SlideShare a Scribd company logo
Why Security Engineers Need to
Shift-Left to DevSecOps
Najib Radzuan
Agenda
○
○
About Me
Najib Radzuan
● He was a Developer
● He became IT Operations
● Finally become DevOps Engineer/ DevOps Leader /
DevOps Institute Ambassador
● He is also a certified DevOps Leader, DevSecOps
Professional , Azure DevOps Expert, & etc.
● Founder of DevOps4Me
@devops4me @najibradzuan blog.devops4me.com
The Pitfall: Security & Compliance
Company
● Failure to recognise
cybersecurity basics
● Lack of Cybersecurity
Policy
● Not enough IT Security
Management
Application Developer
● Uses Open-Source
library which has a lot
of security bug risks
● They don't have formal
Application security
training.
● Lacks a recovery plan
for vulnerability risks.
AppSec / InfoSec Eng.
● Not involved in product
design/development
● The last person to
handle security and
compliance issues
● Cannot compete with
Agility and Speed of
DevOps team.
● DevSecOps also
added to the pain due
lack of CI/CD
knowledge
Traditional Security Testing
Plan Code Build Test Release Deploy Operate Monitor
Security Testing
The Pitfall
● A code review or penetration test it's
conducted to find security flaws in the
application at last Stage/Production
environment. Your Developer might
redo to eliminate the vulnerability.
● Bug/issue found when the project
deadline is near or last-minute = project
delayed
● Sometimes a bug/vulnerability is found
by the client or external pentester
Question:
Do we expect all
Developers to do security
testing and do not make
mistakes?
Solution
DevSecOps & Shift-Left
Approach
● Shifting left lets us deal with
security issues early and often
● So shifting left reduces risk and
the costs of fixing security
issues.
DevSecOps
DevSecOps is a modern model that provides that
everyone in the team is responsible for security
implementation in the application, from planning ,
design , development, QA / Testing to release, and in a
production environment.
Development
Quality
Assurance
IT Operation
Security
DevSecOps
DevSecOps Benefit
● Cost-saving is accomplish by identifying and addressing security
vulnerabilities during the development process, which also improves the
speed of delivery.
● It Improved overall security by reducing vulnerabilities, reducing insecure
defaults and increasing code coverage and automation by the use of
Infrastructure as Code (IaC).
● Everyone is responsible for security. DevSecOps fosters a culture of
transparency and accountability from the earliest stages of development.
● With help of DevSecOps, we are keeping up-to-date with the rapid creativity
common to cybercrime by effectively managing security auditing, monitoring
and notification systems.
DevSecOps Practice
Practice Secure CodingEmbrace AutomationShift-LeftPeople Process
- Neutralize senior
management mindset in
order for DevSecOps'
strategy to be embraced.
- Security specialists or
“Security Champions” will
play a key role in getting
your DevSecOps journey
right.
- Training developers on how
to develop secure code are
important to note.
- Until now, developer teams
may have not prioritized this
because the coding is the
priority. However, security
needs to be made aware of
security-related facts in
DevOps culture.
- The obvious advantage of
doing this is that you can
recognise possible
vulnerabilities and work to fix
them faster.
- The faster you notice any
bugs, the cheaper it will be
for you to fix them.
- Automation is a key feature
of DevSecOps to match the
speed of security with your
product delivery in a CI / CD
environment, security
automation is a must.
- Choosing and continuing
learning with the right
security automation tool is
key to the success of your
company's products.
- In general, different teams
within an organization
execute various tasks, with
DevSecOps, everyone works
on commonly agreed-upon
processes and executing
them to strengthen the extent
of security in development.
DevSecOps Approach
Pre-Commit Hooks
IDE Plugin
Developer
Secrets
Management
Source Code
- Software
Composition Analysis
(SCA)
-Static Analysis
Security Test (SAST)
Pre-Build
-Dynamic Analysis
Security Test (DAST)
Post-Build
Continuous Integration (CI) Tool/Server
- Defect Management
- Security Metric
-Artifact Security
Scan
Artifact
-Compliance As a
Code (CaC) - Inspec
by Chef
- Alert & Monitoring
Production
Vulnerability Management
DevSecOps Tools of the Trade
Developer Source Code Pre-Build Post-Build
Continuous Integration (CI) Tool/Server
Vulnerability Management
Artifact Production
**Above just an example, we don’t endorse any tool.
Retire.js
Example of DevSecOps Workflow
Push
Code
Source Code
Management
Developer
Pull Request
Scan
Pull
Request
Creation
Complete
Branch Scan
Trigger Build
CI/CD Tool / Server
1
2
3
Build Solution
Software
Analysis
(SCA) & Static
Security Scan
(SAST)
Artifact /
Image
4
Test
Staging
ProductionTrigger
Release
Release
Management
Pre-Approval
Deployment to
Environment
5
6
Dynamic Security
Scan (DAST)
Dynamic Security
Scan (DAST)
Pull
Image
Deploy
Talisman
How To Start DevSecOps?
1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple
as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are
in doubt about the process or toolchain.
2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then
decide if the change is good or bad.
3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance,
including obtaining proof of compliance with GDPR, PCI, etc.).
4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly.
5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are
being responded to and patched.
6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other
security skills.
Conclusion
● I think that every company/Security Engineers must make an effort to
"Shift-Left" to a DevSecOps culture or methodologies and come up with a
multidisciplinary security team.
● Approaching "Security As a Code", moving security practices to the left and
educating software developers on critical testing and security practices are
essential aspects to engage security as part of the DevOps process.
● The key is to be ready to start, to encourage experimentation, to be willing
to fail, to learn and to move forward one step at a time.
Question &
Answer
“If you don’t ask, you will never get
the answer.”

More Related Content

What's hot (20)

PPTX
DevSecOps outline
Nickleus Jimenez
 
PPTX
Integrate Security into DevOps - SecDevOps
Ulf Mattsson
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PDF
DevSecOps | DevOps Sec
Rubal Jain
 
PDF
Veracode Automation CLI (using Jenkins for SDL integration)
Dinis Cruz
 
PPTX
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries
 
PDF
A Successful SAST Tool Implementation
Checkmarx
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
Integrating security into Continuous Delivery
Tom Stiehm
 
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PDF
Dev seccon london 2016 intelliment security
DevSecCon
 
PPTX
How to Get Started with DevSecOps
CYBRIC
 
PDF
Integrating DevOps and Security
Stijn Muylle
 
PPTX
Application Security Logging with Splunk using Java
Robert Grupe, CSSLP CISSP PE PMP
 
PPTX
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
PPTX
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Suman Sourav
 
PPTX
Dev Breakfast: Level up to DevSecOps
kieranjacobsen
 
PPTX
DevSecOps in 10 minutes
kieranjacobsen
 
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
DevSecOps outline
Nickleus Jimenez
 
Integrate Security into DevOps - SecDevOps
Ulf Mattsson
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
DevSecOps | DevOps Sec
Rubal Jain
 
Veracode Automation CLI (using Jenkins for SDL integration)
Dinis Cruz
 
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries
 
A Successful SAST Tool Implementation
Checkmarx
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
Integrating security into Continuous Delivery
Tom Stiehm
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
Demystifying DevSecOps
Archana Joshi
 
Dev seccon london 2016 intelliment security
DevSecCon
 
How to Get Started with DevSecOps
CYBRIC
 
Integrating DevOps and Security
Stijn Muylle
 
Application Security Logging with Splunk using Java
Robert Grupe, CSSLP CISSP PE PMP
 
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Suman Sourav
 
Dev Breakfast: Level up to DevSecOps
kieranjacobsen
 
DevSecOps in 10 minutes
kieranjacobsen
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 

Similar to Why Security Engineer Need Shift-Left to DevSecOps? (20)

PPTX
DevSecOps: Integrating Security Into Your SDLC
Dev Software
 
PDF
Why You Should Implement DevSecOps Approach?
Enov8
 
PPTX
Why You Should Implement DevSecOps Approach?
Enov8
 
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
PDF
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
PDF
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
MobibizIndia1
 
PDF
_Best practices towards a well-polished DevSecOps environment (1).pdf
Enov8
 
PDF
DevOps and Devsecops- Everything you need to know.
Techugo
 
PDF
DevOps and Devsecops- What are the Differences.
Techugo
 
PDF
DevOps and Devsecops.pdf
Techugo
 
PDF
How To Implement DevSecOps In Your Existing DevOps Workflow
Enov8
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
DOCX
Shift Left Save Resources DevSecOps and the CICD Pipeline
CloudZenix LLC
 
PPTX
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
PDF
All About Intelligent Orchestration :The Future of DevSecOps.pdf
Enov8
 
PPTX
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
PPTX
DevOps Security: How to Secure Your Software Development and Delivery
Dev Software
 
PDF
DevSecOps Security: Is it Necessary?
Enov8
 
PPTX
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
Dev Software
 
DevSecOps: Integrating Security Into Your SDLC
Dev Software
 
Why You Should Implement DevSecOps Approach?
Enov8
 
Why You Should Implement DevSecOps Approach?
Enov8
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
MobibizIndia1
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
Enov8
 
DevOps and Devsecops- Everything you need to know.
Techugo
 
DevOps and Devsecops- What are the Differences.
Techugo
 
DevOps and Devsecops.pdf
Techugo
 
How To Implement DevSecOps In Your Existing DevOps Workflow
Enov8
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
CloudZenix LLC
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
Enov8
 
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
DevOps Security: How to Secure Your Software Development and Delivery
Dev Software
 
DevSecOps Security: Is it Necessary?
Enov8
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
Dev Software
 
Ad

Recently uploaded (20)

PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
Next level data operations using Power Automate magic
Andries den Haan
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PPTX
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
Next level data operations using Power Automate magic
Andries den Haan
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
Practical Applications of AI in Local Government
OnBoard
 
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Ad

Why Security Engineer Need Shift-Left to DevSecOps?

  • 1. Why Security Engineers Need to Shift-Left to DevSecOps Najib Radzuan
  • 3. About Me Najib Radzuan ● He was a Developer ● He became IT Operations ● Finally become DevOps Engineer/ DevOps Leader / DevOps Institute Ambassador ● He is also a certified DevOps Leader, DevSecOps Professional , Azure DevOps Expert, & etc. ● Founder of DevOps4Me @devops4me @najibradzuan blog.devops4me.com
  • 4. The Pitfall: Security & Compliance Company ● Failure to recognise cybersecurity basics ● Lack of Cybersecurity Policy ● Not enough IT Security Management Application Developer ● Uses Open-Source library which has a lot of security bug risks ● They don't have formal Application security training. ● Lacks a recovery plan for vulnerability risks. AppSec / InfoSec Eng. ● Not involved in product design/development ● The last person to handle security and compliance issues ● Cannot compete with Agility and Speed of DevOps team. ● DevSecOps also added to the pain due lack of CI/CD knowledge
  • 5. Traditional Security Testing Plan Code Build Test Release Deploy Operate Monitor Security Testing The Pitfall ● A code review or penetration test it's conducted to find security flaws in the application at last Stage/Production environment. Your Developer might redo to eliminate the vulnerability. ● Bug/issue found when the project deadline is near or last-minute = project delayed ● Sometimes a bug/vulnerability is found by the client or external pentester Question: Do we expect all Developers to do security testing and do not make mistakes?
  • 6. Solution DevSecOps & Shift-Left Approach ● Shifting left lets us deal with security issues early and often ● So shifting left reduces risk and the costs of fixing security issues.
  • 7. DevSecOps DevSecOps is a modern model that provides that everyone in the team is responsible for security implementation in the application, from planning , design , development, QA / Testing to release, and in a production environment. Development Quality Assurance IT Operation Security DevSecOps
  • 8. DevSecOps Benefit ● Cost-saving is accomplish by identifying and addressing security vulnerabilities during the development process, which also improves the speed of delivery. ● It Improved overall security by reducing vulnerabilities, reducing insecure defaults and increasing code coverage and automation by the use of Infrastructure as Code (IaC). ● Everyone is responsible for security. DevSecOps fosters a culture of transparency and accountability from the earliest stages of development. ● With help of DevSecOps, we are keeping up-to-date with the rapid creativity common to cybercrime by effectively managing security auditing, monitoring and notification systems.
  • 9. DevSecOps Practice Practice Secure CodingEmbrace AutomationShift-LeftPeople Process - Neutralize senior management mindset in order for DevSecOps' strategy to be embraced. - Security specialists or “Security Champions” will play a key role in getting your DevSecOps journey right. - Training developers on how to develop secure code are important to note. - Until now, developer teams may have not prioritized this because the coding is the priority. However, security needs to be made aware of security-related facts in DevOps culture. - The obvious advantage of doing this is that you can recognise possible vulnerabilities and work to fix them faster. - The faster you notice any bugs, the cheaper it will be for you to fix them. - Automation is a key feature of DevSecOps to match the speed of security with your product delivery in a CI / CD environment, security automation is a must. - Choosing and continuing learning with the right security automation tool is key to the success of your company's products. - In general, different teams within an organization execute various tasks, with DevSecOps, everyone works on commonly agreed-upon processes and executing them to strengthen the extent of security in development.
  • 10. DevSecOps Approach Pre-Commit Hooks IDE Plugin Developer Secrets Management Source Code - Software Composition Analysis (SCA) -Static Analysis Security Test (SAST) Pre-Build -Dynamic Analysis Security Test (DAST) Post-Build Continuous Integration (CI) Tool/Server - Defect Management - Security Metric -Artifact Security Scan Artifact -Compliance As a Code (CaC) - Inspec by Chef - Alert & Monitoring Production Vulnerability Management
  • 11. DevSecOps Tools of the Trade Developer Source Code Pre-Build Post-Build Continuous Integration (CI) Tool/Server Vulnerability Management Artifact Production **Above just an example, we don’t endorse any tool. Retire.js
  • 12. Example of DevSecOps Workflow Push Code Source Code Management Developer Pull Request Scan Pull Request Creation Complete Branch Scan Trigger Build CI/CD Tool / Server 1 2 3 Build Solution Software Analysis (SCA) & Static Security Scan (SAST) Artifact / Image 4 Test Staging ProductionTrigger Release Release Management Pre-Approval Deployment to Environment 5 6 Dynamic Security Scan (DAST) Dynamic Security Scan (DAST) Pull Image Deploy Talisman
  • 13. How To Start DevSecOps? 1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are in doubt about the process or toolchain. 2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then decide if the change is good or bad. 3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance, including obtaining proof of compliance with GDPR, PCI, etc.). 4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly. 5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are being responded to and patched. 6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other security skills.
  • 14. Conclusion ● I think that every company/Security Engineers must make an effort to "Shift-Left" to a DevSecOps culture or methodologies and come up with a multidisciplinary security team. ● Approaching "Security As a Code", moving security practices to the left and educating software developers on critical testing and security practices are essential aspects to engage security as part of the DevOps process. ● The key is to be ready to start, to encourage experimentation, to be willing to fail, to learn and to move forward one step at a time.
  • 15. Question & Answer “If you don’t ask, you will never get the answer.”