SlideShare une entreprise Scribd logo
1  sur  44
DevSecOps
Security and Compliance at the Speed of
Continuous Delivery
Dag Rowe - OWASP Ottawa Sept 2018
@dagrowe
Holy Grails
You want to deliver product
You want to deliver it fast
You want people to trust it
Holy Grails
Oh and …
Usable, secure, has defense in
depth,
hardened, easy to patch, uses the
principle of least privilege, compliant,
auditable, supportable, uses modern tech,
attracts developers, cost effective ...
Holy Grails
And …
Still deliver features, GO!
Compliance
Document what you do
Do it
Prove you did it
Compliance
Document what you do
– Security Controls, plans, and processes
Do it
– Hard
Prove you did it
– If you haven’t planned - this can be hard,
disruptive work
Also ...
Can we move to
Compliance Engineering?
DevSecOps
Yes!
Treat the problem of security and
compliance as a test, release, and
observability engineering problem
Why focus on
Compliance?
Why Compliance?
Compliance opens wallets
Moves security spending from fear
• Avoid a big incident
To greed
• A sales tool
Paraphrasing Bruce
Schneier
DevSecOps
DevOps used to deliver and run systems in a
secure and reliable way
Bringing in Security and Compliance
increases the focus on Ops
– “You build it, you run it”
No Magic
Just DevOps done right
Other terms
– DevSecOps
– DevOpsSec
– Rugged DevOps
It is a good search phrase, tho
Enter the Dragon Tehama
tehama.io
Tehama the Product
Delivers privileged technical services
over the internet with
– Transparency
– Security
– Auditability
Ensures trust while enabling quick
onboarding and connectivity
Tehama and SOC2
Decided that SOC2 compliance was
mandatory
– Sales tool
– Trust tool
• Validated security practices via a
trusted 3rd party auditor
DevSecOps - Secret Sauce
The whole team approach
Leverage security and compliance expertise
in building out the system
Leverage the technical expertise of your
DevOps team
What about - Product? Testing? Marketing? Legal?
• Yes, the whole team
They are all stakeholders in delivery
Tehama DevSecOps Principles
Security and Compliance is not the office of
no
Build security in
Don’t be compliant for compliance’s sake
– Make it secure, to demonstrate
compliance
– Keep it valuable
*
* Respected Colleague
Implementation
Security is everyone’s job, all the time
Design it into the system
• Then it is just how the software is
delivered
Audit evidence is generated during daily
work
– Not extra work
DevOps Patterns
Infrastructure as Code
Continuous Delivery
Continuous Monitoring
Learning from Failure
Collaborative Culture
Policy Designed for CI/CD
Change Management
Standard Change
– Pre-approved
– Move most changes here
– High success rate, low MTTR
High Risk Change
– Classic security approval
Emergency Change
– Post release approval
– Don’t block an emergency change
DevOps Audit Defense
d) Automated security testing of the code and environment
is performed as part of the deployment pipeline, as per
CS2.e.
e) All production deployments must have a JIRA ticket
number. Deployers must input the JIRA ticket number into
the Jenkins build pipeline system for code to be deployed
into production.
i) Jenkins uses the JIRA plugin to pull information from
JIRA to include with the build information and push
information about the build into the JIRA ticket.
Implementation
Secure software supply chain
All images and OSs are from trusted repos
– Hardened
All software dependencies are scanned
Patch management is just another change
Implementation - SDLC
The SDLC is based on a CI/CD pipeline
Automatic
SAST
– Static Application Security Testing
DAST
– Dynamic Application Security Testing
SCA
– Software Component Analysis
Container vulnerability analysis
Implementation - SDLC
Manual
Prioritization and planning
Pull requests and code review
– Code review guidelines call out security
concerns with a standard checklist
PR approval, and release authorization
Implementation - Monitoring
Vulnerability plan includes intrusion detection
Requires monitoring and alerting to detect
incidents
• Alerting will launch Incident Response (IR)
• Note, manual detection is still in scope
– Strange system behaviour
– Customer reports
– AWS security
– Law enforcement
Implementation - IR and Logging
DevOps includes a focus on monitoring and
observability
• This is adds big value
• Enables robust Incident Response and
troubleshooting capabilities
Where’s the Evidence?
• Agile planning
• Work ticket workflow
– Pull requests
• CI/CD scan logs
– Remediation tickets
• Release ticket workflow
– Authorization
• Production monitoring
• Incident tickets
• Chat Ops
• Blameless post-mortems
– Remediation tickets
Results
Last pentest had no findings
Security and compliance dev work is not exceptional
First audit (Type 1) passed without complications
– Kudos from auditors
Second audit (Type 2) had no major out of band work
for developers or compliance - Passed
Continuous improvement on logging and monitoring
IR and post-mortem process well established
References
• DevOpsSec: Securing software through continuous delivery
– https://www.safaribooksonline.com/library/view/devopssec/978149197
1413/
• DevOps Audit Defense Toolkit
– https://itrevolution.com/devops-audit-defense-toolkit/
• The DevOps Handbook: How to Create World-Class Agility, Reliability, and
Security in Technology Organizations
– Chapter 19
– Section VI
– Appendix 9
– https://www.amazon.ca/DevOps-Handbook-World-Class-Reliability-
Organizations/dp/1942788002
References
• Accelerate: The Science of Lean Software and DevOps: Building and
Scaling High Performing Technology Organizations
– Chapter 6
– https://www.amazon.ca/Accelerate-Software-Performing-Technology-
Organizations/dp/1942788339/
• Incident Management for Operations
– https://www.amazon.ca/Incident-Management-Operations-Rob-
Schnepp/dp/1491917628/
• Pagerduty Incident Response
– https://response.pagerduty.com/
• Incident Response: Trade-offs Under Pressure
– https://www.slideshare.net/InfoQ/incident-response-tradeoffs-under-
pressure
References
• Blameless PostMortems and a Just Culture
– https://codeascraft.com/2012/05/22/blameless-postmortems/
• The infinite hows
– https://www.oreilly.com/ideas/the-infinite-hows
• Debriefing Facilitation Guide
– https://extfiles.etsy.com/DebriefingFacilitationGuide.pdf
• Was it technical failure or human error?
– https://www.youtube.com/watch?v=Ygx2AI2RtkI
• AWS Monitoring & Logging
– https://www.slideshare.net/JasonPoley/aws-monitoring-logging
• Container & Microservice Security
– https://www.youtube.com/watch?v=8tDpGyVV8OQ
• How the Human Brain Buys Security
– https://www.schneier.com/essays/archives/2008/07/how_the_human_
brain.html

Contenu connexe

Tendances

DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 

Tendances (20)

DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
Talk DevSecOps to me
Talk DevSecOps to meTalk DevSecOps to me
Talk DevSecOps to me
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
PIACERE - DevSecOps Automated
PIACERE - DevSecOps AutomatedPIACERE - DevSecOps Automated
PIACERE - DevSecOps Automated
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Microsoft DevOps Forum 2021 – DevOps & Security
 Microsoft DevOps Forum 2021 – DevOps & Security Microsoft DevOps Forum 2021 – DevOps & Security
Microsoft DevOps Forum 2021 – DevOps & Security
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
Security Testing for Containerized Applications
Security Testing for Containerized ApplicationsSecurity Testing for Containerized Applications
Security Testing for Containerized Applications
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoD
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 

Similaire à Dev secops security and compliance at the speed of continuous delivery - owasp

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 

Similaire à Dev secops security and compliance at the speed of continuous delivery - owasp (20)

DevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous DeliveryDevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarMaking the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
 
Introduction to DevSecOps OWASP Ahmedabad
Introduction to DevSecOps OWASP AhmedabadIntroduction to DevSecOps OWASP Ahmedabad
Introduction to DevSecOps OWASP Ahmedabad
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Journey to the center of DevOps - v6
Journey to the center of DevOps - v6Journey to the center of DevOps - v6
Journey to the center of DevOps - v6
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
5 steps to Network Reliability Engineering and Automated Network Operations
5 steps to Network Reliability Engineering and Automated Network Operations5 steps to Network Reliability Engineering and Automated Network Operations
5 steps to Network Reliability Engineering and Automated Network Operations
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Dev secops security and compliance at the speed of continuous delivery - owasp

  • 1. DevSecOps Security and Compliance at the Speed of Continuous Delivery Dag Rowe - OWASP Ottawa Sept 2018 @dagrowe
  • 2. Holy Grails You want to deliver product You want to deliver it fast You want people to trust it
  • 3.
  • 4. Holy Grails Oh and … Usable, secure, has defense in depth, hardened, easy to patch, uses the principle of least privilege, compliant, auditable, supportable, uses modern tech, attracts developers, cost effective ...
  • 5. Holy Grails And … Still deliver features, GO!
  • 6.
  • 7. Compliance Document what you do Do it Prove you did it
  • 8.
  • 9. Compliance Document what you do – Security Controls, plans, and processes Do it – Hard Prove you did it – If you haven’t planned - this can be hard, disruptive work
  • 11. Can we move to Compliance Engineering?
  • 12. DevSecOps Yes! Treat the problem of security and compliance as a test, release, and observability engineering problem
  • 14.
  • 15. Why Compliance? Compliance opens wallets Moves security spending from fear • Avoid a big incident To greed • A sales tool Paraphrasing Bruce Schneier
  • 16.
  • 17. DevSecOps DevOps used to deliver and run systems in a secure and reliable way Bringing in Security and Compliance increases the focus on Ops – “You build it, you run it”
  • 18.
  • 19. No Magic Just DevOps done right Other terms – DevSecOps – DevOpsSec – Rugged DevOps It is a good search phrase, tho
  • 22. Tehama the Product Delivers privileged technical services over the internet with – Transparency – Security – Auditability Ensures trust while enabling quick onboarding and connectivity
  • 23.
  • 24. Tehama and SOC2 Decided that SOC2 compliance was mandatory – Sales tool – Trust tool • Validated security practices via a trusted 3rd party auditor
  • 25.
  • 26. DevSecOps - Secret Sauce The whole team approach Leverage security and compliance expertise in building out the system Leverage the technical expertise of your DevOps team What about - Product? Testing? Marketing? Legal? • Yes, the whole team
  • 27. They are all stakeholders in delivery
  • 28. Tehama DevSecOps Principles Security and Compliance is not the office of no Build security in Don’t be compliant for compliance’s sake – Make it secure, to demonstrate compliance – Keep it valuable
  • 30. Implementation Security is everyone’s job, all the time Design it into the system • Then it is just how the software is delivered Audit evidence is generated during daily work – Not extra work
  • 31. DevOps Patterns Infrastructure as Code Continuous Delivery Continuous Monitoring Learning from Failure Collaborative Culture
  • 32. Policy Designed for CI/CD Change Management Standard Change – Pre-approved – Move most changes here – High success rate, low MTTR High Risk Change – Classic security approval Emergency Change – Post release approval – Don’t block an emergency change
  • 33.
  • 34. DevOps Audit Defense d) Automated security testing of the code and environment is performed as part of the deployment pipeline, as per CS2.e. e) All production deployments must have a JIRA ticket number. Deployers must input the JIRA ticket number into the Jenkins build pipeline system for code to be deployed into production. i) Jenkins uses the JIRA plugin to pull information from JIRA to include with the build information and push information about the build into the JIRA ticket.
  • 35. Implementation Secure software supply chain All images and OSs are from trusted repos – Hardened All software dependencies are scanned Patch management is just another change
  • 36. Implementation - SDLC The SDLC is based on a CI/CD pipeline Automatic SAST – Static Application Security Testing DAST – Dynamic Application Security Testing SCA – Software Component Analysis Container vulnerability analysis
  • 37. Implementation - SDLC Manual Prioritization and planning Pull requests and code review – Code review guidelines call out security concerns with a standard checklist PR approval, and release authorization
  • 38. Implementation - Monitoring Vulnerability plan includes intrusion detection Requires monitoring and alerting to detect incidents • Alerting will launch Incident Response (IR) • Note, manual detection is still in scope – Strange system behaviour – Customer reports – AWS security – Law enforcement
  • 39. Implementation - IR and Logging DevOps includes a focus on monitoring and observability • This is adds big value • Enables robust Incident Response and troubleshooting capabilities
  • 40. Where’s the Evidence? • Agile planning • Work ticket workflow – Pull requests • CI/CD scan logs – Remediation tickets • Release ticket workflow – Authorization • Production monitoring • Incident tickets • Chat Ops • Blameless post-mortems – Remediation tickets
  • 41. Results Last pentest had no findings Security and compliance dev work is not exceptional First audit (Type 1) passed without complications – Kudos from auditors Second audit (Type 2) had no major out of band work for developers or compliance - Passed Continuous improvement on logging and monitoring IR and post-mortem process well established
  • 42. References • DevOpsSec: Securing software through continuous delivery – https://www.safaribooksonline.com/library/view/devopssec/978149197 1413/ • DevOps Audit Defense Toolkit – https://itrevolution.com/devops-audit-defense-toolkit/ • The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations – Chapter 19 – Section VI – Appendix 9 – https://www.amazon.ca/DevOps-Handbook-World-Class-Reliability- Organizations/dp/1942788002
  • 43. References • Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations – Chapter 6 – https://www.amazon.ca/Accelerate-Software-Performing-Technology- Organizations/dp/1942788339/ • Incident Management for Operations – https://www.amazon.ca/Incident-Management-Operations-Rob- Schnepp/dp/1491917628/ • Pagerduty Incident Response – https://response.pagerduty.com/ • Incident Response: Trade-offs Under Pressure – https://www.slideshare.net/InfoQ/incident-response-tradeoffs-under- pressure
  • 44. References • Blameless PostMortems and a Just Culture – https://codeascraft.com/2012/05/22/blameless-postmortems/ • The infinite hows – https://www.oreilly.com/ideas/the-infinite-hows • Debriefing Facilitation Guide – https://extfiles.etsy.com/DebriefingFacilitationGuide.pdf • Was it technical failure or human error? – https://www.youtube.com/watch?v=Ygx2AI2RtkI • AWS Monitoring & Logging – https://www.slideshare.net/JasonPoley/aws-monitoring-logging • Container & Microservice Security – https://www.youtube.com/watch?v=8tDpGyVV8OQ • How the Human Brain Buys Security – https://www.schneier.com/essays/archives/2008/07/how_the_human_ brain.html