SlideShare a Scribd company logo
Join the conversation #DevSecCon
Derek E. Weeks
VP and DevOps Advocate, Sonatype
DevSecOps Lessons
From Deming to Detroit
Detroit
1982
© Taptas.com, „On the Line“
@weekstweets
“You cannot inspect quality into a product.”
W. Edwards Deming
Out of the Crisis
1982
3
“Emphasize performance of the entire system
and never pass a defect downstream.”
Gene Kim
The Phoenix Project
2013
@sonatype
Say Hello to Your Software Supply Chain…
@weekstweets
1,096 new projects per day
10,000 new versions per day
14x releases per year
• 3M npm components
• 2M Java components
• 900K NuGet components
• 870K PyPI components
59
52
@sonatype
80% to 90% of
modern apps
consist of
assembled
components.
Lessons learned from Detroit to Deming by Derek Weeks
80% to 90% of
modern
operations
consist of
assembled
containers.
Containers
Hand-built
applications
and
infrastructure
NOT ALL PARTS ARE CREATED
EQUAL
@sonatype
233 days
MeanTTR
119 days
MedianTTR
122,802
components with
known vulnerabilities
19,445
15.8% fixed the
vulnerability
TIME TO REPAIR OSS COMPONENTS
@weekstweets
zero days
mean time
to repair
CVE ID: CVE-2017-
9805
September 5
Apache fixed the
vulnerability
Sept 5
APACHE STRUTS2 MEAN TIME TO REPAIR
@weekstweets
@weekstweets @weekstweets
125,701
Java component
downloads annually
7,428
5.8% with known
vulnerabilities
7,500 ORGANIZATIONS ANALYZED
@sonatype
DEFECT PERCENTAGES FOR JAVASCRIPT
@weekstweets
Lessons learned from Detroit to Deming by Derek Weeks
83%
system calls in the
native Docker runtime
are open for attack.
6-IN-10 HAVE OPEN SOURCE POLICIES
@sonatype
TRUSTED SOFTWARE SUPPLY CHAINS
THE REWARDS ARE IMPRESSIVE
90%
improvement in time to
deploy
34,000
hours saved in
90 days
48%
increase in application
quality
@weekstweets
Unsafe at Any Speed: The Designed-In Dangers
of the American Automobile.
Ralph Nadar
1965
Photo Credit: www.automobilemag.com
Businesses decide where and how to invest in
cybersecurity based on a cost-benefit assessment
but they are ultimately liable for the security of
their data and systems.
U.K.’s National Cyber Security Strategy
2016 - 2021
“Emphasize performance of the entire system
and never pass a defect downstream.”
Gene Kim
The Phoenix Project
2017
Join the conversation #DevSecCon
weeks@sonatype.com
Lessons learned from Detroit to Deming by Derek Weeks

More Related Content

PPTX
Turning security into code by Jeff Williams
DevSecCon
 
PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
PDF
DevSecOps - The big picture
DevSecOpsSg
 
PPTX
The Journey to DevSecOps
SeniorStoryteller
 
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
PDF
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon
 
PDF
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
Turning security into code by Jeff Williams
DevSecCon
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
DevSecOps - The big picture
DevSecOpsSg
 
The Journey to DevSecOps
SeniorStoryteller
 
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon
 
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 

What's hot (20)

PDF
Integrating DevOps and Security
Stijn Muylle
 
PPTX
Security and DevOps Overview
Adrian Sanabria
 
PDF
The New Security Playbook: DevSecOps
James Wickett
 
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
PDF
DevOps and DevSecOps, Incident Management
ShriniKulkarni
 
PDF
The Challenges of Scaling DevSecOps
WhiteSource
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
Sonatype
 
PDF
DevSecOps: Minimizing Risk, Improving Security
Franklin Mosley
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
DevOps or DevSecOps
Michelangelo van Dam
 
PDF
PIACERE - DevSecOps Automated
PIACERE
 
PPTX
A journey from dev ops to devsecops
Veritis Group, Inc
 
PPTX
Shifting left – embedding security into the devops pipeline by Mike d. Kail
DevSecCon
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PDF
Building a Modern Security Engineering Organization
Zane Lackey
 
PDF
Dos and Don'ts of DevSecOps
Priyanka Aash
 
PPTX
Security as Code
Ed Bellis
 
Integrating DevOps and Security
Stijn Muylle
 
Security and DevOps Overview
Adrian Sanabria
 
The New Security Playbook: DevSecOps
James Wickett
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
DevOps and DevSecOps, Incident Management
ShriniKulkarni
 
The Challenges of Scaling DevSecOps
WhiteSource
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
RSAC DevSecOpsDays 2018 - We are all Equifax
Sonatype
 
DevSecOps: Minimizing Risk, Improving Security
Franklin Mosley
 
DevSecOps : an Introduction
Prashanth B. P.
 
Introduction to DevSecOps
abhimanyubhogwan
 
DevOps or DevSecOps
Michelangelo van Dam
 
PIACERE - DevSecOps Automated
PIACERE
 
A journey from dev ops to devsecops
Veritis Group, Inc
 
Shifting left – embedding security into the devops pipeline by Mike d. Kail
DevSecCon
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
Building a Modern Security Engineering Organization
Zane Lackey
 
Dos and Don'ts of DevSecOps
Priyanka Aash
 
Security as Code
Ed Bellis
 
Ad

Similar to Lessons learned from Detroit to Deming by Derek Weeks (20)

PPTX
From 0 to DevOps: Lessons Learned Moving from On-Prem to Cloud Native
Klaus Enzenhofer
 
PPTX
State of the Software Supply Chain Report 2017
Matthew Howard
 
PDF
The Enterprise Case for Node.js
NodejsFoundation
 
PDF
A Hitchhiker’s Guide to the Cloud Native Stack. #DevoxxPL
Mario-Leander Reimer
 
PDF
A Hitchhiker's Guide to the Cloud Native Stack
QAware GmbH
 
PPTX
DevOps Days Columbus - Derek Weeks - 2019
Sonatype
 
PPTX
Modernize Traditional Applications with Docker EE
Riedwaan Bassadien
 
PDF
DockerCon EU 2015: Day 1 General Session
Docker, Inc.
 
PPTX
Using Node.js to Build for the Enterprise
Microsoft Tech Community
 
PPTX
Intro to Cloud Native _ v1.0en (2021/01)
Young Suk Ahn Park
 
PDF
Diving Deeper into DevOps Deployments
Jules Pierre-Louis
 
PDF
Predicting Space Weather with Docker
Docker, Inc.
 
PDF
103 Understanding Technical Debt
ProductCamp Boston
 
PDF
Understanding Technical Debt: A Primer for Product Owners and Founders
Andrea Goulet
 
PPTX
2019 Top Lessons Learned Since the Phoenix Project Was Released
Gene Kim
 
DOCX
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
estefana2345678
 
PPTX
DockerDay2015: Keynote
Docker-Hanoi
 
PPTX
Embracing DevSecOps: A Changing Security Landscape for the US Government
DJ Schleen
 
PPTX
Docker Bday #5, SF Edition: Introduction to Docker
Docker, Inc.
 
PDF
Docker Birthday #5 Meetup Cluj - Presentation
Alex Vranceanu
 
From 0 to DevOps: Lessons Learned Moving from On-Prem to Cloud Native
Klaus Enzenhofer
 
State of the Software Supply Chain Report 2017
Matthew Howard
 
The Enterprise Case for Node.js
NodejsFoundation
 
A Hitchhiker’s Guide to the Cloud Native Stack. #DevoxxPL
Mario-Leander Reimer
 
A Hitchhiker's Guide to the Cloud Native Stack
QAware GmbH
 
DevOps Days Columbus - Derek Weeks - 2019
Sonatype
 
Modernize Traditional Applications with Docker EE
Riedwaan Bassadien
 
DockerCon EU 2015: Day 1 General Session
Docker, Inc.
 
Using Node.js to Build for the Enterprise
Microsoft Tech Community
 
Intro to Cloud Native _ v1.0en (2021/01)
Young Suk Ahn Park
 
Diving Deeper into DevOps Deployments
Jules Pierre-Louis
 
Predicting Space Weather with Docker
Docker, Inc.
 
103 Understanding Technical Debt
ProductCamp Boston
 
Understanding Technical Debt: A Primer for Product Owners and Founders
Andrea Goulet
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
Gene Kim
 
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
estefana2345678
 
DockerDay2015: Keynote
Docker-Hanoi
 
Embracing DevSecOps: A Changing Security Landscape for the US Government
DJ Schleen
 
Docker Bday #5, SF Edition: Introduction to Docker
Docker, Inc.
 
Docker Birthday #5 Meetup Cluj - Presentation
Alex Vranceanu
 
Ad

More from DevSecCon (20)

PDF
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon
 
PDF
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon
 
PDF
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon
 
PDF
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
PPTX
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon
 
PDF
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
PDF
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon
 
PDF
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon
 
PDF
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon
 
PPTX
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon
 
PPTX
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon
 
PDF
DevSecCon London 2018: Open DevSecOps
DevSecCon
 
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon
 

Recently uploaded (20)

PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
The Future of Artificial Intelligence (AI)
Mukul
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 

Lessons learned from Detroit to Deming by Derek Weeks

Editor's Notes

  • #3: Its Detroit. 1982 The city was building 4 million cars annually. Line workers had a quota of 15,000 cars a day. Their incentives were focused on quantity, not quality. If they didn’t have the right bumper assembly, they would put it on the car, and push it toward the finish line. Quality of Japanese cars was 20% better US Manufacturers were operating at 50% capacity. 17 million autoworkers in the US. It never improved. Today 11 million. 20% of US GDP was manufacturing, today is is 10%. High was 30%. The auto industry was operating at 50% capacity. By the end of the 1970s, the Japanese automakers dominated the domestic producers in product quality ratings for every auto market segment, representing a formidable competitive advantage In 1962, import brands were 5% of the market and in 1982 were 25% Quality and defects were 20% higher than Japanese cars The Japanese would take 8% of the US automarket over the next 8 years. 70% of all small cars sold in the West (CA) were Japanese.
  • #4: “Cease dependence on mass inspection.” Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.
  • #5: “Cease dependence on mass inspection.” Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.
  • #7: Say hello to YOUR software supply chain, not “the software supply chain”; personalizing it more for the audience. For those of you that are unfamiliar with a software supply chain, it's really an allegate to the traditional supply chains used in manufacturing today. Those supply chains have suppliers that are building components. In the case of software development, that is the open-source [projects 00:07:53] that are building components, and making them freely available to developers around the world. [00:08:00] They're able to store and distribute those components in the large central warehouses, like the central repository that Sonatype is responsible for managing, but also repositories like rubygems.org, [pipi.org 00:08:16], thenugetgallery, etc. This is where the components are stored and available to the manufacturers, that are really the software development teams, that are consuming these components and downloading these components over the years. Those components are then used to create the finished goods, or the software applications, that organizations are then delivering to their customers. We'll continue to use this supply chain analogy for the software supply chain, then compare and contrast what's happening in traditional manufacturing, is to what's happening in software today.
  • #8: There's a really interesting site out there called moduleaccounts.com. It has a simple value, it keeps track of the number of different components, or packages that are available across the different development languages, from pipi, to nuget, to bower, to maven, components, etc. And it shows the increase in the number of these components that are available to the developer ecosystem, or the developer population, over time. We used some data from that site to see that over a thousand new open-source projects were created each day. People delivering a new kind of software, a new kind of component. Then, from the general population of all open-source projects worldwide, we were able to estimate that ten thousand new versions of components are introduced every day. There's this huge supply of components entering the ecosystem, and available to our software supply chains. When we look at the central repository that Sonatype manages, of maven style or java open-source components, we looked across 380 thousand open-source projects, and found that on average those projects were releasing fourteen new versions of their components every year. That's great from a supply chain aspect, that the suppliers are very active, actively releasing new software, actively releasing new innovations, and actively improving the software that they're making available to developers worldwide.  
  • #13: Unfortunately, not all parts are equal... Some are healthy, some are not… …and all go bad over time (like milk, not like wine).
  • #16: [00:14:00] One of the things that we measured year over year, and we do do some year over year comparisons throughout the report, is that 6.2% of the downloads from the central repository last year out of the billions of downloads, had a known security vulnerability in them. This past year we saw 6.1% of the downloads had a known vulnerability. That's about one in sixteen of every component download has a known vulnerability in it.
  • #18: [00:14:00] One of the things that we measured year over year, and we do do some year over year comparisons throughout the report, is that 6.2% of the downloads from the central repository last year out of the billions of downloads, had a known security vulnerability in them. This past year we saw 6.1% of the downloads had a known vulnerability. That's about one in sixteen of every component download has a known vulnerability in it.
  • #19: The native Docker runtime has made significant improvements over the last year, including the ability to invoke out-of-the-box Seccomp (secure computing mode) profiles. These container profiles can disable 52 system calls by default. But you still have 313 system calls on x64 machines. Do the math; that leaves 261 system calls still open for attack
  • #20: The native Docker runtime has made significant improvements over the last year, including the ability to invoke out-of-the-box Seccomp (secure computing mode) profiles. These container profiles can disable 52 system calls by default. But you still have 313 system calls on x64 machines. Do the math; that leaves 261 system calls still open for attack
  • #22: [00:18:00] Part of those practices are how much hygiene are we building into our software supply chain? This year's report allowed us to get visibility from the downloads from the central warehouses, being 6% were known vulnerable, to components that were downloaded to repository managers. Imagine a local warehouse, if you will, for component parts used by developers. 5.6% of those downloads were known vulnerable. Then the finished goods, across the 25000 applications that we analyze, 6.8% of those components were known vulnerable. That means that the components that were downloaded ended up in the finished goods, or in the applications that are being shipped and shared with customers. Meaning, there's not enough vetting taking place from where we're sourcing components and bringing them into our organizations to what's ending up in the final products.
  • #24: Unsafe at Any Speed: The Designed-In Dangers of the American Automobile by Ralph Nader, published in 1965, is a book accusing car manufacturers of resistance to the introduction of safety features such as seat belts, and their general reluctance to spend money on improving safety. It was a pioneering work containing substantial references and material from industry insiders. It was a best seller in non-fiction in 1966. Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.
  • #25: If you are passing defects downstream, you are ultimately liable. Which side of history will you be on?
  • #26: “Cease dependence on mass inspection.” Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.