SlideShare a Scribd company logo
Application security
in a DevOps World
Bob Egner, CMO
be@outpost24.com
1
2
Helping customers improve security posture since 2001
Over 2,000 customers in all regions of the world
Really good at breaking technology
Agenda
DevOps background
Lingering security challenges
Evolution of DevSecOps.
Putting it into practice
Takeaways
3
1960’s
Waterfall
Assembler code
widely used for
development. The
Waterfall
methodology was
coined in 1958
1970’s
New languages
COBOL, PL1, Pascal
all made an
appearance.
DBMS gains
traction in
database
management
1980’s
SQL and OO
SQL and object
orientated
languages appear.
Waterfall
development still
used but in 1986
SCRUM is coined
1990’s
WWW appears
94 – unified
process
95 – Javascript,
SCRUM
96 – Flash, Extreme
programming
99 – Concept of
Web applications
2000s
Agile (and Web) explode
01 – Agile
manifesto
05- Ajax created
for asynchronous
web application
development
05 – Declaration of
Interdependence
09 – Software
craftmanship
manifesto
04
Date
A brief history of (Application Development) time
5
We need a Silver bullet
DevOps
Coined in 2009
Agile success drove integration between
Development and Operations
Results in the need for cultural change to
encourages more collaboration
Focus on application release automation,
continuous integration and continuous delivery
People | Process | Technology approach
By Kharnagy - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=51215412
But what about the Security team?
But is it really a Silver bullet?
Source: Verizon data breach investigation report 2017 Source: Verizon data breach investigation report 2018
Outpost24 webinar - application security in a dev ops world-08-2018
DevSecOps – process, people & tools
9
People | Process | Technology
christopherspenn.com | @cspenn
People
Who’s doing stuff
Process
How stuff
is done
Technology
What we
do stuff with
scaleinnovate
automate
Are we fast enough?
Are we efficient enough?
Are we creating enough new value?
Challenges with DevOps and
Security teams
What happened to Secure by Design?
Priority of security in DevOps migration
Buy your way out with tools
Focusing on the end instead of process
management pushes higher “per fix” cost
11
How do we
incorporate Security?
Security has historically been a silo
Secure by design is assumed part of
Agile mentality
Process | People can break down silo
But does DevSecOps really work?
Slaying the myths of
DevSecOps
• Security cant fit into
DevOps process.
• Configuration
management tools are all
DevOps need.
• Adopting DevOPs
eliminates the need for
Security experts.
• If we can do DevOps we
can do SecOps.
DevSecOps
• Distribute security decision
making
• to the right people
• with the right context
• at the right time
• Embedded into the team,
easily accessible by
Developers
• Gartner refers to these as
‘Champions’
People
Your Champion
• Have both domain experience and
desire to secure development
• Help spot security problems sooner
• Assign champions to security
analysts
• Helps security teams translate their
priorities into development practices
Champion & Analyst
CHAMPION
Member of project
team
Key contact for
security
Not an expert
A requirement for
each project
ANALYST
Security team member
Keeps security
involved
Key contact for the
Champion(s)
Security by design
thinking
• Links IT Security to Development teams and projects
• Encourage a community between champions and
brokers
• Goal to improve the overall security posture
• Encourage developer collaboration with champions
and analyst
Process
Shift left – improve maturity & lower fix costs
19
Development Pre-production Production
Code and commit
Continuous
integration
& automated
testing
Complete
build & test
Gate 1 Gate 2
Non-
functional
testing
UAT Ongoing
assessments
Shift left – simple steps
20
Development Pre-production Production
Code and commit
Continuous
integration
& automated
testing
Complete
build & test
Gate 1 Gate 2
Non-
functional
testing
UAT Ongoing
assessments
Penetration
testing
Code reviews
Threat modeling
Technology
Choose the right
tools for the job
• Before settling on what tools, ask yourself:
• How frequent are your ’sprints’?
• How long does each tool take to run?
• Can it be wholly automated into the CI/CD
process?
• Is it noisy, does it generate lots of false
positives?
• Answering these questions will help steer you in
identifying the tools appropriate for your needs
22
Perfect is the enemy of Good
• Chasing perfection in a DevOps culture
leads to slower development
• Don’t have to fix everything during
development
• Compensate with other tools : IPS, WAF
to mitigate unknown vulnerabilities
• Focus on fixing the critical known
vulnerabilities during Development
• The tools you select should be agile : in
both integration and scanning speed
23
Tools for
Success
OpenAPI based to integrate
seamlessly in the CI/CD
toolchain
Can be easily and quickly run
by Developers
24
25
Tools in the AST kit
SAST - Static
Automated
Focused on developers
Noisy
DAST - Dynamic
Automated
Operational system test
Can’t address all cases
Penetration Test
Manual
Most comprehensive
Low frequency use
MAST – Mobile
Partially automated
Focused on developers
Lots of variants of test
target
IAST – Interactive
Automated
Included in code
Related to RASP
(runtime app self protection)
Bug Bounty
Manual
Independent security
researchers
Pay by finding
Shift left – improve maturity & lower fix costs
26
Development Pre-production Production
Code and commit
Continuous
integration
& automated
testing
Complete
build & test
Gate 1 Gate 2
Non-
functional
testing
UAT Ongoing
assessments
SAST $
IAST $$
DAST $$
MAST $$
Bug Bounty
$$$
Penetration Test $$$$
Takeaways
27
Keep evolving
Activity
Distribution
Accountability
Metrics
DevOps
• Agile success drove the need for tighter integration
between Development and Operations – Coined in 2009
• Encourages (and indeed needs) collaboration between
development, operations and QA – results in the need
for cultural change
• Allows for focus on application release automation,
continuous integration and continuous
delivery
• Process – People – Tools approach to development
• Often (and initially) leave out ‘Security teams’
Takeaways
DevSecOps – culture change implemented with People | Process | Technology
Process – small steps, not immediate perfection, mandate security
People – establish security champions in DevOps, support the mandate
Tools – integrate into the DevOps tool chain natively
Shift Left – introduce additional tools and information earlier in the DevOps process
Thanks
Bob Egner, CMO
be@outpost24.com
30

More Related Content

What's hot (20)

PDF
8 Tips for Deploying DevSecOps
Felicia Haggarty
 
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
SeniorStoryteller
 
PPTX
Devops
penetration Tester
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PPTX
Making Security Agile - Oleg Gryb
SeniorStoryteller
 
PPTX
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
PDF
The Challenges of Scaling DevSecOps
WhiteSource
 
PDF
2017 DevSecOps Survey
Sonatype
 
PPTX
Disconnected Pipelines: The Missing Link
Eficode
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PDF
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
Hananto Wibowo Soenarto
 
PPTX
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
SeniorStoryteller
 
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
PPTX
DevSecOps - It can change your life (cycle)
Qualitest
 
PDF
DevSecOps - Building Rugged Software
SeniorStoryteller
 
PDF
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
Hui (Henry) Chen
 
PDF
2018 State Of DevOps Report Key Findings
Eficode
 
8 Tips for Deploying DevSecOps
Felicia Haggarty
 
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
SeniorStoryteller
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
Making Security Agile - Oleg Gryb
SeniorStoryteller
 
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
The Challenges of Scaling DevSecOps
WhiteSource
 
2017 DevSecOps Survey
Sonatype
 
Disconnected Pipelines: The Missing Link
Eficode
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
DevSecOps : The Open Source Way by Yusuf Hadiwinata
Hananto Wibowo Soenarto
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
SeniorStoryteller
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
DevSecOps - It can change your life (cycle)
Qualitest
 
DevSecOps - Building Rugged Software
SeniorStoryteller
 
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
Hui (Henry) Chen
 
2018 State Of DevOps Report Key Findings
Eficode
 

Similar to Outpost24 webinar - application security in a dev ops world-08-2018 (20)

PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
PPTX
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
PPTX
State of DevSecOps - GTACS 2019
Stefan Streichsbier
 
PDF
DevSecOps - The big picture
Stefan Streichsbier
 
PDF
DevSecOps - The big picture
DevSecOpsSg
 
PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
 
PDF
The State of DevSecOps
DevOps Indonesia
 
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
DicodingEvent
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
PDF
DevOps for the Discouraged
James Wickett
 
PDF
Security's DevOps Transformation
Michele Chubirka
 
PPTX
DevSecOps without DevOps is Just Security
Kevin Fealey
 
PPTX
Are your DevOps and Security teams friends or foes?
Reuven Harrison
 
PDF
Security at the Speed of Software Development
DevOps.com
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Introduction to DevSecOps
abhimanyubhogwan
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
Scale security for a dollar or less
Mohammed A. Imran
 
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
State of DevSecOps - GTACS 2019
Stefan Streichsbier
 
DevSecOps - The big picture
Stefan Streichsbier
 
DevSecOps - The big picture
DevSecOpsSg
 
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
 
The State of DevSecOps
DevOps Indonesia
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
DicodingEvent
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
DevOps for the Discouraged
James Wickett
 
Security's DevOps Transformation
Michele Chubirka
 
DevSecOps without DevOps is Just Security
Kevin Fealey
 
Are your DevOps and Security teams friends or foes?
Reuven Harrison
 
Security at the Speed of Software Development
DevOps.com
 
Ad

More from Outpost24 (20)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
PPTX
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
PPTX
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
PPTX
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
PPTX
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Ad

Recently uploaded (20)

PDF
Code Once; Run Everywhere - A Beginner’s Journey with React Native
Hasitha Walpola
 
PPTX
How Can Recruitment Management Software Improve Hiring Efficiency?
HireME
 
PDF
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
 
PDF
Laboratory Workflows Digitalized and live in 90 days with Scifeon´s SAPPA P...
info969686
 
PPTX
For my supp to finally picking supp that work
necas19388
 
PPTX
CONCEPT OF PROGRAMMING in language .pptx
tamim41
 
PPTX
ERP - FICO Presentation BY BSL BOKARO STEEL LIMITED.pptx
ravisranjan
 
PDF
IObit Uninstaller Pro 14.3.1.8 Crack for Windows Latest
utfefguu
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 41
utfefguu
 
PDF
Rewards and Recognition (2).pdf
ethan Talor
 
PDF
Alur Perkembangan Software dan Jaringan Komputer
ssuser754303
 
PPTX
Seamless-Image-Conversion-From-Raster-to-wrt-rtx-rtx.pptx
Quick Conversion Services
 
PDF
LPS25 - Operationalizing MLOps in GEP - Terradue.pdf
terradue
 
PDF
capitulando la keynote de GrafanaCON 2025 - Madrid
Imma Valls Bernaus
 
PDF
Cloud computing Lec 02 - virtualization.pdf
asokawennawatte
 
PPTX
Perfecting XM Cloud for Multisite Setup.pptx
Ahmed Okour
 
PPTX
Avast Premium Security crack 25.5.6162 + License Key 2025
HyperPc soft
 
PPTX
IObit Uninstaller Pro 14.3.1.8 Crack Free Download 2025
sdfger qwerty
 
PDF
What Is an Internal Quality Audit and Why It Matters for Your QMS
BizPortals365
 
PDF
AI Software Development Process, Strategies and Challenges
Net-Craft.com
 
Code Once; Run Everywhere - A Beginner’s Journey with React Native
Hasitha Walpola
 
How Can Recruitment Management Software Improve Hiring Efficiency?
HireME
 
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
 
Laboratory Workflows Digitalized and live in 90 days with Scifeon´s SAPPA P...
info969686
 
For my supp to finally picking supp that work
necas19388
 
CONCEPT OF PROGRAMMING in language .pptx
tamim41
 
ERP - FICO Presentation BY BSL BOKARO STEEL LIMITED.pptx
ravisranjan
 
IObit Uninstaller Pro 14.3.1.8 Crack for Windows Latest
utfefguu
 
IDM Crack with Internet Download Manager 6.42 Build 41
utfefguu
 
Rewards and Recognition (2).pdf
ethan Talor
 
Alur Perkembangan Software dan Jaringan Komputer
ssuser754303
 
Seamless-Image-Conversion-From-Raster-to-wrt-rtx-rtx.pptx
Quick Conversion Services
 
LPS25 - Operationalizing MLOps in GEP - Terradue.pdf
terradue
 
capitulando la keynote de GrafanaCON 2025 - Madrid
Imma Valls Bernaus
 
Cloud computing Lec 02 - virtualization.pdf
asokawennawatte
 
Perfecting XM Cloud for Multisite Setup.pptx
Ahmed Okour
 
Avast Premium Security crack 25.5.6162 + License Key 2025
HyperPc soft
 
IObit Uninstaller Pro 14.3.1.8 Crack Free Download 2025
sdfger qwerty
 
What Is an Internal Quality Audit and Why It Matters for Your QMS
BizPortals365
 
AI Software Development Process, Strategies and Challenges
Net-Craft.com
 

Outpost24 webinar - application security in a dev ops world-08-2018

  • 1. Application security in a DevOps World Bob Egner, CMO [email protected] 1
  • 2. 2 Helping customers improve security posture since 2001 Over 2,000 customers in all regions of the world Really good at breaking technology
  • 3. Agenda DevOps background Lingering security challenges Evolution of DevSecOps. Putting it into practice Takeaways 3
  • 4. 1960’s Waterfall Assembler code widely used for development. The Waterfall methodology was coined in 1958 1970’s New languages COBOL, PL1, Pascal all made an appearance. DBMS gains traction in database management 1980’s SQL and OO SQL and object orientated languages appear. Waterfall development still used but in 1986 SCRUM is coined 1990’s WWW appears 94 – unified process 95 – Javascript, SCRUM 96 – Flash, Extreme programming 99 – Concept of Web applications 2000s Agile (and Web) explode 01 – Agile manifesto 05- Ajax created for asynchronous web application development 05 – Declaration of Interdependence 09 – Software craftmanship manifesto 04 Date A brief history of (Application Development) time
  • 5. 5 We need a Silver bullet
  • 6. DevOps Coined in 2009 Agile success drove integration between Development and Operations Results in the need for cultural change to encourages more collaboration Focus on application release automation, continuous integration and continuous delivery People | Process | Technology approach By Kharnagy - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=51215412 But what about the Security team?
  • 7. But is it really a Silver bullet? Source: Verizon data breach investigation report 2017 Source: Verizon data breach investigation report 2018
  • 9. DevSecOps – process, people & tools 9
  • 10. People | Process | Technology christopherspenn.com | @cspenn People Who’s doing stuff Process How stuff is done Technology What we do stuff with scaleinnovate automate Are we fast enough? Are we efficient enough? Are we creating enough new value?
  • 11. Challenges with DevOps and Security teams What happened to Secure by Design? Priority of security in DevOps migration Buy your way out with tools Focusing on the end instead of process management pushes higher “per fix” cost 11
  • 12. How do we incorporate Security? Security has historically been a silo Secure by design is assumed part of Agile mentality Process | People can break down silo But does DevSecOps really work?
  • 13. Slaying the myths of DevSecOps • Security cant fit into DevOps process. • Configuration management tools are all DevOps need. • Adopting DevOPs eliminates the need for Security experts. • If we can do DevOps we can do SecOps.
  • 14. DevSecOps • Distribute security decision making • to the right people • with the right context • at the right time • Embedded into the team, easily accessible by Developers • Gartner refers to these as ‘Champions’
  • 16. Your Champion • Have both domain experience and desire to secure development • Help spot security problems sooner • Assign champions to security analysts • Helps security teams translate their priorities into development practices
  • 17. Champion & Analyst CHAMPION Member of project team Key contact for security Not an expert A requirement for each project ANALYST Security team member Keeps security involved Key contact for the Champion(s) Security by design thinking • Links IT Security to Development teams and projects • Encourage a community between champions and brokers • Goal to improve the overall security posture • Encourage developer collaboration with champions and analyst
  • 19. Shift left – improve maturity & lower fix costs 19 Development Pre-production Production Code and commit Continuous integration & automated testing Complete build & test Gate 1 Gate 2 Non- functional testing UAT Ongoing assessments
  • 20. Shift left – simple steps 20 Development Pre-production Production Code and commit Continuous integration & automated testing Complete build & test Gate 1 Gate 2 Non- functional testing UAT Ongoing assessments Penetration testing Code reviews Threat modeling
  • 22. Choose the right tools for the job • Before settling on what tools, ask yourself: • How frequent are your ’sprints’? • How long does each tool take to run? • Can it be wholly automated into the CI/CD process? • Is it noisy, does it generate lots of false positives? • Answering these questions will help steer you in identifying the tools appropriate for your needs 22
  • 23. Perfect is the enemy of Good • Chasing perfection in a DevOps culture leads to slower development • Don’t have to fix everything during development • Compensate with other tools : IPS, WAF to mitigate unknown vulnerabilities • Focus on fixing the critical known vulnerabilities during Development • The tools you select should be agile : in both integration and scanning speed 23
  • 24. Tools for Success OpenAPI based to integrate seamlessly in the CI/CD toolchain Can be easily and quickly run by Developers 24
  • 25. 25 Tools in the AST kit SAST - Static Automated Focused on developers Noisy DAST - Dynamic Automated Operational system test Can’t address all cases Penetration Test Manual Most comprehensive Low frequency use MAST – Mobile Partially automated Focused on developers Lots of variants of test target IAST – Interactive Automated Included in code Related to RASP (runtime app self protection) Bug Bounty Manual Independent security researchers Pay by finding
  • 26. Shift left – improve maturity & lower fix costs 26 Development Pre-production Production Code and commit Continuous integration & automated testing Complete build & test Gate 1 Gate 2 Non- functional testing UAT Ongoing assessments SAST $ IAST $$ DAST $$ MAST $$ Bug Bounty $$$ Penetration Test $$$$
  • 29. DevOps • Agile success drove the need for tighter integration between Development and Operations – Coined in 2009 • Encourages (and indeed needs) collaboration between development, operations and QA – results in the need for cultural change • Allows for focus on application release automation, continuous integration and continuous delivery • Process – People – Tools approach to development • Often (and initially) leave out ‘Security teams’ Takeaways DevSecOps – culture change implemented with People | Process | Technology Process – small steps, not immediate perfection, mandate security People – establish security champions in DevOps, support the mandate Tools – integrate into the DevOps tool chain natively Shift Left – introduce additional tools and information earlier in the DevOps process

Editor's Notes

  • #5: 2001 Writing Secure Code by Howard and LeBlanc from the earlier Microsoft’s Secure Windows Initiative
  • #6: And so we end up with Agile + DevOPs being likened to that fabled Silver bullet. You know : the thing that slays the beast. In this case, addressing the need to align development to an efficient, digital pace of business today. Or the thing that magically addresses a complicated probbkem
  • #7: With the success of Agile development, in 2009 the concept of DevOps was raised by Andrew Shafer and Patrick Debois. DevOps is essentially a natural evolution of Agile, it brings closer together the Development team. The Operations team and QA to allow for the rapid release of applications through sprints. Although it requires a cultural change, organizations embracing it can develop and deliver applications much fasters Security by design is often shoe’horned into the Devops process, often focusing on the end of the development journey. however, for many years the security teams were still precluded from the process. In fact, whilst remaining a silo separate to the Agile and DevOps processes security can become the inhibitor to successfully implementing Agile and Devops cultures
  • #8: Security by design,…… Agile and DevOPs allows customers to develop and deliver applications to the market at a quck pace. And yet, time after time the surveys show that web application attacks are continually features in the top lists of incidents and often right at the top in sources of breaches.
  • #9: And OWASP constantly publish the top 10 list, not the top 3 or 5. Couple that with almost no change in top 10 over the last 4 years, its little wonder our customers are asking how, as they adopt DevOps they are constantly facing the quandary of can security fit into the DevOps model without it being a hinderance.
  • #11: Earliest form of this was Harold Leavitt’s 1964 use of 4 elements (structure, tasks, people, technology) in describing organizational change – since then, we’ve improved it to just 3 elements I like this version from Chris Penn because it clearly shows the where the benefits come from – the intersections http://www.christopherspenn.com/2018/01/transforming-people-process-and-technology-part-1/
  • #12: In 2017 Gartner shows that the biggest strategy to overcome was collaborating with Security. As organisations adopt a
  • #13: If security teams remain silo’d and disengaged from the Agile DevOps process then challenges will arise. In fact, its highly likely that Security will become a stumbling block to the success of Agile. Remember, Agile and DevOps is about collaboration (and rapid iteration). So breaking down the silo’s between the teams, integrating them together to create ‘DevSecOps’
  • #14: 1. Wrong. With the right automation and tools security can be injected into the development process much earlier. 2. Wrong, whilst they help with deployment and redeployment they simply cannot handle the security analysis that a security professional can 3. Wrong. The majority of developers are NOT security experts. Neglecting the security experts can lead to your organization becoming the next statistic on the Verizon dibr report. 4. Wrong. Keeping security as its own functional area or Silo misses the point of Agile and DevOps – namely cross-functional integration. Security Experts must partner with development and operations at the beginning of the development process. It might mean a cultural change, but it is absolutely imperative to success
  • #20: Point out – this is about situations where you have control over the DevOps process – if you outsource development, you may not be able to evolve with out external collaboration. For customization on COTS, you can still treat it as development and work towards this process Whiilst we try to move away from waterfall in the agile devops world, if we take a moment to look atboth the types of tools available and where they sit in Software development lifecycle we can identify where our own organisation is. Think about a shift left approach, if you don’t have anything inplace today, then can you fit a penetration test into the process. However, remember agile is about shorter development sprints. Therefore your pen test partner needs to be able to deliver on demand and at speed. Likewise if your doing Dast today, shifting left might mean Sast or IAST or Mast depending on the applications you are developing.
  • #21: Point out – this is about situations where you have control over the DevOps process – if you outsource development, you may not be able to evolve with out external collaboration. For customization on COTS, you can still treat it as development and work towards this process Whiilst we try to move away from waterfall in the agile devops world, if we take a moment to look atboth the types of tools available and where they sit in Software development lifecycle we can identify where our own organisation is. Think about a shift left approach, if you don’t have anything inplace today, then can you fit a penetration test into the process. However, remember agile is about shorter development sprints. Therefore your pen test partner needs to be able to deliver on demand and at speed. Likewise if your doing Dast today, shifting left might mean Sast or IAST or Mast depending on the applications you are developing.
  • #24: Ultimately when considering DevSecOP and starting the journey you need to consider Voltaire’s words: Perfect is the enemy of good. Don’t chase perfection, namely the fixing of ALL vulnerabilities during the Development cycle. This will kill your ability to deliver rapid sprints as you get bogged down with testing in the old Security by design mentality. Instead, use other tools to help mitigate the unknown or less common vulnerabilities : IPS, WAF, even next gen firewalls. Have the development team focus on the known critical vulnerabiltiies and fix them, use OWASP to help guide them on how to fix and not repeat the same errors. And when selecting your SAST, DAST, Mast, IAST tools, make sure they too are agile : agile in scanning and agile in the way they integrate in the CI/CD process.
  • #25: This is what our customers are asking us for time and again. 1. in DevOps, the development team should be capable of launching and executing automated scans from directly within their native toolchain. The scanners should be easy to use and not require significant security expertise. Moreover, findings should appear in the same DevOps native toolchain.
  • #29: Maturity curve is like climbing stairs – p p t Now carrying a bike on foot Now riding up