SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
Requirements Gathering for a Successful
Rugged DevOps Implementation
Hasan	Yasar	|	Technical	Manager	|	
Software	Engineering	Institute	- CMU
Get	my	slides	immediately
community@alldaydevops.com
Copyright	2017	Carnegie	Mellon	University
This	material	is	based	upon	work	funded	and	supported	by	the	Department	of	Defense	under	Contract	No.	FA8721-05-C-0003	with	
Carnegie	Mellon	University	for	the	operation	of	the	Software	Engineering	Institute,	a	federally	funded	research	and	development	
center.
Any	opinions,	findings	and	conclusions	or	recommendations	expressed	in	this	material	are	those	of	the	author(s)	and	do	not	
necessarily	reflect	the	views	of	the	United	States	Department	of	Defense.
NO	WARRANTY.	THIS	CARNEGIE	MELLON	UNIVERSITY	AND	SOFTWARE	ENGINEERING	INSTITUTE	MATERIAL	IS	FURNISHED	ON	AN	
“AS-IS”	BASIS.	CARNEGIE	MELLON	UNIVERSITY	MAKES	NO	WARRANTIES	OF	ANY	KIND,	EITHER	EXPRESSED	OR	IMPLIED,	AS	TO	ANY	
MATTER	INCLUDING,	BUT	NOT	LIMITED	TO,	WARRANTY	OF	FITNESS	FOR	PURPOSE	OR	MERCHANTABILITY,	EXCLUSIVITY,	OR	
RESULTS	OBTAINED	FROM	USE	OF	THE	MATERIAL.	CARNEGIE	MELLON	UNIVERSITY	DOES	NOT	MAKE	ANY	WARRANTY	OF	ANY	KIND	
WITH	RESPECT	TO	FREEDOM	FROM	PATENT,	TRADEMARK,	OR	COPYRIGHT	INFRINGEMENT.
[Distribution	Statement	A]	This	material	has	been	approved	for	public	release	and	unlimited	distribution.	Please	see	Copyright	notice	
for	non-US	Government	use	and	distribution.
This	material	may	be	reproduced	in	its	entirety,	without	modification,	and	freely	distributed	in	written	or	electronic	form	without	
requesting	formal	permission.	Permission	is	required	for	any	other	use.	Requests	for	permission	should	be	directed	to	the	Software	
Engineering	Institute	at	permission@sei.cmu.edu .
Carnegie	Mellon® and CERT® are	registered	marks	of	Carnegie	Mellon	University.
DM-0004478
Topics
Background
Common	Pitfalls
Current	State	Assessment
Requirements	Analysis	and	evaluation
People,	Process,	Platform	
Automated	Integrated	Development		Pipeline
Background
• The	Software	Engineering	Institute	(SEI)	is	a	Federally	Funded	Research	and	
Development	Center	(FFRDC)	
• Research	and	practice	in	software	development,	acquisition,	and	
maintenance	practices	
• Assisted	numerous	government	organizations	in	modernizing	their	
software	development	practices	in	the	spirit	of	DevOps	principles.		
• Application	security	is	the	principle	quality	attribute	of	the	software	they	
produce.
Common	question
How	can	I	implemented		Rugged	DevOps	process		and	platform	in	my	
team/	directorate	/	project	/	organization	/unit	… ?
How	to	assess	the	current	state?
Where	are	the	productivity	bottlenecks?	
Whom	to	train	on	what?
What	and	how	to	measure?
How	to	monitor?
The	Rugged	Manifesto
I	am	rugged	and,	more	importantly,	my	code	is	rugged.
I	recognize	that	software has	become	a	foundation	of	our	modern	world.
I	recognize	the	awesome	responsibility that	comes	with	this	foundational	role.
I	recognize	that	my	code	will	be	used	in	ways	I	cannot	anticipate,	in	ways	it	was	not	designed,	and	for	longer	
than	it	was	ever	intended.
I	recognize	that	my	code	will	be	attacked	by	talented	and	persistent	adversaries who	threaten our	physical,	
economic	and	national	security.
I	recognize	these	things	– and	I	choose	to	be	rugged.
I	am	rugged	because	I	refuse	to	be	a	source	of	vulnerability	or	weakness.
I	am	rugged	because	I	assure	my	code	will	support	its	mission.
I	am	rugged	because	my	code	can	face	these	challenges	and	persist	in	spite	of	them.
I	am	rugged,	not	because	it	is	easy,	but	because	it	is	necessary and	I	am	up	for	the	challenge.
Topics
Background
Common	Pitfalls
Current	State	Assessment
Requirements	Analysis	and	evaluation
People,	Process,	Platform	
Automated	Integrated	Development		Pipeline
Common	Pitfalls
HELP!
What	went	wrong?
• DevOps	is	
– AFAD
– Only	about	tooling
– A	Product
– Only	about	Dev	and	Ops
– Same	for	all	orgs
– Only	continues	integration/deployment
– New	organizational	unit
Topics
Background
Common	Pitfalls
Current	State	Assessment
Requirements	Analysis	and	evaluation
People,	Process,	Platform	
Automated	Integrated	Development		Pipeline
Current	State	Assessment
• Interview	with	functional	leads	from	key	areas	related	
to	Application	Development.
• Review	of:
– Validation	of	statements	(e.g.,	through	observations	
of	the	work	environment	or	shadowing)
– Demonstrations	of	any	software	tools	used	for	
automation	of	software	development	and	
deployment
– Cultural	perspective	related	to	 development	
evolution	and	Security	team
– Legal,	Risk	Management	and	all	stakeholders
Assessment	Plan
1. Agree	on	definitions(DevOps,	DevSecOps)	and	process
2. Identify	stakeholders
3. Perform	interview	on	each	team
4. Identify	and	analyze	technical	tool	stack
5. Collect	key	metrics		and	establish	measurement
6. Identify	gap	areas	and		develop	a	roadmap
7. Select	suitable	project	to		implement:	Build	,	Learn,	evaluate
Assessment	Process
• Scheduling	an	interview	with	teams
• Anonymous	Survey
• Analyze		outcomes	
• Provide	feedback	to	the	teams
• Brief	 the	executive	team
Identify	Stakeholders
DevelopersDeployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional	
Requirements
Performance
Testing
User	Interface
Technical	
Documentation
Updates
Code	Review
Release	
Review
User	
Documentation
Data	Privacy
Intrusion	
Detection
User
Requirements
Business	Constraints
Legal	Issues
Market	Needs
Budgets	/	Timelines
Monitoring
Incident	response
IT	Operations
Deployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional	
Requirements
Performance
Testing
User	Interface
Technical	
Documentation
Updates
Code	Review
Release	
Review
User	
Documentation
Data	Privacy
Intrusion	
Detection
User
Requirements
Business	Constraints
Legal	Issues
Market	Needs
Budgets	/	Timelines
Monitoring
Incident	response
Quality	Assurance
Deployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional	
Requirements
Performance
Testing
User	Interface
Technical	
Documentation
Updates
Code	Review
Release	
Review
User	
Documentation
Data	Privacy
Intrusion	
Detection
User
Requirements
Business	Constraints
Legal	Issues
Market	Needs
Budgets	/	Timelines
Monitoring
Incident	response
Business	Analyst
Deployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional	
Requirements
Performance
Testing
User	Interface
Technical	
Documentation
Updates
Code	Review
Release	
Review
User	
Documentation
Data	Privacy
Intrusion	
Detection
User
Requirements
Business	Constraints
Legal	Issues
Market	Needs
Budgets	/	Timelines
Monitoring
Incident	response
Information	Security
Deployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional	
Requirements
Performance
Testing
User	Interface
Technical	
Documentation
Updates
Code	Review
Release	
Review
User	
Documentation
Data	Privacy
Intrusion	
Detection
User
Requirements
Business	Constraints
Legal	Issues
Market	Needs
Budgets	/	Timelines
Monitoring
Incident	response
Assessment	– Business	Analyst/	PM
• Requirements	development	&	management
• Acquisition	&	contracting	process
• Risk	management	process
• Compliances	requirements
• Project	Planning	and	tracking
Assessment	– Developer
• Development	methodology
– agile,	waterfall,	SAFe,	EP,	Lean,	or	cowboy	coding
• Development	environments
• Task	assignment/management	/	completion
• Collaboration	with	other	(internal/external)	teams
Assessment	– Quality	Assurance
• Software	testing	methodologies
• Software	{quality}	assurance
• Compliances	verification
• Audit	requirements
• Feedback	to	dev	team
Assessment	– Deployment	/Release
• Software	configuration	management
• Integration	process
• Software	verification	and	validation	process
• Software	review	and	audit	process
• Securing	 the	deployment	pipeline
Assessment	– IT	Operations
• Software	operational	process
• Team	engagement
• Policy	knowledge	management
• Assets	management
• IT	governance
• Service	management
• Audit	and	monitoring
Assessment	– Information	Security	
• Management	 and	auditing	supply	chain
• Security	controls
• Security	polices	(compliance	requirements)
• Application	security	testing
• Product	security	management	(PSIRT)
• Security	awareness	training	and	knowledge	management
Assessment	– Technology	Stack
• Development	language	and	tools
• IT	solution	stack
• Enterprise	support	services
• Legacy	systems
• Application	development	support	tools
• Software	reuse	process
• Accreditation	and	approval	process
Identify	Metrics	and	Measurement
• Software	metrics
• Quality	metrics
• Checkpoint	diagnostic
– Qualitative	process	baseline
– Quantitative	performance	baseline
– Benchmark	performance	comparison
• Define	end-goal	as	being	Rugged:	
What	that	means	to	all	stakeholders
Identify	 Suitable	Project
• Select	{new	or	existing}	project	as	pilot
– Most	stakeholders	involvement
– Minimize	risk	to	business
– Ability	learn/develop/	implement	security	in	the	process
– Scalable	to	the	organization
Topics
Background
Common	Pitfalls
Current	State	Assessment
Requirements	Analysis	and	Evaluation
People,	Process,	Platform	
Automated	Integrated	Development		Pipeline
Feedback	to	the	team
• Collaborate	all	team	leads		
• Share	identified	requirements
• Categorize	and	prioritize		the	
requirements	
• Collectively		develop	an		
implementation	plan:	
People+	Process+	Platform
People
• Heavy	collaboration	between		all	stakeholders
– Secure	Design	/	Architecture	decisions
– Secure	Environment	/	Network	configuration
– Secure	Deployment	planning
– Secure	Code	Review
• Constantly	available	open	communication	channels:
– Dev	and	OpSec together	in	all	project	decision	meeting
– Chat/e-mail/Wiki	services	available	to	all	team	
members
Process
• Establish	a	process to	enable	people to	succeed	
using	the		platform		to	develop	Rugged	
application
• Such	that;
• Constant	communication	and	visible	to	all
• Ensures	that	tasks	are	testable	and	
repeatable
• Frees	up	human	experts	to	do	challenging,	
creative	work
• Allows	tasks	to	be	performed	with	minimal	
effort	or	cost	
• Creates	confidence	in	task	success,	after	past	
repetitions
• Faster	deployment	,	frequent	quality	release
Platform
• Where	people use	process to	build	
rugged	software
• Automated	environment	creation	and	
provisioning
• Automated	infrastructure	testing
• Parity	between	Development,	QA,	Staging,	
and	Production	environments
• Sharing	and	versioning	of	environmental	
configurations
• Collaborative	environment	between	all	
stakeholders
Rugged	Continued	…	
• Culture	– NOT	a	tool,	SDLC,	or	org	
structure	
• Rugged	!=	Secure	- secure	is	only	an	
instant	in	time
• Proactive	security	is	better	than	reactive	
– Reactive	will	fail	eventually
Culture
Process	and	
Practices
System	and	Architecture
Automation	
and	
Measurement
Rugged	DevOps	on
Security Culture
• Developer and OpSec
collaborate
• Developers and OpSec
support releases beyond
deployment
• Dev and OpSec have access to
stakeholders who understand
business and mission goals
Security Automation /
Measurement
• Automate repetitive and error-
prone tasks (e.g., build, testing, and
deployment maintain consistent
environments)
• Static and dynamic security analysis
automation
• Performance dashboards
Security in Process and
Practices
• Secure Pipeline streamlining
• Continuous-delivery practices (e.g.,
continuous integration; test
automation; script-driven, automated
deployment; virtualized, self-service
environments)
Secure System and
Architecture
• Architected to support test
automation and continuous-
integration goals
• Applications that support changes
without release (e.g., late binding)
• Scalable, secure, reliable, etc.
Topics
Background
Common	Pitfalls
Current	State	Assessment
Requirements	Analysis	and	Evaluation
People,	Process,	Platform	
Automated	Integrated	Development		Pipeline
Continuous	Integration	(CI)	Model
Integration	and	
communication,	even	among	
tools,	is	the	key!
Human	actions/inputs	to	the	
software	development	process
Actions	performed	by	
autonomous	systems
Take	the	DevSecOps Survey
bit.ly/DevSecOps-2017
Our	sponsors	speak	your	language…	DevOps.
More	on	SEI	DevOps	Blog
https://insights.sei.cmu.edu/devops
Thank	You!
Hasan	Yasar
Technical	Manager,	
Secure	Lifecycle	Solutions	
hyasar@sei.cmu.edu
@securelifecycle
Web	Resources	(CERT/SEI)
http://www.cert.org/
http://www.sei.cmu.edu/

Contenu connexe

En vedette

Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...SeniorStoryteller
 
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanWhere Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanSeniorStoryteller
 
DevOps and IT security
DevOps and IT securityDevOps and IT security
DevOps and IT securitych.osme
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)Arjun Comar
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecurePuppet
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Application Security at DevOps Speed - DevOpsDays Singapore 2016Application Security at DevOps Speed - DevOpsDays Singapore 2016
Application Security at DevOps Speed - DevOpsDays Singapore 2016Stefan Streichsbier
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo Perforce
 
Innovate2014 Panel - Best Practices on Implementing Integrations
Innovate2014 Panel - Best Practices on Implementing IntegrationsInnovate2014 Panel - Best Practices on Implementing Integrations
Innovate2014 Panel - Best Practices on Implementing IntegrationsSteve Speicher
 
2016 - IGNITE - Real Heroes Draw Pictures
2016 - IGNITE - Real Heroes Draw Pictures2016 - IGNITE - Real Heroes Draw Pictures
2016 - IGNITE - Real Heroes Draw Picturesdevopsdaysaustin
 
Scrum in dev ops teams - Presentation from Scrum Gathering Bangalore
Scrum in dev ops teams - Presentation from Scrum Gathering BangaloreScrum in dev ops teams - Presentation from Scrum Gathering Bangalore
Scrum in dev ops teams - Presentation from Scrum Gathering BangaloreMirco Hering
 
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerHero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerSeniorStoryteller
 
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...Protectionandmanagement
 
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVGeneral Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVWAV Inc.
 

En vedette (20)

Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanWhere Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
 
DevOps and IT security
DevOps and IT securityDevOps and IT security
DevOps and IT security
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Application Security at DevOps Speed - DevOpsDays Singapore 2016Application Security at DevOps Speed - DevOpsDays Singapore 2016
Application Security at DevOps Speed - DevOpsDays Singapore 2016
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Evergent case study
Evergent case studyEvergent case study
Evergent case study
 
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
 
The R.O.A.D to DevOps
The R.O.A.D to DevOpsThe R.O.A.D to DevOps
The R.O.A.D to DevOps
 
Innovate2014 Panel - Best Practices on Implementing Integrations
Innovate2014 Panel - Best Practices on Implementing IntegrationsInnovate2014 Panel - Best Practices on Implementing Integrations
Innovate2014 Panel - Best Practices on Implementing Integrations
 
2016 - IGNITE - Real Heroes Draw Pictures
2016 - IGNITE - Real Heroes Draw Pictures2016 - IGNITE - Real Heroes Draw Pictures
2016 - IGNITE - Real Heroes Draw Pictures
 
Scrum in dev ops teams - Presentation from Scrum Gathering Bangalore
Scrum in dev ops teams - Presentation from Scrum Gathering BangaloreScrum in dev ops teams - Presentation from Scrum Gathering Bangalore
Scrum in dev ops teams - Presentation from Scrum Gathering Bangalore
 
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerHero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
 
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...
Introduction to the Institute of Car Fleet Management - Roddy Graham (ICFM) -...
 
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVGeneral Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
 

Similaire à Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan Yasar

Multi Security Checkpoints on DevOps Platform
Multi Security Checkpoints on DevOps PlatformMulti Security Checkpoints on DevOps Platform
Multi Security Checkpoints on DevOps PlatformSonatype
 
170330 cognitive systems institute speaker series mark sherman - watson pr...
170330 cognitive systems institute speaker series    mark sherman - watson pr...170330 cognitive systems institute speaker series    mark sherman - watson pr...
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
 
Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain Sonatype
 
Risks in the Software Supply Chain
Risks in the Software Supply ChainRisks in the Software Supply Chain
Risks in the Software Supply ChainMark Sherman
 
Integrate Security into DevOps
Integrate Security into DevOpsIntegrate Security into DevOps
Integrate Security into DevOpsTechWell
 
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal Government
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal GovernmentDOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal Government
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal GovernmentGene Kim
 
Andy Graverson Resume_July_2015
Andy Graverson Resume_July_2015Andy Graverson Resume_July_2015
Andy Graverson Resume_July_2015Andy Graverson
 
New threats to cyber-security
New threats to cyber-securityNew threats to cyber-security
New threats to cyber-securityMark Sherman
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark ShermanRinaldi Rampen
 

Similaire à Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan Yasar (10)

Multi Security Checkpoints on DevOps Platform
Multi Security Checkpoints on DevOps PlatformMulti Security Checkpoints on DevOps Platform
Multi Security Checkpoints on DevOps Platform
 
Software Engineering Trends: Vision from Paul Nielsen, SEI
Software Engineering Trends: Vision from Paul Nielsen, SEISoftware Engineering Trends: Vision from Paul Nielsen, SEI
Software Engineering Trends: Vision from Paul Nielsen, SEI
 
170330 cognitive systems institute speaker series mark sherman - watson pr...
170330 cognitive systems institute speaker series    mark sherman - watson pr...170330 cognitive systems institute speaker series    mark sherman - watson pr...
170330 cognitive systems institute speaker series mark sherman - watson pr...
 
Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain
 
Risks in the Software Supply Chain
Risks in the Software Supply ChainRisks in the Software Supply Chain
Risks in the Software Supply Chain
 
Integrate Security into DevOps
Integrate Security into DevOpsIntegrate Security into DevOps
Integrate Security into DevOps
 
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal Government
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal GovernmentDOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal Government
DOES15 - Aaron Volkmann - Busting Silos & Red Tape: DevOps in Federal Government
 
Andy Graverson Resume_July_2015
Andy Graverson Resume_July_2015Andy Graverson Resume_July_2015
Andy Graverson Resume_July_2015
 
New threats to cyber-security
New threats to cyber-securityNew threats to cyber-security
New threats to cyber-security
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman
 

Plus de SeniorStoryteller

NuGet Package Management Done Right
NuGet Package Management Done RightNuGet Package Management Done Right
NuGet Package Management Done RightSeniorStoryteller
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzSeniorStoryteller
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySeniorStoryteller
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSoftware Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSeniorStoryteller
 
Heroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsHeroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsSeniorStoryteller
 
Rugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessRugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessSeniorStoryteller
 
Create Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainCreate Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainSeniorStoryteller
 
Aligning Your Team and Your Powers for Success
Aligning Your Team and Your Powers for SuccessAligning Your Team and Your Powers for Success
Aligning Your Team and Your Powers for SuccessSeniorStoryteller
 
Leveraging Nexus Repository Manager at the Heart of DevOps
Leveraging Nexus Repository Manager at the Heart of DevOpsLeveraging Nexus Repository Manager at the Heart of DevOps
Leveraging Nexus Repository Manager at the Heart of DevOpsSeniorStoryteller
 
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
The DevOps Hero Toolkit: Nexus, Jenkins and DockerThe DevOps Hero Toolkit: Nexus, Jenkins and Docker
The DevOps Hero Toolkit: Nexus, Jenkins and DockerSeniorStoryteller
 
Guns, Germs and Microservices w/ John Willis and Josh Corman
Guns, Germs and Microservices   w/ John Willis and Josh CormanGuns, Germs and Microservices   w/ John Willis and Josh Corman
Guns, Germs and Microservices w/ John Willis and Josh CormanSeniorStoryteller
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsSeniorStoryteller
 
Release Engineering and Rugged DevOps: An Intersection?
Release Engineering and Rugged DevOps: An Intersection?Release Engineering and Rugged DevOps: An Intersection?
Release Engineering and Rugged DevOps: An Intersection?SeniorStoryteller
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WaySeniorStoryteller
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsSeniorStoryteller
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack ModelsSeniorStoryteller
 

Plus de SeniorStoryteller (17)

NuGet Package Management Done Right
NuGet Package Management Done RightNuGet Package Management Done Right
NuGet Package Management Done Right
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSoftware Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
 
Heroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsHeroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps Transformations
 
Rugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessRugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for Success
 
Create Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainCreate Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply Chain
 
Aligning Your Team and Your Powers for Success
Aligning Your Team and Your Powers for SuccessAligning Your Team and Your Powers for Success
Aligning Your Team and Your Powers for Success
 
Leveraging Nexus Repository Manager at the Heart of DevOps
Leveraging Nexus Repository Manager at the Heart of DevOpsLeveraging Nexus Repository Manager at the Heart of DevOps
Leveraging Nexus Repository Manager at the Heart of DevOps
 
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
The DevOps Hero Toolkit: Nexus, Jenkins and DockerThe DevOps Hero Toolkit: Nexus, Jenkins and Docker
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
 
Guns, Germs and Microservices w/ John Willis and Josh Corman
Guns, Germs and Microservices   w/ John Willis and Josh CormanGuns, Germs and Microservices   w/ John Willis and Josh Corman
Guns, Germs and Microservices w/ John Willis and Josh Corman
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOps
 
Release Engineering and Rugged DevOps: An Intersection?
Release Engineering and Rugged DevOps: An Intersection?Release Engineering and Rugged DevOps: An Intersection?
Release Engineering and Rugged DevOps: An Intersection?
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack Models
 

Dernier

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan Yasar