SlideShare a Scribd company logo
The State of DevSecOps
About me
Stefan Streichsbier
@s_streichsbier
GuardRails.io
Move fast, be safe.
What do these companies have in common?
<10 years
Tech Startups in Asia – #10YearChallenge
2009
vs
2019
How is that possible?
1. Existing solutions are no longer adequate
Provide A Terrible
User Experience
Enterprise Solutions Come
From The Waterfall Era
Enterprise Means
Overpriced
2. SaaS enable wide-spread distribution
Your Users Are EverywhereNo Need To Go
To A Physical Location
No Need to Create
WW Sales Teams
3. Cheaper to create & operate Software
Startup Ecosystems
Empower Entrepreneurs
Open Source Software
Provides Building Blocks
Cloud Computing Provides
Low Barrier of Entry
To summarize
The existing solutions
are ripe for replacement
Creating new technology
solutions was never faster
Software can be
Distributed globally
DevSecOps:
How important is it really?
• Agile took us from months to days to deliver software
• DevOps took us from months to minutes to deploy software
• More applications are mission critical
• Now security has become the bottleneck
The real impact of hacks & breaches
News is full of high-profile breaches that get widespread attention.
But they are not the only target of hackers
43% of all cyber attacks target
small businesses.
60%
of small businesses that are
Hacked go out of business
within 6 months.
1/5
data breaches are the result
of attackers abusing
insecure web applications.
DevSecOps:
Who is responsible?
The Evolution of Security Tools
Secure SDLCPenetration Testing DevSecOps
Duration 2-4 weeks 1-2 weeks Continuous and Real-time
Tools
• Port Scanners
• Vulnerability Scanners
• Exploitation Tools
Audience
• Security Professionals
Tools
• Code Security Scanners
• Dynamic Security Scanners
• Vulnerability Scanners
Audience
• Security Professionals in
Enterprise Security Teams
Tools
• Code Security Scanners
• Interactive Security Scanners
• Runtime Application Self Protection
Audience
• Developers in Product Teams
Security
Development
Operations
The Evolution of Security Teams
Secure SDLCPenetration Testing DevSecOps
Security
Development
Operations
Security
Development
Operations
“Department of NO” “Let’s work together” “How can we help you succeed?”
Modern security teams empower dev teams!
100 10 1
Dev Ops Sec: :
: :
Looks like we have a scale problem
The State of DevSecOps
- John Willis
You build it, you secure it.
Mindset within your product teams
• Have Shared Pain and Shared Goals
• Clearly defined global delivery goals (no competing KPIs)
• Measure outcome (customer value), not output
• Be Autonomous
• Maximize flow (minimize cycle times)
• Implement fast automated test suites
• Never pass defects downstream
• Create quality at the source (provide knowledge where needed)
• Full decision authority
• Full Accountability
• Good or bad - you own it. There is no one else to blame
Leveraging DevSecOps Principles
Understanding benefits of security controls
Create Test Monitor
Challenges
• Changing human behavior
• Difficult to enforce
• People churn
Benefits
• Reduce new vulnerabilities
Challenges
• Vulnerability Noise
• Fixing issues
• Coverage of issues
Benefits
• Enforceable
• Provide Metrics
Challenges
• Coverage of issues
• Org wide rollout
Benefits
• Enforceable
• Provide Metrics
• Block attacks
Security
DevSecOps - Monitor
Are your applications currently
under attack?
Are we automatically defending
against this attack?
What are attackers going after?
• Micro Segmentation
• Runtime Application Self Protection (RASP)
• Bug Bounties
Questions you should be able to answerAvailable Technologies
DevSecOps - Test
Do the latest changes introduce
new security issues?
Does our code contain hard-
coded secrets?
Do any of our 3rd party libraries have
known security issues?
Questions you should be able to answer
• Static Application Security Testing (SAST)
• Sensitive Information Scanners (SIS)
• Software Composition Analysis (SCA/CCA)
• Dynamic Security Scanning (DAST)
• Interactive Application Security Testing (IAST)
Available Technologies
Automated Security Testing
SAST SCA DAST/IASTCCA
CommercialOpenSource
60+
Where do these tools live?
Source: https://twitter.com/djschleen
DevSecOps - Create
Do your teams know the most
common successful attacks?
Who is the dedicated security
contact in a team?
Do your teams know how
to detect and avoid them?
Questions you should be able to answer
• Security Awareness
• Secure Coding Training
• Shared Knowledge Base
• Security Focused Hackathons
• Security Champion Program
Available Options
DevSecOps
Do we really need it now?
There are some compelling statistics
• It’s 30 times cheaper to fix security defects in development vs production
• 80% to 90% of modern applications consist of open source components
• An average data breach costs 5M+ USD
• Most of the DevOps high-performers include security in their delivery process
Security as Competitive Advantage
State of DevSecOps - Conclusion
Security TeamTechnologies Product Team
• Tools have improved
• Choose them wisely
• Solve technology problems
• Cover the whole portfolio
• Start acting on data in prod
• Department of YES
• Empowering product teams
• Use scarce resources wisely
• Knowledge is power
• Turn developers into security champs
• Be mindful that change is slow
• Build it, run it, secure it
Thank you
Get a curated list of security resources
Consisting of:
• Awesome security lists
• Developer trainings
• List of great security tools
• Security Page templates
• Free digital copy of my book
• the slides
• … and more
Then send an email to:
iwant@guardrails.io

More Related Content

What's hot (20)

PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PPTX
DevSecOps
Joel Divekar
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PDF
Introduction to DevSecOps
Setu Parimi
 
PDF
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
PPTX
DevSecOps
Cheah Eng Soon
 
PDF
DevSecOps Implementation Journey
DevOps Indonesia
 
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
PDF
DevOps Transformation: Learnings and Best Practices
QBurst
 
PDF
DevSecOps Basics with Azure Pipelines
Abdul_Mujeeb
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PPTX
DevOps introduction
Christian F. Nissen
 
PDF
Secure Your Code Implement DevSecOps in Azure
kloia
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PPTX
Introduction to DevOps
Hawkman Academy
 
DevSecOps in Baby Steps
Priyanka Aash
 
Demystifying DevSecOps
Archana Joshi
 
DevSecOps
Joel Divekar
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
Introduction to DevSecOps
Setu Parimi
 
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
Introduction to DevSecOps
abhimanyubhogwan
 
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
DevSecOps
Cheah Eng Soon
 
DevSecOps Implementation Journey
DevOps Indonesia
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
DevOps Transformation: Learnings and Best Practices
QBurst
 
DevSecOps Basics with Azure Pipelines
Abdul_Mujeeb
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
DevOps introduction
Christian F. Nissen
 
Secure Your Code Implement DevSecOps in Azure
kloia
 
DevSecOps : an Introduction
Prashanth B. P.
 
Introduction to DevOps
Hawkman Academy
 

Similar to The State of DevSecOps (20)

PPTX
State of DevSecOps - GTACS 2019
Stefan Streichsbier
 
PPTX
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
 
PPTX
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
PPTX
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
PDF
DevSecOps The Evolution of DevOps
Michael Man
 
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
DicodingEvent
 
PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PDF
DevSecOps - Background, Status and Future Challenges
dsc71656
 
PDF
The Future of DevSecOps
Stefan Streichsbier
 
PPTX
DevSecOps without DevOps is Just Security
Kevin Fealey
 
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PDF
The What, Why, and How of DevSecOps
Cprime
 
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
PPTX
Securing a great DX - DevSecOps Days Singapore 2018
Stefan Streichsbier
 
PDF
DevSecOps - The big picture
Stefan Streichsbier
 
PDF
DevSecOps - The big picture
DevSecOpsSg
 
PDF
August 2018: DevSecOps - London Gathering
Michael Man
 
PPTX
Securing a great Developer Experience - v1.3
Stefan Streichsbier
 
State of DevSecOps - GTACS 2019
Stefan Streichsbier
 
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
 
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
DevSecOps The Evolution of DevOps
Michael Man
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
DicodingEvent
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
DevSecOps - Background, Status and Future Challenges
dsc71656
 
The Future of DevSecOps
Stefan Streichsbier
 
DevSecOps without DevOps is Just Security
Kevin Fealey
 
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
The What, Why, and How of DevSecOps
Cprime
 
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
Securing a great DX - DevSecOps Days Singapore 2018
Stefan Streichsbier
 
DevSecOps - The big picture
Stefan Streichsbier
 
DevSecOps - The big picture
DevSecOpsSg
 
August 2018: DevSecOps - London Gathering
Michael Man
 
Securing a great Developer Experience - v1.3
Stefan Streichsbier
 
Ad

More from DevOps Indonesia (20)

PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia
 
PDF
Securing an NGINX deployment for K8s
DevOps Indonesia
 
PDF
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia
 
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
DevOps Indonesia
 
PDF
Securing DevOps Lifecycle
DevOps Indonesia
 
PDF
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Indonesia
 
PDF
Secure your Application with Google cloud armor
DevOps Indonesia
 
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Indonesia
 
PDF
Operate Containers with AWS Copilot
DevOps Indonesia
 
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps Indonesia
 
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps Indonesia
 
PDF
Securing Your Database Dynamic DB Credentials
DevOps Indonesia
 
PDF
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia
 
PDF
The Death and Rise of Enterprise DevOps
DevOps Indonesia
 
PDF
API Security Webinar - Credential Stuffing
DevOps Indonesia
 
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
PDF
API Security Webinar - Hendra Tanto
DevOps Indonesia
 
PDF
API Security Webinar : Credential Stuffing
DevOps Indonesia
 
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
PDF
Feature Scoring in Green Field Application Development and DevOps
DevOps Indonesia
 
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia
 
Securing an NGINX deployment for K8s
DevOps Indonesia
 
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia
 
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
DevOps Indonesia
 
Securing DevOps Lifecycle
DevOps Indonesia
 
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Indonesia
 
Secure your Application with Google cloud armor
DevOps Indonesia
 
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Indonesia
 
Operate Containers with AWS Copilot
DevOps Indonesia
 
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps Indonesia
 
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps Indonesia
 
Securing Your Database Dynamic DB Credentials
DevOps Indonesia
 
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia
 
The Death and Rise of Enterprise DevOps
DevOps Indonesia
 
API Security Webinar - Credential Stuffing
DevOps Indonesia
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
API Security Webinar - Hendra Tanto
DevOps Indonesia
 
API Security Webinar : Credential Stuffing
DevOps Indonesia
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
Feature Scoring in Green Field Application Development and DevOps
DevOps Indonesia
 
Ad

Recently uploaded (20)

PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
WSO2
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PDF
Sound the Alarm: Detection and Response
VICTOR MAESTRE RAMIREZ
 
PDF
Deploy Faster, Run Smarter: Learn Containers with QNAP
QNAP Marketing
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PDF
Governing Geospatial Data at Scale: Optimizing ArcGIS Online with FME in Envi...
Safe Software
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
WSO2
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
Sound the Alarm: Detection and Response
VICTOR MAESTRE RAMIREZ
 
Deploy Faster, Run Smarter: Learn Containers with QNAP
QNAP Marketing
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
Governing Geospatial Data at Scale: Optimizing ArcGIS Online with FME in Envi...
Safe Software
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Kubernetes - Architecture & Components.pdf
geethak285
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 

The State of DevSecOps

  • 1. The State of DevSecOps
  • 3. What do these companies have in common? <10 years
  • 4. Tech Startups in Asia – #10YearChallenge 2009 vs 2019
  • 5. How is that possible?
  • 6. 1. Existing solutions are no longer adequate Provide A Terrible User Experience Enterprise Solutions Come From The Waterfall Era Enterprise Means Overpriced
  • 7. 2. SaaS enable wide-spread distribution Your Users Are EverywhereNo Need To Go To A Physical Location No Need to Create WW Sales Teams
  • 8. 3. Cheaper to create & operate Software Startup Ecosystems Empower Entrepreneurs Open Source Software Provides Building Blocks Cloud Computing Provides Low Barrier of Entry
  • 9. To summarize The existing solutions are ripe for replacement Creating new technology solutions was never faster Software can be Distributed globally
  • 10. DevSecOps: How important is it really? • Agile took us from months to days to deliver software • DevOps took us from months to minutes to deploy software • More applications are mission critical • Now security has become the bottleneck
  • 11. The real impact of hacks & breaches News is full of high-profile breaches that get widespread attention. But they are not the only target of hackers 43% of all cyber attacks target small businesses. 60% of small businesses that are Hacked go out of business within 6 months. 1/5 data breaches are the result of attackers abusing insecure web applications.
  • 13. The Evolution of Security Tools Secure SDLCPenetration Testing DevSecOps Duration 2-4 weeks 1-2 weeks Continuous and Real-time Tools • Port Scanners • Vulnerability Scanners • Exploitation Tools Audience • Security Professionals Tools • Code Security Scanners • Dynamic Security Scanners • Vulnerability Scanners Audience • Security Professionals in Enterprise Security Teams Tools • Code Security Scanners • Interactive Security Scanners • Runtime Application Self Protection Audience • Developers in Product Teams
  • 14. Security Development Operations The Evolution of Security Teams Secure SDLCPenetration Testing DevSecOps Security Development Operations Security Development Operations “Department of NO” “Let’s work together” “How can we help you succeed?”
  • 15. Modern security teams empower dev teams! 100 10 1 Dev Ops Sec: : : : Looks like we have a scale problem
  • 17. - John Willis You build it, you secure it.
  • 18. Mindset within your product teams • Have Shared Pain and Shared Goals • Clearly defined global delivery goals (no competing KPIs) • Measure outcome (customer value), not output • Be Autonomous • Maximize flow (minimize cycle times) • Implement fast automated test suites • Never pass defects downstream • Create quality at the source (provide knowledge where needed) • Full decision authority • Full Accountability • Good or bad - you own it. There is no one else to blame
  • 20. Understanding benefits of security controls Create Test Monitor Challenges • Changing human behavior • Difficult to enforce • People churn Benefits • Reduce new vulnerabilities Challenges • Vulnerability Noise • Fixing issues • Coverage of issues Benefits • Enforceable • Provide Metrics Challenges • Coverage of issues • Org wide rollout Benefits • Enforceable • Provide Metrics • Block attacks Security
  • 21. DevSecOps - Monitor Are your applications currently under attack? Are we automatically defending against this attack? What are attackers going after? • Micro Segmentation • Runtime Application Self Protection (RASP) • Bug Bounties Questions you should be able to answerAvailable Technologies
  • 22. DevSecOps - Test Do the latest changes introduce new security issues? Does our code contain hard- coded secrets? Do any of our 3rd party libraries have known security issues? Questions you should be able to answer • Static Application Security Testing (SAST) • Sensitive Information Scanners (SIS) • Software Composition Analysis (SCA/CCA) • Dynamic Security Scanning (DAST) • Interactive Application Security Testing (IAST) Available Technologies
  • 23. Automated Security Testing SAST SCA DAST/IASTCCA CommercialOpenSource 60+
  • 24. Where do these tools live? Source: https://twitter.com/djschleen
  • 25. DevSecOps - Create Do your teams know the most common successful attacks? Who is the dedicated security contact in a team? Do your teams know how to detect and avoid them? Questions you should be able to answer • Security Awareness • Secure Coding Training • Shared Knowledge Base • Security Focused Hackathons • Security Champion Program Available Options
  • 26. DevSecOps Do we really need it now? There are some compelling statistics • It’s 30 times cheaper to fix security defects in development vs production • 80% to 90% of modern applications consist of open source components • An average data breach costs 5M+ USD • Most of the DevOps high-performers include security in their delivery process Security as Competitive Advantage
  • 27. State of DevSecOps - Conclusion Security TeamTechnologies Product Team • Tools have improved • Choose them wisely • Solve technology problems • Cover the whole portfolio • Start acting on data in prod • Department of YES • Empowering product teams • Use scarce resources wisely • Knowledge is power • Turn developers into security champs • Be mindful that change is slow • Build it, run it, secure it
  • 29. Get a curated list of security resources Consisting of: • Awesome security lists • Developer trainings • List of great security tools • Security Page templates • Free digital copy of my book • the slides • … and more Then send an email to: [email protected]