SlideShare a Scribd company logo
6
Most read
9
Most read
11
Most read
PAGE
1
DEVOPS INDONESIA
PAGE
1
DEVOPS INDONESIA
Yohanes Syailendra, M.Kom
DKATALIS
Jakarta, 8 Maret 2022
DevSecOps Implementation Journey
DevSecOps
Implementation
Journey
#whoami
Yohanes Syailendra, M.Kom
LPT, ECSA, CEH, CPSA, CHFI, CEI
• DevSecOps Lead
• DFIR Consultant
• Malware Researcher
• Threat Intelligence Researcher
• Research Leader Indonesia Honeynet
Project
What is DevSecOps?
→ Is the ART to shifting security point of view to the left,
broaden the security controls, not only on the later stage of
development lifecycle, but every process of Development
itself
Why DevSecOps in DK?
1. Faster time-to-market because all the developer already
understand what they lacking of before app release
2. Minimize the Security vulnerabilities findings at later stage
(pentest)
3. More security visibility (up to Source code and third party
module level)
4. Automation everywhere
Why Shifting to the Left?
Pentest Pentest
DevOps Lifecycle
In DevOps, Pipeline is everything
Security in DevOps
Security Awareness
Sprint Pentest
Culture> Processes> Architecture> Automation> Measurement
Application Security Engineering (DevSecOps)
9
Our Technology Stacks
10
DevSecOps Architecture
Developer Commit their
code to Gitlab SCM
DK Developers &
Tech Leads
SCM and CI/CD
Platform
2
CI/CD trigger
scan using
SCA & IAC
scanner &
SAST tool
3
SAST Tool
Code Phase Build Phase Release Phase
CI/CD trigger
scan using DAST
5
Plan Phase
App / Feature
Design and RFC
Process
Define Threat
Modelling for each
app
1
Threat Modelling
Tool DAST Tool
Correlation
Dashboard
CI/CD trigger to scan
the docker image
4
Container
Security
Container
RASP
7
Container
Security
Mobile App Shielding
Perform App
Shielding 6
Verify Phase
DevSecOps - SAST & SCA
DevSecOps - DAST
DevSecOps - Infrastructure as Code Scanner
Establishing security as an
enabler of cloud transformation
within Masan
Creating and embedding
security engineering as a
competency, to integrate security
throughout the development
lifecycle of applications and
products
Uplifting internal capability
across technology teams, to
ensure that people are skilled
up/reskilled on security aspects of
the cloud, through training and
continuous enablement.
Embracing a culture of review
with clear processes designed to
scale without impeding velocity.
eg. code/config reviews with clear
expectations and education of
developers and reviewers
Creating platforms and systems
that are secure-by-design for
the cloud
➢ Zero trust - Shifting from
perimeter-based security to
a model of no implicit trust
➢ Service identities -
Establishing security based
on identity rather than
infrastructure
➢ Standardised policy
enforcement - Integrating
common policy/pipeline
controls at scale
➢ Frequent, automated
rollouts - Enabling rapid
changes to address new
threats
➢ Isolation between
workloads - Giving security
assurance at a micro-level for
the hyperscale
➢ Reusable frameworks and
hardened templates that
enable secure-by-design
architecture and application
development in the cloud
Security Engineering
Defining a strong cloud security,
governance and compliance
posture
Establishing a
control-framework that provides
clear guidelines and expectations
of development teams
Policy-as-code to automate
policy management frameworks
and enable continuous validation
Shifting-left to integrate
security tooling with engineers
as early-as-possible in the
application lifecycle (early
feedback loops/DevSecOps)
A rapid, secure onboarding path
for application teams to use the
cloud
Enabling proactive and
automated security response
and remediation
Integrating logging, monitoring
and threat intelligence feeds to
bring centralized/standardized
visibility to cloud environments and
identify events of high
security/business risk
Establishing cloud forensics and
threat hunting capabilities to
enable advanced security
investigations and incident
response
Deploying security
orchestration and automated
response tooling and playbooks
to provide rapid response and
minimize the impact of cloud
security incidents
Security Culture Policy Management Security Operations
14
DevSecOps is not only about tooling
OWASP DevSecOps Maturity
Guide: https://dsomm.timo-pagel.de/
Actionable Learning
1. AIM BIG, START SMALL, DevSecOps is a Journey not a one
time project
2. Developers are your best friend. Work with them all the time
3. Don’t be a stopper for the pipeline at first, learn how DevOps
works in stages
4. DevSecOps is not only about tooling, but develop a security
mindset, process and cultures across developers
5. Security Team need to learn about coding practice,
especially DevOps environment and tools they used, a full
synergy with Developers is a must
6. Finding a vulnerability is very important, but closing the
vulnerability more important
7. Do research on what technology fits your environment. Not
every good tool can fit your pipelines
DevSecOps Implementation Journey
Stay Connected With Us!
t.me/iddevops
DevOps Indonesia
DevOps Indonesia
DevOps Indonesia
@iddevops
@iddevops
DevOps Indonesia
Scan here
PAGE
20
DEVOPS INDONESIA
Alone Weare smart,together Weare brilliant
THANKYOU !
Quote by Steve Anderson

More Related Content

What's hot (20)

PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PPTX
DevSecOps
Joel Divekar
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PPTX
DevSecOps
Cheah Eng Soon
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PDF
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
PDF
The What, Why, and How of DevSecOps
Cprime
 
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
PPTX
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
PDF
The State of DevSecOps
DevOps Indonesia
 
PPTX
DevSecOps reference architectures 2018
Sonatype
 
PDF
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PPTX
DEVSECOPS.pptx
MohammadSaif904342
 
PDF
Build the right culture in DevSecOps
Nadira Bajrei
 
PDF
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
SlideTeam
 
PDF
DevSecOps - The big picture
Stefan Streichsbier
 
PDF
Microservice Architecture
Nguyen Tung
 
PDF
How to implement DevOps in your Organization
Dalibor Blazevic
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
DevSecOps in Baby Steps
Priyanka Aash
 
DevSecOps
Joel Divekar
 
Introduction to DevSecOps
abhimanyubhogwan
 
DevSecOps
Cheah Eng Soon
 
DevSecOps : an Introduction
Prashanth B. P.
 
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
The What, Why, and How of DevSecOps
Cprime
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
The State of DevSecOps
DevOps Indonesia
 
DevSecOps reference architectures 2018
Sonatype
 
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
DEVSECOPS.pptx
MohammadSaif904342
 
Build the right culture in DevSecOps
Nadira Bajrei
 
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
SlideTeam
 
DevSecOps - The big picture
Stefan Streichsbier
 
Microservice Architecture
Nguyen Tung
 
How to implement DevOps in your Organization
Dalibor Blazevic
 

Similar to DevSecOps Implementation Journey (20)

PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PDF
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
PDF
Understanding DevSecOps.pdf
Ciente
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
PDF
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
PDF
The Impact of DevSecOps on Cloud Security.pdf
Rosy G
 
PPTX
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
DOCX
DevSecOps - offpage blog final draft - 03.docx
Sun Technologies
 
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
PPTX
DevSecOps-Explained-converted.pptx
Gurajalanaganarasimh
 
PPTX
What is devsecops and what is the characteristics of it
amalsalah25
 
PPTX
DevSecOps without DevOps is Just Security
Kevin Fealey
 
PPTX
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
PPTX
ISACA Ireland Keynote 2015
Shannon Lietz
 
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
DevSecOps Story with added security controls
HareeshNani5
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
Understanding DevSecOps.pdf
Ciente
 
Scale security for a dollar or less
Mohammed A. Imran
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
The Impact of DevSecOps on Cloud Security.pdf
Rosy G
 
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
DevSecOps - offpage blog final draft - 03.docx
Sun Technologies
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
DevSecOps-Explained-converted.pptx
Gurajalanaganarasimh
 
What is devsecops and what is the characteristics of it
amalsalah25
 
DevSecOps without DevOps is Just Security
Kevin Fealey
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
ISACA Ireland Keynote 2015
Shannon Lietz
 
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
DevSecOps Story with added security controls
HareeshNani5
 
Ad

More from DevOps Indonesia (20)

PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia
 
PDF
Securing an NGINX deployment for K8s
DevOps Indonesia
 
PDF
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia
 
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
DevOps Indonesia
 
PDF
Securing DevOps Lifecycle
DevOps Indonesia
 
PDF
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Indonesia
 
PDF
Secure your Application with Google cloud armor
DevOps Indonesia
 
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Indonesia
 
PDF
Operate Containers with AWS Copilot
DevOps Indonesia
 
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps Indonesia
 
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps Indonesia
 
PDF
Securing Your Database Dynamic DB Credentials
DevOps Indonesia
 
PDF
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia
 
PDF
The Death and Rise of Enterprise DevOps
DevOps Indonesia
 
PDF
API Security Webinar - Credential Stuffing
DevOps Indonesia
 
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
PDF
API Security Webinar - Hendra Tanto
DevOps Indonesia
 
PDF
API Security Webinar : Credential Stuffing
DevOps Indonesia
 
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
PDF
Feature Scoring in Green Field Application Development and DevOps
DevOps Indonesia
 
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia
 
Securing an NGINX deployment for K8s
DevOps Indonesia
 
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia
 
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
DevOps Indonesia
 
Securing DevOps Lifecycle
DevOps Indonesia
 
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Indonesia
 
Secure your Application with Google cloud armor
DevOps Indonesia
 
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Indonesia
 
Operate Containers with AWS Copilot
DevOps Indonesia
 
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps Indonesia
 
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps Indonesia
 
Securing Your Database Dynamic DB Credentials
DevOps Indonesia
 
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia
 
The Death and Rise of Enterprise DevOps
DevOps Indonesia
 
API Security Webinar - Credential Stuffing
DevOps Indonesia
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
API Security Webinar - Hendra Tanto
DevOps Indonesia
 
API Security Webinar : Credential Stuffing
DevOps Indonesia
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
Feature Scoring in Green Field Application Development and DevOps
DevOps Indonesia
 
Ad

Recently uploaded (20)

PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PPTX
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 

DevSecOps Implementation Journey

  • 1. PAGE 1 DEVOPS INDONESIA PAGE 1 DEVOPS INDONESIA Yohanes Syailendra, M.Kom DKATALIS Jakarta, 8 Maret 2022 DevSecOps Implementation Journey
  • 3. #whoami Yohanes Syailendra, M.Kom LPT, ECSA, CEH, CPSA, CHFI, CEI • DevSecOps Lead • DFIR Consultant • Malware Researcher • Threat Intelligence Researcher • Research Leader Indonesia Honeynet Project
  • 4. What is DevSecOps? → Is the ART to shifting security point of view to the left, broaden the security controls, not only on the later stage of development lifecycle, but every process of Development itself Why DevSecOps in DK? 1. Faster time-to-market because all the developer already understand what they lacking of before app release 2. Minimize the Security vulnerabilities findings at later stage (pentest) 3. More security visibility (up to Source code and third party module level) 4. Automation everywhere
  • 5. Why Shifting to the Left? Pentest Pentest
  • 7. In DevOps, Pipeline is everything
  • 8. Security in DevOps Security Awareness Sprint Pentest
  • 9. Culture> Processes> Architecture> Automation> Measurement Application Security Engineering (DevSecOps)
  • 11. 10 DevSecOps Architecture Developer Commit their code to Gitlab SCM DK Developers & Tech Leads SCM and CI/CD Platform 2 CI/CD trigger scan using SCA & IAC scanner & SAST tool 3 SAST Tool Code Phase Build Phase Release Phase CI/CD trigger scan using DAST 5 Plan Phase App / Feature Design and RFC Process Define Threat Modelling for each app 1 Threat Modelling Tool DAST Tool Correlation Dashboard CI/CD trigger to scan the docker image 4 Container Security Container RASP 7 Container Security Mobile App Shielding Perform App Shielding 6 Verify Phase
  • 14. DevSecOps - Infrastructure as Code Scanner
  • 15. Establishing security as an enabler of cloud transformation within Masan Creating and embedding security engineering as a competency, to integrate security throughout the development lifecycle of applications and products Uplifting internal capability across technology teams, to ensure that people are skilled up/reskilled on security aspects of the cloud, through training and continuous enablement. Embracing a culture of review with clear processes designed to scale without impeding velocity. eg. code/config reviews with clear expectations and education of developers and reviewers Creating platforms and systems that are secure-by-design for the cloud ➢ Zero trust - Shifting from perimeter-based security to a model of no implicit trust ➢ Service identities - Establishing security based on identity rather than infrastructure ➢ Standardised policy enforcement - Integrating common policy/pipeline controls at scale ➢ Frequent, automated rollouts - Enabling rapid changes to address new threats ➢ Isolation between workloads - Giving security assurance at a micro-level for the hyperscale ➢ Reusable frameworks and hardened templates that enable secure-by-design architecture and application development in the cloud Security Engineering Defining a strong cloud security, governance and compliance posture Establishing a control-framework that provides clear guidelines and expectations of development teams Policy-as-code to automate policy management frameworks and enable continuous validation Shifting-left to integrate security tooling with engineers as early-as-possible in the application lifecycle (early feedback loops/DevSecOps) A rapid, secure onboarding path for application teams to use the cloud Enabling proactive and automated security response and remediation Integrating logging, monitoring and threat intelligence feeds to bring centralized/standardized visibility to cloud environments and identify events of high security/business risk Establishing cloud forensics and threat hunting capabilities to enable advanced security investigations and incident response Deploying security orchestration and automated response tooling and playbooks to provide rapid response and minimize the impact of cloud security incidents Security Culture Policy Management Security Operations 14 DevSecOps is not only about tooling
  • 16. OWASP DevSecOps Maturity Guide: https://dsomm.timo-pagel.de/
  • 17. Actionable Learning 1. AIM BIG, START SMALL, DevSecOps is a Journey not a one time project 2. Developers are your best friend. Work with them all the time 3. Don’t be a stopper for the pipeline at first, learn how DevOps works in stages 4. DevSecOps is not only about tooling, but develop a security mindset, process and cultures across developers 5. Security Team need to learn about coding practice, especially DevOps environment and tools they used, a full synergy with Developers is a must 6. Finding a vulnerability is very important, but closing the vulnerability more important 7. Do research on what technology fits your environment. Not every good tool can fit your pipelines
  • 19. Stay Connected With Us! t.me/iddevops DevOps Indonesia DevOps Indonesia DevOps Indonesia @iddevops @iddevops DevOps Indonesia Scan here
  • 20. PAGE 20 DEVOPS INDONESIA Alone Weare smart,together Weare brilliant THANKYOU ! Quote by Steve Anderson