SlideShare a Scribd company logo
Introduction to DevSecOps OWASP Ahmedabad
Introduction to
DevSecOps
Kunwar Atul (@kunwaratulhax0r)
root@whoami
• Kunwar Atul
• Yet another Appsec and DevSecOps Guy
• Break – Fix – Repeat
• Part time Bug Hunter
• Synack Red Team Member
• OWASP MASVS Hindi Contributor (Ongoing
Project)
• DevSecOps University Contributor
• I Love Knowing What’s Going On (emerging vulns,
tools, PoC), CTFs, Offensive Security Work, Cricket,
and no compromise with food and coffee.
• Social media- kunwaratulhax0r
What is
DevOps
• DevOps is a software development method
that highlights collaboration and open
communication between teams basically it
reduce the gap between teams.
What is DevOps
• DevOps is all about Process.
• DevOps is about Connections.
• DevOps is about Tools.
• DevOps is about Automating Everything.
• Continuous Software Delivery.
DevOps Goals
• Automated Provisioning
• No Downtime Deployments
• Monitoring
• Automated Builds and Testing
What Happens in DevOps
Automate everything using tools
 Continuous Development
 Continuous Integration
 Continuous Testing
 Continuous Deployment
 Continuous Monitoring
Finally
• Great Customer Satisfaction
• Increased Productivity
Planning Phase
• In the planning phase all the details related to
current build will be logged in the JIRA and
Yutrack.
Development Phase
• For Source Code Management we have GIT and
SVN. These tools will help us in maintaining the
code.
Build Phase
• They help you package your code into
executable files which can then be produced into
the testing environment.
Testing Phase
• For continuous testing we will use Robotic
Process Automation and some other reusability
code.
Release Phase
• For the release phase, automate tools like
bamboo are used in the releasing a build.
Deployment Phase
• After the code is tested and ready it will be
deployed into production or the non-developer
machine at this stage.
Operation Phase
• In the operation phase everything will be
monitored by using Security Incident and Event
Management (SIEM Tools) for security alerts and
misbehavior of application.
Monitor Phase
• In the monitoring phase, continuous feedbacks
will be taken from customers and will be
monitoring them.
Challenges
(Without
DevSecOps)
Challenges Without DevSecOps
• With the fast pace of development in the Agile world, there is a lack of focus on security during the
development process.
• The quality of the solution is often compromised from a security standpoint
while focusing on feature deliverables during the Agile development lifecycle.
• Further, it costs the organization's reputation when critical vulnerabilities are found in shipped solution(s).
• Customer sensitive data is compromised due to lack of security testing focus.
• A lot of manual effort in order to perform security testing can lead to a delay in uncovering critical
vulnerabilities and, further, may result in either delaying the deliverables or shipping them with unknown
vulnerabilities.
What is DevSecOps
Development
SecurityOperations
DevSecOps is a software
development concept or mindset
that aims at unifying development,
operations, and security as a single
process in SDLC.
What is DevSecOps
• Security of the CI/CD Pipeline
• Automated IAM roles, Jenkins server hardening, etc.
• Security in the CI/CD Pipeline
• Automated security tests, code analysis etc.
• Security Automation
• Automated Incident Response Remediation, forensics etc.
Introduction to DevSecOps OWASP Ahmedabad
• DevOps = Efficiencies that speed up this lifecycle.
• DevSecOps = Validate building blocks without slowing lifecycle.
DevSecOps: How Important is it?
• Agile took us from months to days to deliver software.
• DevOps took us from months to minutes to deploy software.
• More applications are mission critical.
• Now security has become the bottleneck.
DevSecOps makes
everyone
responsible for
Security, because
Security is not
one-person job.
People: What type of Skills are
Required?
9
2.5 2.5
2.5
2.5
9
2.5
9
2.5
0
2
4
6
8
10
12
14
16
Developer Sysadmin Security Engineer
Skills Chart
Dev Sec Ops
Security
Champions
The Main Course
• Vulnerability Scans and Assessments
• Threat Modelling
• Secure Code Reviews (Static Code Analysis)
• Penetration Testing
Pushing Left, Like a Boss, Tanya Janca, DevSecCon 2018 Singapore
The Gravy
• Educating developers on Secure Coding
• Practices with workshops, talk, lessons
• Secure Coding Standards
• Responsible Disclosures
• Secure Code Library and other reference materials, creating custom tools
Pushing Left, Like a Boss, Tanya Janca, DevSecCon 2018 Singapore
The Dessert
• Bug Bounty Programs
• CTF’s
• Red Team Exercises
Pushing Left, Like a Boss, Tanya Janca, DevSecCon 2018 Singapore
Introduction to DevSecOps OWASP Ahmedabad
DevSecOps
Pipeline for
Appsec
Best Practices for DevSecOps
• Train development teams to develop secure code.
• Track security issues the same as software issues.
• If infrastructure is now code, then security should be code.
• Integrate security controls in the software pipeline.
• Automate security test in the build process.
• Detect known vulnerabilities during the pipeline.
• Monitor security in the production for known states
• Inject failure to ensure security is hardend.
References
1
https://www.slide
share.net/Amazon
WebServices/intro
duction-to-
devsecops
2
https://www.slide
share.net/Sumo_L
ogic/you-build-it-
you-secure-it-
introduction-to-
devsecops
3
https://dzone.com
/articles/devsecop
s-overview
4
https://www.devs
eccon.com/wp-
content/uploads/2
017/07/DevSecOp
s-whitepaper.pdf
5
https://www.slide
share.net/narudo
mr/devsecops-101
6
https://www.slide
share.net/sethukri
shna3/introductio
n-to-devsecops-
107904125
7
https://www.slide
share.net/DevOpsI
ndonesia/the-
state-of-devsecops
8
https://www.slide
share.net/Dragon
Be/devops-or-
devsecops
Q/A
Thank You
Reach me: @kunwaratulhax0r

More Related Content

What's hot (20)

PPTX
Introduction to DevOps
Francesco Garavaglia
 
ODP
Devops
Kris Buytaert
 
PPTX
DevOps - Overview - One of the Top Trends in IT Industry
Rahul Tilloo
 
PPTX
Where Testers & QA Fit in the Story of DevOps
QASymphony
 
PPTX
DevOps introduction
Mettje Heegstra
 
PPTX
#ATATalk - Episode 1 : Session on Selenium Exceptions by Pallavi Sharma
Agile Testing Alliance
 
PPTX
Security Implications for a DevOps Transformation
Deborah Schalm
 
PDF
Continuous Delivery Distilled
Matt Callanan
 
PPTX
DevOps Workshop, DevOps for DoD Professionals
Tonex
 
PDF
DevOps 101
satya sudheer
 
PPTX
DevOps Overview
Omri Spector
 
PPTX
DevOps Introduction
Jagatveer Singh
 
PPTX
Introduction the dev ops world
VishwasN6
 
PPTX
Why Serverless is scary without DevSecOps and Observability
Eficode
 
PPTX
DevOps
Abhay Kumar
 
PPTX
Fundamental Concepts of DevOps
Kiril Serebnik
 
PDF
QA in DevOps: Transformation thru Automation via Jenkins
Tatyana Kravtsov
 
PDF
DevOps(1) : What's DevOps - (MOSG)
Soshi Nemoto
 
PDF
Devops Intro - Devops for Unicorns & DevOps for Horses
BoonNam Goh
 
PDF
Devops course content
Thota Ravindra Reddy
 
Introduction to DevOps
Francesco Garavaglia
 
DevOps - Overview - One of the Top Trends in IT Industry
Rahul Tilloo
 
Where Testers & QA Fit in the Story of DevOps
QASymphony
 
DevOps introduction
Mettje Heegstra
 
#ATATalk - Episode 1 : Session on Selenium Exceptions by Pallavi Sharma
Agile Testing Alliance
 
Security Implications for a DevOps Transformation
Deborah Schalm
 
Continuous Delivery Distilled
Matt Callanan
 
DevOps Workshop, DevOps for DoD Professionals
Tonex
 
DevOps 101
satya sudheer
 
DevOps Overview
Omri Spector
 
DevOps Introduction
Jagatveer Singh
 
Introduction the dev ops world
VishwasN6
 
Why Serverless is scary without DevSecOps and Observability
Eficode
 
DevOps
Abhay Kumar
 
Fundamental Concepts of DevOps
Kiril Serebnik
 
QA in DevOps: Transformation thru Automation via Jenkins
Tatyana Kravtsov
 
DevOps(1) : What's DevOps - (MOSG)
Soshi Nemoto
 
Devops Intro - Devops for Unicorns & DevOps for Horses
BoonNam Goh
 
Devops course content
Thota Ravindra Reddy
 

Similar to Introduction to DevSecOps OWASP Ahmedabad (20)

PPTX
What is devsecops and what is the characteristics of it
amalsalah25
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
PDF
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PPTX
Devsec ops
VipinYadav257
 
PDF
DevOps and Devsecops What are the Differences.pdf
Techugo
 
PPTX
Why You Should Implement DevSecOps Approach?
Enov8
 
PDF
Why You Should Implement DevSecOps Approach?
Enov8
 
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
PDF
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Enov8
 
PDF
DevOps and Devsecops.pdf
Techugo
 
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
PDF
DevOps and Devsecops- Everything you need to know.
Techugo
 
PPTX
DevSecOps: Security With DevOps
Knoldus Inc.
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PDF
DevOps and Devsecops- What are the Differences.
Techugo
 
PDF
A detailed guide about dev secops.docx
Enov8
 
PPTX
A detailed guide about dev secops
Enov8
 
What is devsecops and what is the characteristics of it
amalsalah25
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
Introduction to DevSecOps
abhimanyubhogwan
 
Scale security for a dollar or less
Mohammed A. Imran
 
Devsec ops
VipinYadav257
 
DevOps and Devsecops What are the Differences.pdf
Techugo
 
Why You Should Implement DevSecOps Approach?
Enov8
 
Why You Should Implement DevSecOps Approach?
Enov8
 
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Enov8
 
DevOps and Devsecops.pdf
Techugo
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
DevOps and Devsecops- Everything you need to know.
Techugo
 
DevSecOps: Security With DevOps
Knoldus Inc.
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
DevOps and Devsecops- What are the Differences.
Techugo
 
A detailed guide about dev secops.docx
Enov8
 
A detailed guide about dev secops
Enov8
 
Ad

More from kunwaratul hax0r (6)

PPTX
Hacking mobile apps
kunwaratul hax0r
 
PPTX
How to build app sec team & culture in your organization the hack summi...
kunwaratul hax0r
 
PPTX
Making security champions in organization
kunwaratul hax0r
 
PPTX
Android pentesting the hackers-meetup
kunwaratul hax0r
 
PPTX
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
PPTX
Insecure file upload vulnerability
kunwaratul hax0r
 
Hacking mobile apps
kunwaratul hax0r
 
How to build app sec team & culture in your organization the hack summi...
kunwaratul hax0r
 
Making security champions in organization
kunwaratul hax0r
 
Android pentesting the hackers-meetup
kunwaratul hax0r
 
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
Insecure file upload vulnerability
kunwaratul hax0r
 
Ad

Recently uploaded (20)

PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PDF
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
PDF
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Practical Applications of AI in Local Government
OnBoard
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Kubernetes - Architecture & Components.pdf
geethak285
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 

Introduction to DevSecOps OWASP Ahmedabad