycle that combined software development with (telecom) service operations.[7]
In 2009, the first conference named devopsdays was held in Ghent, Belgium. The conference was founded by Belgian consultant, project manager and agile practitioner Patrick Debois.[8][9] The conference has now spread to other countries.[10]
In 2012, the State of DevOps report was conceived and launched by Alanna Brown at Puppet.[11][12]
As of 2014, the annual State of DevOps report was published by Nicole Forsgren, Gene Kim, Jez Humble and others. They stated that the adoption of DevOps was accelerating.[13][14] Also in 2014, Lisa Crispin and Janet Gregory wrote the book More Agile Testing, containing a chapter on testing and DevOps.[15][16]
In 2016 the DORA metrics for throughput (deployment frequency, lead time for changes), and stability (mean time to recover, change failure rate) were published in the State of DevOps report.
The motivations for what has become modern DevOps and several standard DevOps practices such as automated build and test, continuous integration, and continuous delivery originated in the Agile world, which dates (informally) to the 1990s, and formally to 2001. Agile development teams using methods such as extreme programming couldn't "satisfy the customer through early and continuous delivery of valuable software"[19] unless they subsumed the operations / infrastructure responsibilities associated with their applications, many of which they automated. Because Scrum emerged as the dominant Agile framework in the early 2000s and it omitted the engineering practices that were part of many Agile teams, the movement to automate operations / infrastructure functions splintered from Agile and expanded into what has become modern DevOps. Today, DevOps focuses on the deployment of developed software, whether it is developed using Agile oriented methodologies or other methodologies.
DevSecOps is an augmentation of DevOps to allow for security practices to be integrated into the DevOps approach. Contrary to a traditional centralized security team model, each delivery team is empowered to factor in the correct security controls into their software delivery. Security practices and testing are performed earlier in the development lifecycle, hence the term "shift left" can be used. Security is tested in three main areas: static, software composition, and dynamic.
Checking the code statically via static application security testing (SAST) is white-box testing with special focus on security. Depending on the programming language, different tools are needed to do such static code analysis. The software composition is analyzed, especially libraries and their versions are checked against vulnerability lists published by CERT and other expert groups. When giving software to clients, licenses and its match to the one of the software distribute
The document provides an overview of secure DevOps practices including:
- Integrating security into the software development lifecycle from design through deployment.
- Using automation and continuous integration/delivery practices to continuously assess and remediate vulnerabilities.
- Implementing secure configurations for hardware and software and keeping systems updated with the latest patches.
- Performing security testing using tools that can identify vulnerabilities during the development process.
- Controlling administrative privileges and secrets management in an "infrastructure as code" environment.
The Importance of DevOps Security and the Emergence of DevSecOpsDev Software
The DevOps methodology has been adopted by many organizations as a means of accelerating software delivery and improving collaboration between teams. However, with the increasing complexity of modern applications and the growing number of threats to cybersecurity, the need for DevOps security has become paramount. In this blog post, we will explore the importance of DevOps security and the emergence of DevSecOps, a new approach that integrates security into the DevOps pipeline.
DevOps Vs SRE Major Differences That You Need To Know - Hidden Brains InfotechRosalie Lauren
DevOps Vs SRE what option should you choose to manage your IT infrastructure? Having a mobile app has become a crucial business need in the age of digitalization. Also, two key methodologies that help you improve the product lifecycle and accelerate app development are DevOps and Site Reliability Engineers (SREs).
This document summarizes a DevSecOps Engineering certification course that teaches security practices for software development. The 16-hour course explains how DevSecOps security differs from other approaches and provides education on data and security sciences. Course objectives include understanding DevSecOps concepts, business-driven security strategies, and integrating security into continuous delivery workflows. Students receive a manual, participate in exercises, and can take an exam to receive the DevSecOps Engineer certificate upon passing. Prerequisites include a DevOps Foundation certificate and experience in IT development and operations.
DevOps Security: How to Secure Your Software Development and DeliveryDev Software
Software development and delivery is a complex and dynamic process that requires collaboration, automation, and quality. To meet the increasing demands of customers and businesses, software teams need to deliver software faster and more efficiently. But they also need to ensure that the software is secure and reliable.
DevOps security, also known as DevSecOps, is a practice that integrates security into every stage of the software development lifecycle, from planning to deployment and beyond. DevOps security aims to improve efficiency and reduce risk by making security a shared responsibility for developers, IT operators, and security specialists.
Dev secops indonesia-devsecops as a service-Amien HarisenNadira Bajrei
DevSecOps is gaining popularity to recent years, thanks to the rapid expansion and adoptions of DevOps. The traditional penetration testing is considered a blocker in a rapid CI/CD deployment. So integrating security in a seamless manner is considered an important upgrade to the DevOps environment.
However, the traditional DevSecOps require huge amount of time, money and effort to implement. Traditional and DevSecOps principle is a culture that depends on teamwork between, the Dev ,Sec, and Ops team, which in real life situation its pretty difficult to realize.
This talk is about how to minimize the whole effort to implement DevSecOps in the current DevOps environment.
This document introduces a DevSecOps maturity model to help organizations assess their current DevSecOps practices and plan their journey to more advanced practices. The model outlines four stages of maturity across six competency areas related to the development lifecycle. It also describes an online self-assessment tool that organizations can use to determine their current maturity level and identify areas for improvement. The model is intended to help leaders answer three key questions: where their organization is now, where they want it to be, and how to get there to advance their DevSecOps capabilities.
This document outlines an approach for integrating security into the software development lifecycle (SDLC) using DevSecOps principles. It discusses how security can shift left by being incorporated into various phases of product development and delivery, including product management, design, development, deployment, defect management, and monitoring. It provides examples of how to integrate security practices and tools at each stage. The goal is to establish security as a critical product feature rather than an afterthought, and foster collaboration between security and development teams through a DevSecOps model and maturity criteria.
DevSecOps represents development, security, and operation. DevSecOps aims to embed the security process within the DevOps process. The objective of DevSecOps is to embrace a "security as code" culture within the ongoing flexible collaboration between security teams and release engineers.
EduXFactor presents to you a comprehensive up-to-date DevOps certification program. This course will empower you with job-relevant skills and power you ahead in your career.
With this course, master various aspects of software development, operations, continuous integration, continuous delivery, automated configuration management, test, and deployment using DevOps tools like Git, Docker, Jenkins, Ansible, Kubernetes, Puppet & Nagios..
Packed with hands-on exercise for every module, this course is suitable for software developers, technical project managers, architects, operations support, deployment engineers, IT managers, and development managers.
DevOps and Devsecops- What are the Differences.Techugo
Pharmaceutical manufacturing software is a tool that streamlines the manufacturing process of pharmaceutical products. The difference between different pharmaceutical manufacturing software lies in their features and capabilities. Some software may focus on specific areas of manufacturing, such as quality control, while others may provide end-to-end solutions for the entire manufacturing process. Factors such as scalability, customization, and regulatory compliance are also important considerations when choosing pharmaceutical manufacturing software. Ultimately, the right software should meet the unique needs of a pharmaceutical manufacturing company and improve their operational efficiency.
DevOps and Devsecops- Everything you need to know.Techugo
DevOps is a software development approach that emphasizes collaboration and communication between developers and IT operations teams to streamline the development and deployment of software. DevSecOps extends DevOps by integrating security into every stage of the software development lifecycle, from planning to deployment, to ensure that security risks are identified and addressed early on.
DevSecOps is an idea that is relatively new and is based on the principles of DevOps. While DevOps integrates operations and development in a continuous, harmonized process, DevSecOps incorporates a security component in the SDLC. Visit the post to know more.
DevOps certification course has been designed keeping in mind the latest industry needs. You will be trained on the following skillsets which have been curated based on job descriptions posted by companies looking for DevOps Engineers: We provide expert faculty, And we have real-time experts in dev0ps,
Value Stream Mapping Worskshops for Intelligent Continuous SecurityMarc Hornbeek
This presentation provides detailed guidance and tools for conducting Current State and Future State Value Stream Mapping workshops for Intelligent Continuous Security.
DORA Companion Metrics unlock CICD diagnostic power.pdfMarc Hornbeek
DORA Metrics are essential for CICD but not sufficient. DORA Companion metrics are introduced and explained to resolve the shortcomings of DORA alone. DORA Companion Metrics are defined for each stage of the CICD pipeline : CI, Delivery and Deployment .
AI Assisted Continuous Testing - Talk Track v2.pdfMarc Hornbeek
In my talk today I will explain how to transform an organization that is currently using "Continuous Testing" as part of their DevSecOps solution to "AI-Assisted Continuous Testing".
I will cover:
What AI-Assisted Continuous Testing is.
I will compare AI Assisted Testing to existing Continuous Testing.
I will highlight some of key challenges that I found during different types of transformation projects fusng A I enabled tools.
and
I will explain some tools and transformation practices that I find useful to ensure success with AI-Assisted Continuous Test transformations for DevSecOps.
Finally I will conclude with my view of benefits, and a radical prediction for the future of DevSecOps enabled by AI-Assisted Continuous Testing.
This is a brief description of feature flags (also know as feature toggles or feature switches) used in combination with version management and branching strategies to streamline and optimize CICD pipelines.
DevOps_the_Gray published predictions for 2020 on engineeringdevops.com. The article focused on trends in DevOps practices and technologies for the coming year. Key areas highlighted included continued growth in cloud-native development, increased focus on security and compliance, and evolving tooling to support modern software delivery practices.
This Seven Step Digital Transformation Engineering Blueprint is
proven engineering approach to systematically transform your people, processes and technologies practices.
This document discusses how to perform a gap analysis for containers practices. It outlines the steps to identify the topic, determine relevant practices, survey stakeholders to collect current practice levels and importance scores, perform a gap assessment to identify differences between current and best practices, validate the results in a workshop, and conduct a gap analysis to prioritize areas for improvement. An example is provided where containers is the topic, practices are identified from nine categories, stakeholders are surveyed, and gap scores are calculated and analyzed to determine which practice areas and individual practices should be the focus of an improvement strategy.
This slide deck explains a simple approach to conduct value stream mapping for DevOps value streams. Easy to use templates are provided. An example is included, which shows the dramatic effect that using containers and Kubernetes had on the value stream for a business application.
This presentation explains how testing activities constitute the main bottleneck to flow in most continuous delivery pipelines. Continuous Testing strategies are designed to reduce testing bottlenecks, and accelerate time-to-quality.
A blueprint is presented for Continuous Testing. Specific strategies are presented including Continuous Test Tenets, Leadership and Culture practices, Test strategies and Plans, Test Management, Test Automation, Test Tools, Test Environment Management and Test Results Analysis. A Continuous Testing Assessment approach is described to help assess current state of of continuous testing. A phased implementation approach is explained.
This deck illustrates a Blueprint for DevOps-as-a-Service (DaaS), example metrics that are relevant to different stakeholders of DevOps services, and a process for developing metrics for DaaS.
This talk explains a proven approach to assessment SRE practices for an organization. The approach uses a 9 pillar model and 7 step transformation blueprint to determine current state of SRE practices and to set a roadmap to improve SRE practices towards industry best practices.
This document summarizes a 30-minute talk on engineering DevOps given by Marc Hornbeek. The talk discusses defining engineering DevOps, how to engineer people, processes, and technology for DevOps. It also covers how to engineer applications, pipelines, and infrastructures for DevOps. The talk presents a seven-step DevOps engineering transformation blueprint and discusses the future of engineering DevOps beyond continuous improvement. The document provides benefits of a well-engineered DevOps approach and why engineering is needed to implement DevOps successfully. It also summarizes DevOps engineering tools and maturity levels.
To realize the enormous benefits possible with DevOps Continuous Delivery requires a strategic approach and adherence to best practices for leadership, culture, organization, process and technologies. Preferred product and systems architectures are described in this deck. The slide deck is a high level summary of an one day course being delivered at the DevOps India Summit in Banglaru August 30, 2018.
DevOps Test Engineering - Marc Hornbeek - July 2017Marc Hornbeek
This presentation is summary of the DevOps Test Engineer certification course offered globally through authorized reps of the DevOps Institute. http;//devopsinstitute.com
Engineering DevOps Right the First TimeMarc Hornbeek
Marc Hornbeek is an experienced DevOps consultant with over 39 years of experience in IT architecture, development, and management. He discusses engineering DevOps right from the start through a top-down/middle-out approach focusing on leadership alignment, gap assessment, and process re-engineering to optimize agility, efficiency, quality and stability. Key aspects include modeling the DevOps pipeline, analyzing elements like tools and metrics, and controlling technology and process evolution over time.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
☁️ GDG Cloud Munich: Build With AI Workshop - Introduction to Vertex AI! ☁️
Join us for an exciting #BuildWithAi workshop on the 28th of April, 2025 at the Google Office in Munich!
Dive into the world of AI with our "Introduction to Vertex AI" session, presented by Google Cloud expert Randy Gupta.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
Analysis of reinforced concrete deep beam is based on simplified approximate method due to the complexity of the exact analysis. The complexity is due to a number of parameters affecting its response. To evaluate some of this parameters, finite element study of the structural behavior of the reinforced self-compacting concrete deep beam was carried out using Abaqus finite element modeling tool. The model was validated against experimental data from the literature. The parametric effects of varied concrete compressive strength, vertical web reinforcement ratio and horizontal web reinforcement ratio on the beam were tested on eight (8) different specimens under four points loads. The results of the validation work showed good agreement with the experimental studies. The parametric study revealed that the concrete compressive strength most significantly influenced the specimens’ response with the average of 41.1% and 49 % increment in the diagonal cracking and ultimate load respectively due to doubling of concrete compressive strength. Although the increase in horizontal web reinforcement ratio from 0.31 % to 0.63 % lead to average of 6.24 % increment on the diagonal cracking load, it does not influence the ultimate strength and the load-deflection response of the beams. Similar variation in vertical web reinforcement ratio leads to an average of 2.4 % and 15 % increment in cracking and ultimate load respectively with no appreciable effect on the load-deflection response.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
Continuous Security / DevSecOps- Why How and What
1. Marc Hornbeek
a.k.a. DevOps_the_Gray esq.
CEO and Principal Consultant
Engineering DevOps Consulting
Author – Engineering DevOps
[email protected]
Continuous Security / DevSecOps
Evolving from Security-as-an-audit strategies to Lifecycle Security-as-code strategies
mybook.to/engineeringdevops
https://devops.com/9-pillars-of-continuous-security-best-practices/
2. Enterprise, Manufacturers, Service Providers and Institutions
DevOps / QA / DevSecOps / SRE
www.engineeringdevops.com
[email protected]
Training and
Certifications
DevOps, DevSecOps QA, SRE
Assessments
DevOps, DevSecOps, QA, SRE
Strategic Planning
Agile plans for 26 topics
Speaking Engagements
Conferences, Events,
Onsite or Online
Advisory Services
Workshops, mentoring
Content Writing
Blogs, White papers, eBooks
Webinars
Content and delivery
Engineering DevOps Consulting
3. www.engineeringdevops.com
What You Will Learn
• What is Continuous Security / DevSecOps?
• Why is continuous security important to
DevOps?
• How is security integrated into Continuous
DevOps environments?
• What do you need to integrate continuous
security?
• Typical Q&A
4. What is Continuous Security / DevSecOps?
Leadership
Culture
Design
Integration
Testing
Infrastructure
Monitoring
Deployment
5. What is Continuous Security / DevSecOps?
Continuous Security as an integral part of
continuous delivery cultures, processes
and value streams.
Integrating security practices into DevOps,
such as Security as Code, is a way for
security practitioners to operate and
contribute value with less friction. Security
practices must adapt dynamically to ensure
data security and privacy issues are not left
behind in the fast-paced world of DevOps.
6. Why is continuous security important to DevOps?
DevOps without DevSecOps generates security risks.
7. Why is continuous security important to DevOps?
DevOps without
DevSecOps generates
security risks.
DevOps without DevSecOps is dangerous!
Like Fusion energy: powerful but dangerous if not
controlled
Acceleration of dev and deployment without
DevSecOps practices can result in unintended
security risks (E.g. OWASP Top 10)
- Designs without security considerations
- New Attack surfaces: IOT, Mobile, home offices
- Vulnerabilities embedded in code
- Credentials embedded in dev artifacts
- Additional Infrastructure attack surfaces
- Poor Database from SQL injections
- Exposing sensitive data
- 3rd party code – Open source
- Software supply chain (E.g., SolarWinds)
- Inadequate login and monitoring capabilities.
8. Why is continuous security important to DevOps?
DevSecOps is an opportunity to integrate
security into the DevOps value stream.
9. Why is continuous security important to DevOps?
DevSecOps is an opportunity to
integrate security into the DevOps
value stream.
• DevSecOps is a Holy Grail for cybersecurity
• Like fusion power – sophisticated controls are
needed
• Change security structure from “expert
governance role” to “educated workforce
supported by integrated technologies and
practices”:
- Education and training
- Design with Security practices
- Automated security scanning
- Automated testing
- End-to-end monitoring
- Immutable Infrastructure as code practices
- Security monkey.
10. How is security integrated into Continuous DevOps
environments?
9 Pillars of
DevSecOps
practices
https://devops.com/9-
pillars-of-continuous-
security-best-practices/
11. How is security integrated into Continuous DevOps
environments?
Foundations
• Orchestration and automation of security tools and processes
• Governance through monitoring and “as-code” controls
9 Pillars
• Leadership: Evangelist, sponsor,
budget, behavior reinforcement
• Culture: Education, Empowerment,
Communication, collaboration
• Design: Security design standards
and practices
• Integration: Security Scanning
dependency tracking, source and
image control
• Testing: security tests
• Monitoring: security logs and
analysis
• Security as a pillar: security center
of excellence
• Infrastructure: Immutable infra as
code
• Delivery/Deployment: Deployment
strategies, quick detection and
recovery
Arches
• Value Streams make
security visible end to end.
• Planning and operations
based on continuous
leaning
• Releases gated with
security metrics
• CI/CD Security tools
orchestration and
automation
DevSecOps Practices
12. Continuous Security / DevSecOps Engineering Blueprint
DevSecOps
provides an
opportunity to
reduce security
risks if security
is integrated
into the
continuous
delivery pipeline
according to
good
engineering
practices.
13. How is security integrated into Continuous DevOps
environments?
Security instrumentation, automation and observability
14. How is security integrated into Continuous DevOps
environments?
Security
instrumentation,
automation and
observability
SHIFT VERY LEFT IS THE KEY TO DEVSECOPS
• Top DevSecOps organizations focus on embedding security in the design
and build stage of agile development.
• Revamp the security operation model
• Organization structure: from focus on security domains to Product focus
• Communication: from formal governance to embedded culture
• Roles and responsibilities: from Expert Assessor to Coaches and
practitioners
• Continuous Improvement: from Unconstructive KPIs to observable
SLO/SLIs
Center of Security Excellence Approach
1. Educate and empower others rather than policing compliance.
2. Automate security to help IT and the business achieve their agility goal
3. Monitor exceptions rather than police non-compliance. Employ
Observability and SLO/SLO concepts.
15. Seven-Step Transformation Blueprint
1. Visioning
2. Alignment
3. Assessment
4. Solution
5. Realize
6. Operationalize
7. Expansion
What do you need to integrate continuous security?
Kickoff
Meeting
Discovery
Surveys
Solution
Mapping
Workshops
& Interviews
Recommended
Solution
Follow-up
Typical duration 21 days
Rapid Strategic DevSecOps Assessment
16. DevOps Adoption Blueprint
Leadership / Culture Initiative
Model Application m
Application m + 1
• Adoption goals
• Leaders training
• Organization preparation
• Model project selection
• Investment (team &
tools)
• Architecture team
• Monitoring and
incentives
• Team and organization
• Training (CI/CD practices)
• Goals, Assessment, Value Stream
• Tool chain with ARA backbone
• Automate CI and QA automation
• Automate CD , containers, G/B, A/B
• DevSecOps, SRE practices
• KPIs, SLOs and monitoring tools
• Site Reliability Engineering
• Optimize (Kaizen)
• App Selection
• Self contained product teams
(squads, tribes, SREs)
• Proactive sharing or practices
(Yokoten)
• Info sharing (Chapters and Guilds)
SCALE !
Systematic, measured, adoption progression
POC MVP
2nd
Way
1st
Way
3rd
Way
Application m + 2
Application m + n
. . .
Scaling DevSecOps – Progressive Adoption Blueprint
17. DevOps Adoption Blueprint
Scaling DevSecOps – Progressive Adoption Blueprint
The DevOps Progressive Adoption blueprint ensures all applications targeted for DevOps transformation
progress towards continuous improvement instead of stalling out.
Scaling DevOps to other applications across the enterprise will typically
occur nearly in parallel with the development of DevOps for the Model
application.
Success patterns learned from the model application are
communicated across the enterprise and applied to other applications
proactively in a way referred to as “Yokoten”. The priorities for
applications follow the same application selection criterion as the
model.
As DevOps scales to more and more applications across the enterprise,
more of the organization is restructured into tightly coupled product
teams while maintaining a culture of proactive cross-team sharing of
DevOps practices. Establishing cross-team Chapters and Guilds is a
good approach to facilitate sharing and communication.
18. Summary / Takeaways
Continuous security/DevSecOps is at once a
transformation challenge to an opportunity
for dramatic security improvement.
There is no “standard” DevSecOps approach
in the industry.
The Continuous Security approach based
on the Continuous Security Blueprint, 9
Pillars Assessment, Seven-Step
Transformation Blueprint and Progressive
Adoption Blueprint is proven, progressive
and adaptable approach.
Refer to
www.engineeringdevops.com for
more information regarding the
Continuous Security/ DevSecOps
approach.
19. Discussion Questions
What % of organizations are embracing continuous security?
QA (10%) – DevOps (70%) – DevSecOps (?)- SRE/Security (?)
World Software Quality
2020 Upskilling Report – DevOps Institute
42% project level
23% enterprise level
16% planning
81% overall
Of those 52% state SECURITY SKILLS ARE MUST-HAVE
20. What are some myths and realities for continuous security?
Myth: tools and automation alone are the answer
Reality: leadership, culture, training, automaton, observability
Myth: Adopting DevSecOps means giving up control.
Reality: SAC improves governance and compliance to security standards
through automation.
21. What are impediments to implementing continuous security?
Need to establish a Center of Security Excellence Approach
1.Strategy Alignment
2.Culture - Educate and empower others rather than policing
compliance.
3.Tools and Automation – strategy selection and work
4.Monitor exceptions rather than police non-compliance.
Employ Observability and SLO/SLO concepts.
22. How can you determine a roadmap to continuous security?
There no one way or standard.
What has proven to work:
• Seven-Step Transformation Blueprint, starting with
strategy alignment
• Strategic Progressive Adoption Blueprint
23. How will emerging technologies affect continuous security?
• New attack surfaces – Work from home, IOT,5G Access
networks
• Supply chain – open source and 3rd part
• DevSecOps embedded into applications, pipelines and
infrastructure
• Cloud-native, containers, microservices
• DevSecOps as a service
• AI/ML to help improve scans, observability and
determine best actions