SlideShare a Scribd company logo
©
2022
Devops
Institute
DevSecOps SKILup Day
Your developers decide your
security posture, not your security
teams
Turja Narayan Chaudhuri
Thank You all for being here.
And , a Big Thank You to the DevOps Institute for
hosting this event, and inviting me over .
I hope you all have a wonderful session.
A brief about me -
• Currently , I am working as an Assistant Director,
Cloud Practice at EY (Ernst & Young).
• Before that I led the CCOE ( Cloud
Centre Of Excellence) Team at Accenture.
• I have around 10+ years of IT experience,
working on Public Cloud technologies since 2017.
Expectation management -
• This is not an introductory session on how
to get started with DevSecOps, or shift-left
security.
• It is expected that the audience for this session is
already familiar with a high-level
understanding of security challenges in modern
software systems, and DevSecOps – principles and
practices.
Overall Agenda -
• Section I - Context : Challenges with cloud-
native security
• Section II - Solutions : DevSecOps
• Section III – Scaling DevSecOps Adoption :
Developer Relations
• Section IV - Conclusion
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Security Teams.pptx
•Section I - Context :
Challenges with cloud-native
security
• Section II - Solutions : DevSecOps
• Section III – Scaling DevSecOps Adoption : Developer
Relations
• Section IV - Conclusion
Cloud-native applications refer to applications which have
architectures that are conceptually built and run to take
advantageof the distributed computing that is normally
offered by the cloud delivery model.
What is cloud-native?
History of Cloud Native
There has been tremendous growth
in Cloud-native ecosystem, especially in
use of Kubernetes, over the last couple
of years.
It has become the de-facto standard
for application deployment
everywhere.
Growth of cloud-native ecosystems
State of Cloud Native Development : This shows
the rapid growth in containerization ecosystems
(CNCF, 2020)
But, at the same
time, security
concerns are
among the most
crucial topics in
the radar of
enterprises today.
Challenges with sustained inorganic
growth
The current model of implementing security does
not work well for cloud-native ecosystems. It has quite
a few challenges :
Lack of visibility
Large number of entities that must be secured
Misconfigurations
Diverse architectural patterns need to be secured
Inability to enforce consistent policies
Environments are in a flux
Security challenges for cloud-native
• Section I - Context : Challenges with cloud-native
security
•Section II - Solutions :
DevSecOps
• Section III – Scaling DevSecOps Adoption :
Developer Relations
• Section IV - Conclusion
Perimeter security, or just
securing the boundary, or the
traditional model of having a
security team to do all the testing
will not work any more.
We need to do things differently !
Traditionally, how was security
handled by enterprises?
• The role of the security team was
restrictedto a specific team, that
too postponedtill the last stage of
deployment.
• This was okay when development cycles
lasted months or years.
In today’s age of frequent deliveries,
say weeks/even days,
outdated/traditional security
practices can hamper the
most efficient DevOps
practices.
What needs to change?
• A more collaborative approach between the
different teams needs to be enforced.
• Security needs to be treated as a shared responsibility
across the enterprise, not handled in silos.
• Security tools needs to be injectedinto the software
development lifecycle, integrated end-to-end, and enforced
from the start of the project, not as an after-thought.
So, what exactly is DevSecOps?
• DevSecOpsstands for development, security,
and operations.
• It's an approach to culture, automation, and platform
design that integrates security as a
shared responsibility throughout
the entire IT lifecycle.
This is also tied with Shift-Left Security
• The idea is to inject security controls early
in the software development lifecycle, so that
issues/vulnerabilities can be identified at the
beginning rather than at the end.
• This effectively streamlines the development
lifecycle, drastically improves quality, and enables
faster delivery of business value by quick
progression to future stages in the product
development lifecycle.
• Section I - Context : Challenges with cloud-native
security
• Section II - Solutions : DevSecOps
•Section III – Scaling
DevSecOps Adoption :
Developer Relations
• Section IV - Conclusion
There are a lot of aspects that are at play when an
enterprise wants to successfully adopt
DevSecOps.
Some of them might be :
 Cultural change
 Executive buy-in
 Leaders and enthusiasts to act as evangelists
 Cross-functional teams
 Measurable indicators
How do I scale DevSecOps adoption
across my enterprise?
But, at the hear of it all is -
Developer
Relations
Developer Relations – What is it?
DevRel, or developer relations, is a process for nurturing
mutually beneficial relationships between organisations and
software developers.
In other words, it’s a collection of strategies and tactics that
help companies to work better together with
software engineers (developers).
Exactly what developer relations teams do and why they do
it depends on what their organisation needs.
Why do developers matter for
enterprise security.
• No adoption initiative can succeed without
enthusiasm from developers.
• Security is no exception, and the more we are trying to
shift-left, the more we need to empower developers,
involve them in the processes.
So, what are some of the things that
as an enterprise, we can do , to
solve this problem?
1 . Empowerment
• Developers should be a part of the
planning/strategy phase of DevSecOps
adoption in the journey.
• They should have a say in what processes,
principles and practices should be brought in.
• They should be treated as change agents,
and their inputs also considered for key
decisions that are taken at the start of the
adoption journey.
2 . Cyclic Accountability
• Security teams should be accountable to
developers as well.
• They should take time to educate developers
and explain the rationale behind their choices
and decisions.
• Security constraints should not appear as a diktat,
rather a consensus should be reached after
collaborative discussion making.
3 . Trust
• If developers are involved in the process
from Day1, they will be as accountable for the
success of the initiative as the executive or
security teams.
• They will trust the findings of the security
teams, and adhere to the guidelines if they had a
part in drafting them.
4 . Information Democratization
• Information should not be maintained in silos.
• All relevant documentation should be available
to the developers.
• They should even have privileges to suggest
changes or raise issues in case something
is not working in the ground.
5 . Self-Service
• Developers should be able to consume security tools
via self-service.
• The process to onboarda new product/project onto a
security management platform/vulnerability scanner should
be simple and seamless.
• There should be no friction, and developers should not
have to wait or talk to different people to
get a simple job done.
6 . Federated Governance
• A governance structure should be established to
maintain high-level control of the adoption process.
• This could be a central excellence team with
representatives from all teams, followed by local
representation in Service Line teams.
• Developers should be able to reach out to this team for
generic guidance or in case of conflicts.
7 . Right to dissent
• Enterprise should meet developers where they
are and not try to drag them on an executive sponsored
journey which is not aligned with the developer
community.
• Developers should have the right to flag issues in
current security processes if they hamper progress, with
a strong focus on including their insights to
incrementally transform the initiatives.
• Section I - Context : Challenges with cloud-native
security
• Section II - Solutions : DevSecOps
• Section III – Scaling DevSecOps Adoption :
Developer Relations
•Section IV - Conclusion
If you do not involve
developers in your journey,
they will find a way to
bypasseven the most
stringent policies.
Like it or not, even with the most sophisticated security
guardrails, end of day, if you want security with agility,
you need to ensureyour developers are
aligned with your vision and
equally invested in the
process.
TurjaChaudhuri-
LinkedIn
Thank you so much !!
©
2022
Devops
Institute
DevSecOps SKILup Day
Your developers decide your security posture,
not your security teams
Thanks for Watching
Why not continue the conversation in the
Experts Corner?

More Related Content

PPTX
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOCX
DevSecOps - offpage blog final draft - 03.docx
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
PDF
Understanding DevSecOps.pdf
PPTX
Introduction to DevSecOps
DOCX
DevSecOps – The Importance of DevOps Security in 2023.docx
PDF
Enterprise Devsecops
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DevSecOps - offpage blog final draft - 03.docx
Protecting Agile Transformation through Secure DevOps (DevSecOps)
2021-10-14 The Critical Role of Security in DevOps.pdf
Understanding DevSecOps.pdf
Introduction to DevSecOps
DevSecOps – The Importance of DevOps Security in 2023.docx
Enterprise Devsecops

Similar to 2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Security Teams.pptx (20)

DOCX
The Importance of DevOps Security in 2023.docx
PDF
DevSecOps What Why and How
PDF
DevOps and Devsecops What are the Differences.pdf
PPTX
What is devsecops and what is the characteristics of it
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PDF
DevOps and Devsecops- Everything you need to know.
PPTX
ISACA Ireland Keynote 2015
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
PPTX
A detailed guide about dev secops
PDF
DevOps and Devsecops- What are the Differences.
PPTX
The Importance of DevOps Security and the Emergence of DevSecOps
PDF
DevSecOps Implement Making Security Central to Your DevOps Pipeline
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
PDF
Introduction to DevSecOps
PDF
DevOps and Devsecops.pdf
PDF
A detailed guide about dev secops.docx
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
The Importance of DevOps Security in 2023.docx
DevSecOps What Why and How
DevOps and Devsecops What are the Differences.pdf
What is devsecops and what is the characteristics of it
Why Security Engineer Need Shift-Left to DevSecOps?
DevOps and Devsecops- Everything you need to know.
ISACA Ireland Keynote 2015
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
A detailed guide about dev secops
DevOps and Devsecops- What are the Differences.
The Importance of DevOps Security and the Emergence of DevSecOps
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Pentest is yesterday, DevSecOps is tomorrow
DevSecOps Best Practices-Safeguarding Your Digital Landscape
The Rise of DevSecOps in CI_CD Workflows.pdf
From DevOps to DevSecOps: Evolution of Secure Software Development
Introduction to DevSecOps
DevOps and Devsecops.pdf
A detailed guide about dev secops.docx
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Ad

More from Turja Narayan Chaudhuri (12)

PPTX
ADDO_2022_Turja_Your developers decide your security posture , not your secur...
PPTX
SUSECON Digital 22 Scale your CICD setup for Cloud Native microservices via I...
PPTX
SUSECON Digital 22 Enterprise-Wide Kubernetes Adoption - Principles, Practice...
PPTX
OrteliusMicroserviceVisionaries2022_Why do you need a microservice catalog to...
PPTX
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
PPTX
Agile Architecture and NFR in a Cloud Native Design.pptx
PPTX
2022 DOI SKILup Days_Google Uses Monorepo, and I Don't - Here's Why.pptx
PPTX
Cloud lunchn learn_howtobecomeacloudarchitect_part3
PPTX
Cloud lunchn learn_howtobecomeacloudarchitect_part2
PPTX
Enterprise-Wide Kubernetes Adoption - Principles, Practices and Processes
PPTX
Cloud lunchn learn_howtobecomeacloudarchitect_part1
PPTX
Agile architectures in a modern cloud-native ecosystem
ADDO_2022_Turja_Your developers decide your security posture , not your secur...
SUSECON Digital 22 Scale your CICD setup for Cloud Native microservices via I...
SUSECON Digital 22 Enterprise-Wide Kubernetes Adoption - Principles, Practice...
OrteliusMicroserviceVisionaries2022_Why do you need a microservice catalog to...
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
Agile Architecture and NFR in a Cloud Native Design.pptx
2022 DOI SKILup Days_Google Uses Monorepo, and I Don't - Here's Why.pptx
Cloud lunchn learn_howtobecomeacloudarchitect_part3
Cloud lunchn learn_howtobecomeacloudarchitect_part2
Enterprise-Wide Kubernetes Adoption - Principles, Practices and Processes
Cloud lunchn learn_howtobecomeacloudarchitect_part1
Agile architectures in a modern cloud-native ecosystem
Ad

Recently uploaded (20)

PDF
Top 10 read articles In Managing Information Technology.pdf
PPTX
meets orient on the new industry intereacting skills .pptx
PDF
Chad Ayach - A Versatile Aerospace Professional
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
PPT
Chapter 6 Design in software Engineeing.ppt
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
AgentX UiPath Community Webinar series - Delhi
PPTX
Ship’s Structural Components.pptx 7.7 Mb
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
PPTX
TE-AI-Unit VI notes using planning model
PDF
Principles of Food Science and Nutritions
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
6th International Conference on Artificial Intelligence and Machine Learning ...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Soil science - sampling procedures for soil science lab
Top 10 read articles In Managing Information Technology.pdf
meets orient on the new industry intereacting skills .pptx
Chad Ayach - A Versatile Aerospace Professional
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
Chapter 6 Design in software Engineeing.ppt
Structs to JSON How Go Powers REST APIs.pdf
Lesson 3_Tessellation.pptx finite Mathematics
AgentX UiPath Community Webinar series - Delhi
Ship’s Structural Components.pptx 7.7 Mb
ETO & MEO Certificate of Competency Questions and Answers
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
TE-AI-Unit VI notes using planning model
Principles of Food Science and Nutritions
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
6th International Conference on Artificial Intelligence and Machine Learning ...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Soil science - sampling procedures for soil science lab

2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Security Teams.pptx

  • 1. © 2022 Devops Institute DevSecOps SKILup Day Your developers decide your security posture, not your security teams Turja Narayan Chaudhuri
  • 2. Thank You all for being here. And , a Big Thank You to the DevOps Institute for hosting this event, and inviting me over . I hope you all have a wonderful session.
  • 3. A brief about me - • Currently , I am working as an Assistant Director, Cloud Practice at EY (Ernst & Young). • Before that I led the CCOE ( Cloud Centre Of Excellence) Team at Accenture. • I have around 10+ years of IT experience, working on Public Cloud technologies since 2017.
  • 4. Expectation management - • This is not an introductory session on how to get started with DevSecOps, or shift-left security. • It is expected that the audience for this session is already familiar with a high-level understanding of security challenges in modern software systems, and DevSecOps – principles and practices.
  • 5. Overall Agenda - • Section I - Context : Challenges with cloud- native security • Section II - Solutions : DevSecOps • Section III – Scaling DevSecOps Adoption : Developer Relations • Section IV - Conclusion
  • 7. •Section I - Context : Challenges with cloud-native security • Section II - Solutions : DevSecOps • Section III – Scaling DevSecOps Adoption : Developer Relations • Section IV - Conclusion
  • 8. Cloud-native applications refer to applications which have architectures that are conceptually built and run to take advantageof the distributed computing that is normally offered by the cloud delivery model. What is cloud-native? History of Cloud Native
  • 9. There has been tremendous growth in Cloud-native ecosystem, especially in use of Kubernetes, over the last couple of years. It has become the de-facto standard for application deployment everywhere. Growth of cloud-native ecosystems State of Cloud Native Development : This shows the rapid growth in containerization ecosystems (CNCF, 2020)
  • 10. But, at the same time, security concerns are among the most crucial topics in the radar of enterprises today. Challenges with sustained inorganic growth
  • 11. The current model of implementing security does not work well for cloud-native ecosystems. It has quite a few challenges : Lack of visibility Large number of entities that must be secured Misconfigurations Diverse architectural patterns need to be secured Inability to enforce consistent policies Environments are in a flux Security challenges for cloud-native
  • 12. • Section I - Context : Challenges with cloud-native security •Section II - Solutions : DevSecOps • Section III – Scaling DevSecOps Adoption : Developer Relations • Section IV - Conclusion
  • 13. Perimeter security, or just securing the boundary, or the traditional model of having a security team to do all the testing will not work any more. We need to do things differently !
  • 14. Traditionally, how was security handled by enterprises? • The role of the security team was restrictedto a specific team, that too postponedtill the last stage of deployment. • This was okay when development cycles lasted months or years.
  • 15. In today’s age of frequent deliveries, say weeks/even days, outdated/traditional security practices can hamper the most efficient DevOps practices.
  • 16. What needs to change? • A more collaborative approach between the different teams needs to be enforced. • Security needs to be treated as a shared responsibility across the enterprise, not handled in silos. • Security tools needs to be injectedinto the software development lifecycle, integrated end-to-end, and enforced from the start of the project, not as an after-thought.
  • 17. So, what exactly is DevSecOps? • DevSecOpsstands for development, security, and operations. • It's an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle.
  • 18. This is also tied with Shift-Left Security • The idea is to inject security controls early in the software development lifecycle, so that issues/vulnerabilities can be identified at the beginning rather than at the end. • This effectively streamlines the development lifecycle, drastically improves quality, and enables faster delivery of business value by quick progression to future stages in the product development lifecycle.
  • 19. • Section I - Context : Challenges with cloud-native security • Section II - Solutions : DevSecOps •Section III – Scaling DevSecOps Adoption : Developer Relations • Section IV - Conclusion
  • 20. There are a lot of aspects that are at play when an enterprise wants to successfully adopt DevSecOps. Some of them might be :  Cultural change  Executive buy-in  Leaders and enthusiasts to act as evangelists  Cross-functional teams  Measurable indicators How do I scale DevSecOps adoption across my enterprise?
  • 21. But, at the hear of it all is - Developer Relations
  • 22. Developer Relations – What is it? DevRel, or developer relations, is a process for nurturing mutually beneficial relationships between organisations and software developers. In other words, it’s a collection of strategies and tactics that help companies to work better together with software engineers (developers). Exactly what developer relations teams do and why they do it depends on what their organisation needs.
  • 23. Why do developers matter for enterprise security. • No adoption initiative can succeed without enthusiasm from developers. • Security is no exception, and the more we are trying to shift-left, the more we need to empower developers, involve them in the processes.
  • 24. So, what are some of the things that as an enterprise, we can do , to solve this problem?
  • 25. 1 . Empowerment • Developers should be a part of the planning/strategy phase of DevSecOps adoption in the journey. • They should have a say in what processes, principles and practices should be brought in. • They should be treated as change agents, and their inputs also considered for key decisions that are taken at the start of the adoption journey.
  • 26. 2 . Cyclic Accountability • Security teams should be accountable to developers as well. • They should take time to educate developers and explain the rationale behind their choices and decisions. • Security constraints should not appear as a diktat, rather a consensus should be reached after collaborative discussion making.
  • 27. 3 . Trust • If developers are involved in the process from Day1, they will be as accountable for the success of the initiative as the executive or security teams. • They will trust the findings of the security teams, and adhere to the guidelines if they had a part in drafting them.
  • 28. 4 . Information Democratization • Information should not be maintained in silos. • All relevant documentation should be available to the developers. • They should even have privileges to suggest changes or raise issues in case something is not working in the ground.
  • 29. 5 . Self-Service • Developers should be able to consume security tools via self-service. • The process to onboarda new product/project onto a security management platform/vulnerability scanner should be simple and seamless. • There should be no friction, and developers should not have to wait or talk to different people to get a simple job done.
  • 30. 6 . Federated Governance • A governance structure should be established to maintain high-level control of the adoption process. • This could be a central excellence team with representatives from all teams, followed by local representation in Service Line teams. • Developers should be able to reach out to this team for generic guidance or in case of conflicts.
  • 31. 7 . Right to dissent • Enterprise should meet developers where they are and not try to drag them on an executive sponsored journey which is not aligned with the developer community. • Developers should have the right to flag issues in current security processes if they hamper progress, with a strong focus on including their insights to incrementally transform the initiatives.
  • 32. • Section I - Context : Challenges with cloud-native security • Section II - Solutions : DevSecOps • Section III – Scaling DevSecOps Adoption : Developer Relations •Section IV - Conclusion
  • 33. If you do not involve developers in your journey, they will find a way to bypasseven the most stringent policies.
  • 34. Like it or not, even with the most sophisticated security guardrails, end of day, if you want security with agility, you need to ensureyour developers are aligned with your vision and equally invested in the process.
  • 36. © 2022 Devops Institute DevSecOps SKILup Day Your developers decide your security posture, not your security teams Thanks for Watching Why not continue the conversation in the Experts Corner?