SlideShare une entreprise Scribd logo
1  sur  19
Demonstrating
Benefits of DevSecOps
for Secure Code and Operations
Finto Thomas
Event : 8th Dec 2020 - GISEC 2020 - Dubai
Finto Thomas
Cybersecurity Architect and Strategist
• 15 Years in IT and Information Security domains across multiple industries
• Presently at Alef Education and Leading Information Security function
• Previously worked at IBM and Wipro, across multiple geo locations
• Key Certifications: CISSP, SABSA, TOGAF, CISM, SANS-GSTRT
Connect with me @FintoNT LinkedIn
Disclaimer : The views expressed in these slides are my own. They do not represent the position of my
current and past employers
@FintoNT 2#GISEC 2020
Topics Covered
• Embedding Security into DevOps
• Benefits and Constraints
• Key Takeaways
#GISEC 2020 @FintoNT 3
Before we get in to DevSecOps – Let us see how DevOps works
#GISEC 2020 @FintoNT 4
Developer Source Code
Repository
Build CI/CD Server
QA
Staging
Production
& Monitor
✗
Instant Feedback
DevOps + Security = DevSecOps
#GISEC 2020 @FintoNT 5
✓
Start End
Build
✓
Artifactory
Deploy
✓
Staging
Setup
✓
Staging Deploy
✓
Production
Deploy
✓
UAT
✓
Start End
Build
✓
Artifactory
Deploy
✓
Staging
Setup
✓
Staging Deploy
Production
Deploy
✓
UAT
✓
SCA
✓
SAST
✓
DAST
✓
Infrastructure
Vul Scan
✓
Production
Setup
✓
Production
Setup
✓
Compliance
Check
✓
Production
Approval
✓
Production
Approval
✓✗
Instant Feedback
SCA – 600 Alerts
SAST – 1000 Alerts (false positive included)
DAST – 5 Alerts
DevOps
DevSecOps
DevOps Pipeline
#GISEC 2020 @FintoNT 6
Plan Code Build Test Release Deploy Operate Monitor
Design Sprint
define Use Case
Prioritization
Stakeholders
Code
Development
Source Code
Management
Review &
Merging
Continues
Integration
Build Status
Packaging
Artifact
Repository
Pre deployment
Staging
Provisioning
Infrastructure
Orchestration
Configuration Management
Performance
Monitoring
Application
Monitoring
Alerting
Continues Test
Feedback
UAT
DevSecOps Phases mapped to type of security tools
#GISEC 2020 @FintoNT 7
Plan Code Build Test Release Deploy Operate Monitor
IDE Plugin
Pre Commit
hooks
Secrets
Management
SAST
SCA
Feedback on business Risk
DevSecOps - CI CD Pipeline
Threat Modeling
Security Use
Case
Prioritization
Regulations
Policies
Container
Security
System
Hardening
DAST
Compliance
Web Application
Firewall
Vulnerability
Management
PAM
Security function benefits from DevSecOps
#GISEC 2020 @FintoNT 8
Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge
1. Shift Left – Security is baked-in in early stages
2. Products have inbuilt security controls – Robust , Secure products to market
3. Less vulnerable product – Build test will fail automatically while developer “commit” (save) the code
4. Security is everyone's responsibility – Better collaboration among the whole app development chain
5. High Returns on security Investment – Early detection and remediation save effort and time
Developers benefits from DevSecOps
#GISEC 2020 @FintoNT 9
Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge
1. Instant feedback - Developers getting faster feed back on security tests and use cases (~5 mints)
2. No more surprises from Security reports – Security is a part of pipeline and transparent to all
3. Better Security awareness and collaboration – One Team + One agenda + One delivery
Operational benefits from DevSecOps
#GISEC 2020 @FintoNT 10
Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge
1. Early detection and prevention systems – Security threats and Incidents can be identified early stages of pipeline
2. Easy to fix production issues– Isolate it with out production impact
3. Expectations are more clear and simple – Compliance , Hardening etc are established in early stages as “user
stories”
4. Automation reduces Ops team effort from security maintenance – repeatable remediation steps can be automated
Key constraints
#GISEC 2020 @FintoNT 11
1. Asset/Service Inventory, tracking and billing – Orphan and testing containers and systems
2. Identity and Access Management - Hardcoded and decentralized credentials
3. High Cost of Enterprise Tools & limitations – Language specific , Cloud licensing need attention
4. Skill shortage on DevSecOps – Market adoption still in early stages
5. Adoption of new mindset and tools – Definition of perimeter changes and it is no more traditional
DevSecOps =
#GISEC 2020 @FintoNT 12
New Culture + New Skills + Automation
People
ProcessTools
Scalable
Culture
Innovation
Skills
Speed
Automation
Success
DevSecOps
Methodologies and Culture
#GISEC 2020 @FintoNT 13
1. Embrace Developers with right tools and advises, find Security tools that Developers will actually use
2. Security needs to adopt Agile – Sprint models and process that’s fit for new environments. Automation is key.
3. Identify and eliminate the Risk early as possible in the workflow with relevant prioritizations and trade-offs
Peoples and Skills
#GISEC 2020 @FintoNT 14
Zero Trust
3. Collaborate on Problem solving, avoid blame game
1. Build Personal Trust and break silos
2. Encourage Security mindsets and Security champions with relevant trainings and incentive programs
Tools and Technologies
#GISEC 2020 @FintoNT 15
3. Traditional Security tools often do not work with new environment
2. Traditional Security solutions are logically valuable, but need to adopt with new environment
1. Adopt new programable tools, which Developers really use, Security team role is advisory and enablers
Maturity Assessment
#GISEC 2020 @FintoNT 16
https://www.slideshare.net/derweeksglobal/abn-amro-devsecops-journey
1. OWASP 2. ABN AMRO Model (level 5)
https://owasp.org/www-project-devsecops-maturity-model/
Key Takeaways
Technology and Tools Process and Methodologies People and Skills
#GISEC 2020 @FintoNT 17
DevSecOps = New Culture + New Skills + Automation
Bake in Security into DevOps flow,
do not try to bolt security later
Security control must be
programable and automated
wherever possible
Keep an eye on simpler and better
programable options
Use tools and methods that
developer team actually use
Adopt Agile and lean methods
Involve security as early as possible
in the workflow and best to do at
design & planning phase
Fix by priorities, do not attempt to
fix it all
DevSecOps feedback process must
be smooth and governed
Metric and KPI needs to relevant
and easy to generate
Build personal relations and trust
Break silos; do not isolate
Identify and nurture “security
champions” in each team
Focus on problem and solution; Do
not blame the person or team
Conduct short and repeatable
training sessions and training
videos
External Documents referred
• https://www.blackhat.com/docs/us-17/thursday/us-17-Lackey-Practical%20Tips-for-Defending-Web-Applications-in-the-Age-
of-DevOps.pdf
• https://dzone.com/articles/effective-devsecops
• https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Shrivastava-DevSecOps.pdf
• https://www.sonatype.com/hubfs/2018%20State%20of%20the%20Software%20Supply%20Chain%20Report.pdf
• https://www.veracode.com/state-of-software-security-report#snap__subnav_51096
• https://docs.aws.amazon.com/whitepapers/latest/introduction-devops-aws/two-pizza-teams.html
• https://www.infoq.com/presentations/devsecops-2019/
• https://owasp.org/www-project-devsecops-maturity-model/
#GISEC 2020 @FintoNT 18
#GISEC 2020 @FintoNT 19

Contenu connexe

Tendances

Tendances (20)

DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfianto
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 

Similaire à Benefits of DevSecOps

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 

Similaire à Benefits of DevSecOps (20)

RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 

Plus de Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS (9)

Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Deception ey
Deception ey Deception ey
Deception ey
 
Threathunting v0.1
Threathunting v0.1Threathunting v0.1
Threathunting v0.1
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Vulnerability manager v1.0
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
 
Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Idps technology starter v2.0
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 

Dernier

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Dernier (20)

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

Benefits of DevSecOps

  • 1. Demonstrating Benefits of DevSecOps for Secure Code and Operations Finto Thomas Event : 8th Dec 2020 - GISEC 2020 - Dubai
  • 2. Finto Thomas Cybersecurity Architect and Strategist • 15 Years in IT and Information Security domains across multiple industries • Presently at Alef Education and Leading Information Security function • Previously worked at IBM and Wipro, across multiple geo locations • Key Certifications: CISSP, SABSA, TOGAF, CISM, SANS-GSTRT Connect with me @FintoNT LinkedIn Disclaimer : The views expressed in these slides are my own. They do not represent the position of my current and past employers @FintoNT 2#GISEC 2020
  • 3. Topics Covered • Embedding Security into DevOps • Benefits and Constraints • Key Takeaways #GISEC 2020 @FintoNT 3
  • 4. Before we get in to DevSecOps – Let us see how DevOps works #GISEC 2020 @FintoNT 4 Developer Source Code Repository Build CI/CD Server QA Staging Production & Monitor ✗ Instant Feedback
  • 5. DevOps + Security = DevSecOps #GISEC 2020 @FintoNT 5 ✓ Start End Build ✓ Artifactory Deploy ✓ Staging Setup ✓ Staging Deploy ✓ Production Deploy ✓ UAT ✓ Start End Build ✓ Artifactory Deploy ✓ Staging Setup ✓ Staging Deploy Production Deploy ✓ UAT ✓ SCA ✓ SAST ✓ DAST ✓ Infrastructure Vul Scan ✓ Production Setup ✓ Production Setup ✓ Compliance Check ✓ Production Approval ✓ Production Approval ✓✗ Instant Feedback SCA – 600 Alerts SAST – 1000 Alerts (false positive included) DAST – 5 Alerts DevOps DevSecOps
  • 6. DevOps Pipeline #GISEC 2020 @FintoNT 6 Plan Code Build Test Release Deploy Operate Monitor Design Sprint define Use Case Prioritization Stakeholders Code Development Source Code Management Review & Merging Continues Integration Build Status Packaging Artifact Repository Pre deployment Staging Provisioning Infrastructure Orchestration Configuration Management Performance Monitoring Application Monitoring Alerting Continues Test Feedback UAT
  • 7. DevSecOps Phases mapped to type of security tools #GISEC 2020 @FintoNT 7 Plan Code Build Test Release Deploy Operate Monitor IDE Plugin Pre Commit hooks Secrets Management SAST SCA Feedback on business Risk DevSecOps - CI CD Pipeline Threat Modeling Security Use Case Prioritization Regulations Policies Container Security System Hardening DAST Compliance Web Application Firewall Vulnerability Management PAM
  • 8. Security function benefits from DevSecOps #GISEC 2020 @FintoNT 8 Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge 1. Shift Left – Security is baked-in in early stages 2. Products have inbuilt security controls – Robust , Secure products to market 3. Less vulnerable product – Build test will fail automatically while developer “commit” (save) the code 4. Security is everyone's responsibility – Better collaboration among the whole app development chain 5. High Returns on security Investment – Early detection and remediation save effort and time
  • 9. Developers benefits from DevSecOps #GISEC 2020 @FintoNT 9 Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge 1. Instant feedback - Developers getting faster feed back on security tests and use cases (~5 mints) 2. No more surprises from Security reports – Security is a part of pipeline and transparent to all 3. Better Security awareness and collaboration – One Team + One agenda + One delivery
  • 10. Operational benefits from DevSecOps #GISEC 2020 @FintoNT 10 Rapid Business value delivery Rapid user feedback Scalable and Auto SizingFast to Market, Market Edge 1. Early detection and prevention systems – Security threats and Incidents can be identified early stages of pipeline 2. Easy to fix production issues– Isolate it with out production impact 3. Expectations are more clear and simple – Compliance , Hardening etc are established in early stages as “user stories” 4. Automation reduces Ops team effort from security maintenance – repeatable remediation steps can be automated
  • 11. Key constraints #GISEC 2020 @FintoNT 11 1. Asset/Service Inventory, tracking and billing – Orphan and testing containers and systems 2. Identity and Access Management - Hardcoded and decentralized credentials 3. High Cost of Enterprise Tools & limitations – Language specific , Cloud licensing need attention 4. Skill shortage on DevSecOps – Market adoption still in early stages 5. Adoption of new mindset and tools – Definition of perimeter changes and it is no more traditional
  • 12. DevSecOps = #GISEC 2020 @FintoNT 12 New Culture + New Skills + Automation People ProcessTools Scalable Culture Innovation Skills Speed Automation Success DevSecOps
  • 13. Methodologies and Culture #GISEC 2020 @FintoNT 13 1. Embrace Developers with right tools and advises, find Security tools that Developers will actually use 2. Security needs to adopt Agile – Sprint models and process that’s fit for new environments. Automation is key. 3. Identify and eliminate the Risk early as possible in the workflow with relevant prioritizations and trade-offs
  • 14. Peoples and Skills #GISEC 2020 @FintoNT 14 Zero Trust 3. Collaborate on Problem solving, avoid blame game 1. Build Personal Trust and break silos 2. Encourage Security mindsets and Security champions with relevant trainings and incentive programs
  • 15. Tools and Technologies #GISEC 2020 @FintoNT 15 3. Traditional Security tools often do not work with new environment 2. Traditional Security solutions are logically valuable, but need to adopt with new environment 1. Adopt new programable tools, which Developers really use, Security team role is advisory and enablers
  • 16. Maturity Assessment #GISEC 2020 @FintoNT 16 https://www.slideshare.net/derweeksglobal/abn-amro-devsecops-journey 1. OWASP 2. ABN AMRO Model (level 5) https://owasp.org/www-project-devsecops-maturity-model/
  • 17. Key Takeaways Technology and Tools Process and Methodologies People and Skills #GISEC 2020 @FintoNT 17 DevSecOps = New Culture + New Skills + Automation Bake in Security into DevOps flow, do not try to bolt security later Security control must be programable and automated wherever possible Keep an eye on simpler and better programable options Use tools and methods that developer team actually use Adopt Agile and lean methods Involve security as early as possible in the workflow and best to do at design & planning phase Fix by priorities, do not attempt to fix it all DevSecOps feedback process must be smooth and governed Metric and KPI needs to relevant and easy to generate Build personal relations and trust Break silos; do not isolate Identify and nurture “security champions” in each team Focus on problem and solution; Do not blame the person or team Conduct short and repeatable training sessions and training videos
  • 18. External Documents referred • https://www.blackhat.com/docs/us-17/thursday/us-17-Lackey-Practical%20Tips-for-Defending-Web-Applications-in-the-Age- of-DevOps.pdf • https://dzone.com/articles/effective-devsecops • https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Shrivastava-DevSecOps.pdf • https://www.sonatype.com/hubfs/2018%20State%20of%20the%20Software%20Supply%20Chain%20Report.pdf • https://www.veracode.com/state-of-software-security-report#snap__subnav_51096 • https://docs.aws.amazon.com/whitepapers/latest/introduction-devops-aws/two-pizza-teams.html • https://www.infoq.com/presentations/devsecops-2019/ • https://owasp.org/www-project-devsecops-maturity-model/ #GISEC 2020 @FintoNT 18

Notes de l'éditeur

  1. Color change
  2. https://dzone.com/articles/effective-devsecops