SlideShare une entreprise Scribd logo
1  sur  16
DevSecOps at Scale
Priyanka Raghavan
About me
• Security Architect at Maersk
• MS in Software Engg from CMU
• Over 15 years of Software Development experience playing
roles as Developer, Team Lead, Product Architect and
Security Architect
• Proud mother of two boys
• Love learning and Open source.
• Generally suspicious of everything
• @Priyankarags on twitter
Priyanka Raghavan
Agenda
Motivation
State of system vs Target state
DevSecops in practice
Challenges
Conclusions
3
Motivations
4
Secure by
Design/Agile
Software
Architecture
.
Moving security to
the left (earlier in
product
development)
Get continuous
feedback/ iterative
development
Security is shared
responsibility. It’s
owned by product
team and also
security
organization.
State of System
• Not many teams define Security Requirements in
backlog
• Security not built into Design
• Security moved to the end (Pen testing/working
off checklist)
• Pockets of excellence with teams using their own
tools for secure development
• Perceived lack of community support groups to
help with secure development. Teams perceive
security as “hard to do”.
• 16 agile teams, 71 pipelines, different
technology stacks, microservices architecture,
4 months to code freeze and 1 security
Architect
• No existing tools used for security testing
Target State
Priyanka Raghavan
5
• Security Requirements in placed in Azure DevOps
• “Secure by Design” is not a mantra but followed
by doing threat modeling as group exercise
• Security moved to the left/ starts earlier.
• Build security into Devops
• Use tools that are easy to adopt and scale
• Shared responsibility
• Security not a burden and easy to adopt. Build culture
around security
• Logs are sent to SOC for monitoring
DevSecOps in practice- Where did I
start?
• OWASP resources to start
• OWASP top 10
• OWASP cheat sheet
• OWASP security headers education https://owasp.org/www-
project-secure-headers/
• ZAP, Sonar with Security profile
• Open source tooling(Vandana’s talk
https://www.youtube.com/watch?v=cD3-1rb_HNM)
• https://www.redhat.com/en/topics/devops/what-is-devsecops
DevSecOps in practice- Where did I
start?
• Created a wiki and started
exercise of educating teams
• Joined a security champions forum
• Prototype of running open source
security tooling in Jenkins, argo
and Azure DevOps
DevSecOps in
practice
Collect Security Requirements (Tags in ADO)
Threat Modeling (Owasp Threat Dragon, Microsoft threat modeling, whiteboard)
SAST (Static Application Security Testing- SonarQube with Security Profile)
DAST (Dynamic Application Security Testing- ZAP)
Third party open source monitoring/ Container scanning( whitesource/twistlock
and Azure standard security monitoring)
Mandatory http security header checking(HSTS, Content security policy, XSS,
Xframe option, Xcontent no-sniff)
SSL site certificate checker (Qualys SSL labs)
Logging and monitoring (Send ASC logs to SOC, Datadog)
Penetration testing (Manual testing)
Priyanka Raghavan 8
DevSecOps in Practice
• Get integrated with teams
and participate in
Architectural discussions
• Security during design
whiteboarding
• 7 out of 10 steps can be
automated in pipeline
• Build DevSecOps template
and store it in repos
Priyanka Raghavan 9
DevSecOps in Practice
• Knowledge share with security
warriors
• Create confluence wiki to
share information
• Compliance through
dashboards
• Tips and Tricks to solve
vulnerabilities.
• Create Squads to help teams
learn from each other
• Keep pushing security agenda
with upper management
• Training for Developers and
Agile teams
Priyanka Raghavan 10
DevSecOps in Practice
Priyanka Raghavan 11
Priyanka Raghavan 12
DevSecOps in Practice
• Breaking the build
• Issues in the pipeline reported on Azure
DevOps
Priyanka Raghavan 13
• Track Security requirements and work
items in Azure DevOps
DevSecOps in Practice
Challenges so far..
Getting a seat at
the table on
Design
discussions
Getting time for
”Security debt”
in the backlog
Aligning teams
to discuss
technology
stacks and
versions (Third
party
vulnerabilities)
Using same version
of .Net, Java, Reactjs
Finding
volunteers to fix
bugs and share
knowledge with
teams
Follow same
pattern for
Authentication
and
Authorization
across APIs
(How to
generate JWT
tokens for easy
testing)
Reducing build
wait times on
agents.
(Scheduling
chron jobs)
Monitoring
alerts from
Cloud providers
Configuring
DAST(ZAP)
across projects
for different
needs, different
authentication
methods
Lessons Learnt
15
Process
Engineering Enablement
Security Operations
Non-functional squad to drive
agenda
Exchange of knowledge and
resources to scale and adopt
process.
Security Debt is seen as
important item
Security Templates to enable
CI/CD.
Build examples of how to use
popular tools and benefits
Facilitate discussions between
architects and teams.
Make friends with
Developers
Dashboards to monitor
progress
Monitor alerts on
non-prod and prod.
Audit logging for
forensics
Good communication
between SOC and
teams
Thanks!

Contenu connexe

Tendances

Tendances (20)

Talk DevSecOps to me
Talk DevSecOps to meTalk DevSecOps to me
Talk DevSecOps to me
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Automating Security Compliance on AWS with DevSecOps
Automating Security Compliance on AWS with DevSecOpsAutomating Security Compliance on AWS with DevSecOps
Automating Security Compliance on AWS with DevSecOps
 
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
 
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
 
DevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf HadiwinataDevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf Hadiwinata
 
DevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security SuccessDevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security Success
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelines
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Security Testing for Containerized Applications
Security Testing for Containerized ApplicationsSecurity Testing for Containerized Applications
Security Testing for Containerized Applications
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 

Similaire à DevSecOps OWASP

Similaire à DevSecOps OWASP (20)

DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Introduction to DevSecOps OWASP Ahmedabad
Introduction to DevSecOps OWASP AhmedabadIntroduction to DevSecOps OWASP Ahmedabad
Introduction to DevSecOps OWASP Ahmedabad
 
HouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchHouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from Scratch
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
devsecops-reference-architectures-2018.pdf
devsecops-reference-architectures-2018.pdfdevsecops-reference-architectures-2018.pdf
devsecops-reference-architectures-2018.pdf
 
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien Harisen
 
Enterprise Devsecops
Enterprise DevsecopsEnterprise Devsecops
Enterprise Devsecops
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 

Dernier

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 

DevSecOps OWASP

  • 2. About me • Security Architect at Maersk • MS in Software Engg from CMU • Over 15 years of Software Development experience playing roles as Developer, Team Lead, Product Architect and Security Architect • Proud mother of two boys • Love learning and Open source. • Generally suspicious of everything • @Priyankarags on twitter
  • 3. Priyanka Raghavan Agenda Motivation State of system vs Target state DevSecops in practice Challenges Conclusions 3
  • 4. Motivations 4 Secure by Design/Agile Software Architecture . Moving security to the left (earlier in product development) Get continuous feedback/ iterative development Security is shared responsibility. It’s owned by product team and also security organization.
  • 5. State of System • Not many teams define Security Requirements in backlog • Security not built into Design • Security moved to the end (Pen testing/working off checklist) • Pockets of excellence with teams using their own tools for secure development • Perceived lack of community support groups to help with secure development. Teams perceive security as “hard to do”. • 16 agile teams, 71 pipelines, different technology stacks, microservices architecture, 4 months to code freeze and 1 security Architect • No existing tools used for security testing Target State Priyanka Raghavan 5 • Security Requirements in placed in Azure DevOps • “Secure by Design” is not a mantra but followed by doing threat modeling as group exercise • Security moved to the left/ starts earlier. • Build security into Devops • Use tools that are easy to adopt and scale • Shared responsibility • Security not a burden and easy to adopt. Build culture around security • Logs are sent to SOC for monitoring
  • 6. DevSecOps in practice- Where did I start? • OWASP resources to start • OWASP top 10 • OWASP cheat sheet • OWASP security headers education https://owasp.org/www- project-secure-headers/ • ZAP, Sonar with Security profile • Open source tooling(Vandana’s talk https://www.youtube.com/watch?v=cD3-1rb_HNM) • https://www.redhat.com/en/topics/devops/what-is-devsecops
  • 7. DevSecOps in practice- Where did I start? • Created a wiki and started exercise of educating teams • Joined a security champions forum • Prototype of running open source security tooling in Jenkins, argo and Azure DevOps
  • 8. DevSecOps in practice Collect Security Requirements (Tags in ADO) Threat Modeling (Owasp Threat Dragon, Microsoft threat modeling, whiteboard) SAST (Static Application Security Testing- SonarQube with Security Profile) DAST (Dynamic Application Security Testing- ZAP) Third party open source monitoring/ Container scanning( whitesource/twistlock and Azure standard security monitoring) Mandatory http security header checking(HSTS, Content security policy, XSS, Xframe option, Xcontent no-sniff) SSL site certificate checker (Qualys SSL labs) Logging and monitoring (Send ASC logs to SOC, Datadog) Penetration testing (Manual testing) Priyanka Raghavan 8
  • 9. DevSecOps in Practice • Get integrated with teams and participate in Architectural discussions • Security during design whiteboarding • 7 out of 10 steps can be automated in pipeline • Build DevSecOps template and store it in repos Priyanka Raghavan 9
  • 10. DevSecOps in Practice • Knowledge share with security warriors • Create confluence wiki to share information • Compliance through dashboards • Tips and Tricks to solve vulnerabilities. • Create Squads to help teams learn from each other • Keep pushing security agenda with upper management • Training for Developers and Agile teams Priyanka Raghavan 10
  • 12. Priyanka Raghavan 12 DevSecOps in Practice • Breaking the build • Issues in the pipeline reported on Azure DevOps
  • 13. Priyanka Raghavan 13 • Track Security requirements and work items in Azure DevOps DevSecOps in Practice
  • 14. Challenges so far.. Getting a seat at the table on Design discussions Getting time for ”Security debt” in the backlog Aligning teams to discuss technology stacks and versions (Third party vulnerabilities) Using same version of .Net, Java, Reactjs Finding volunteers to fix bugs and share knowledge with teams Follow same pattern for Authentication and Authorization across APIs (How to generate JWT tokens for easy testing) Reducing build wait times on agents. (Scheduling chron jobs) Monitoring alerts from Cloud providers Configuring DAST(ZAP) across projects for different needs, different authentication methods
  • 15. Lessons Learnt 15 Process Engineering Enablement Security Operations Non-functional squad to drive agenda Exchange of knowledge and resources to scale and adopt process. Security Debt is seen as important item Security Templates to enable CI/CD. Build examples of how to use popular tools and benefits Facilitate discussions between architects and teams. Make friends with Developers Dashboards to monitor progress Monitor alerts on non-prod and prod. Audit logging for forensics Good communication between SOC and teams