SlideShare une entreprise Scribd logo
1  sur  72
Télécharger pour lire hors ligne
CONTINOUS EVERYTHING
IN THE AGE OF INSTANT
EVERYTHING
KIRAN DIVAKARAN
@ETURNTI
Misys
BFL
Consultant and Technology Evangelist
with companies to help them in their
business transformation and digital
transformation journeys
Training and mentoring Architects and
Technology leaders
Enterprise Architecture Expert with the
Digital India Initiative
Ex Vice Chair TOGAF® Standing
Committee
Governing Board Member CCICI
WHAT DO I DO ?
NEED FOR EVERYTHING COUNTINOUS AND BOUNDARY LESS
NOT ONLY IN PRODUCT PIPELINES BUT ALSO IN INDUSTRY VALUE CHAINS
ALL OF THIS NEEDS A CONTINUUM AND NOT BROKEN PIECES
-JACK WELSH
AGE OF BOUNDARYLESS INFORMATION FLOW
APIs EVERY WHERE
ENTERPRISE ARCHITECTURE AND BLURRING THE BOUNDARIES, API ECONOMY -DISCOVERING NEW BUSINESS MODELS AT INTERSECTIONS – MDI GURGAON
Courtesy : DZone
APIs WITHIN A VALUE CHAIN
GHOST RIDES SCAM
In 2017, the Equifax credit reporting agency
used Struts in an online portal, and due to
Equifax not identifying and patching a
vulnerable version of Struts, attackers were
able to capture personal consumer information
such as names, Social Security numbers, birth
dates and addresses of over 148 million US
consumers, nearly 700,000 UK residents, and
more than 19,000 Canadian customers.
EQUIFAX SCAM
VALUE CHAIN CUTTING ACROSS MANY DOMAINS TO ACHIEVE BIZ VALUE
SALESFORCE.COM GENERATES 50 PERCENT OF ITS
REVENUES VIA ITS API VIA ITS API.
TRAVEL SITE, EXPEDIA, A WHOPPING 90 PERCENT OF
ITS REVENUE IS CONDUCTED VIA ITS API.
EVERYTHING AROUND US HAS TO BE CONTINOUS
Continuous
Everything
Continuous
Production
Continuous
Integration
Continuous
Automation
Continuous
Governance
Continuous
Monitoring
Continuous
Testing
WHERE DOES THIS LEAVE US WITH SECURITY ?
Continuous
Security
https://www.linkedin.com/pulse/dynamics-devops-adoption-dr-pallab-saha/
CAUSAL LOOP FOR DEVOPS
DEVOPS IS A JOURNEY ITSELF
INTRODUCING SECURITY
ADDS TO THE
COMPLEXITY
CAN SECURITY PACE WITH THE RATE AT WHICH CODE IS PUSHED ?
ENTER
DEV SECOPS / SEC DEV / RUGGED DEV OPS
= SECURITY AUTOMATION AT SCALE
IMPACT OF SECURITY ON BUSINESS
Proliferation of Shadow IT
Business Agility impacted due to slow security cycles.
Security unable to keep pace with Business
Adhoc projects and rogue development
True DevOps requires maturity
Slow threat assessments
Not enough patching
Reactive security posture of the company
SECURITY OPERATIONS
WHAT ARE WE MISSING HERE ?
Courtesy :Henrik Kniberg
1. We need to discover a solution that is valuable, usable, feasible and viable.
2. We need to deliver a solution that is reliable, scalable, performant and maintainable.
& Of Course SECURE
WHAT WE ARE NOT CAPTURING ARE THE UNDERLYING ISSUES
Value Risk - will they use/buy it?
Usability Risk - can they use it?
Feasibility Risk - can we build it?
Business Viability Risk - will this work for our business?
Security Risk – Is our solution vulnerable or hack proof ?
SOLVE OR BRAINSTORM ON THESE RISKS BEFORE YOU WRITE A LINE OF CODE
DISCOVERY AND DELIVERY
Courtesy : Marty Cagan SVPG
Build to learn
Build to run a business
DUAL TRACK AGILE - JEFF PATTON
More frequent
Iterations per week
1 or 2 Iterations per week
PRODUCT MANAGERS / DESIGNERS
ENGINEERS
Adapted from Courtesy : Marty Cagan SVPG
SECURITY
ADDING SECURITY TO THE ATTRIBUTE LIST
Courtesy : Marty Cagan SVPG
MOST OFTEN USED AT GOOGLE
Courtesy : Marty Cagan SVPG
Y-COMBINATOR TERMINOLOGY
AiRBnB USES IT
Courtesy : Marty Cagan SVPG
Courtesy : Marty Cagan SVPG
SPRINTS THAT WE NEED TO CONSIDER
By 2021, DevSecOps practices will be embedded
in 80 per cent of development teams, up from 15
per cent in 2017.
-Gartner
DEV SEC OPS - WHY
Pace of innovation meets – Pace of Security Automation
Scalable Architectures need Scalable Security
Vulnerabilities need to be healed at the rate at which software is getting churned.
Risk Identification and Remediation at the speed of delivery
Slow threat assessments
Can't patch fast enough
Reactive security posture
Lack of business agility
Slow to onboard new customers
Slow turn around time
Trailblazer dev projects gone wrong
Lack of SecOps agility
PROBLEMS AS THEY STAND
DEVELOPMENT
ARCHITECTURE
QA
OPERATIONS
TRADITIONAL S/W DEVELOPMENT – NOT CONTINOUS
WHAT WE NEED ?
MONITORING
&
SECURITY
TO BE ADDED TO
MAKE IT CONTINOUS
PLAN – CODE –BUILD-TEST-RELEASE-DEPLOY-OPERATE-MONITOR-PLAN
CLOUD ADDS TO THE COMPLEXITY
MOVING TO THE CLOUD
BABY STEPS
MORE THAN ONE
CLOUD
MULTI
CLOUD SCENARIO
SECURITY RESOURCES
& CHECKLISTS
COMPLIANCE AND
REGULATIONS
OPEX
DEVS
OPS
DESIGN
REVIEW
TEST
UNIT TEST
MOCK TESTS
PERFORMANCE
SECURITY
MEMORY MANAGEMENT
NRFS
SECURITY
RESPONSIVE NESS
RUN STUFF
BREAK THE BUILD
REPEAT
HOW DEVELOPERS SEE OPS FOLKS ?
WHAT DEVELOPERS WANT ?
Ease of checking in and checking out
Able to play and experiment with emerging technologies
Ability to push code regardless of the platform
ABOVE ALL A GOOD NIGHTS SLEEP
DEVS
DEV
ITIL COMPLIANCE
REDUCE CARBON
FOOTPRINT
TEST
GO GREEN
SUPPORT DIFF ENVS
TICKETING
SECURITY
VIRTUALIZE
CMRB
PCI DSS
KEEP THE LIGHTS ON
WRITE CODE
TEST SOME AND
RELEASE
HOW OPERATIONS FOLKS SEE DEVELOPERS
NETWORKS
OS
ACCESS CONTROL
WHAT MAKES SECURITY FOLKS RELAX
ALL VULNERABILITIES ARE DISCOVERED AND FIXED IN TIME
ALL COMPLIANCES AND REGULATIONS ARE MET
ALL ATTACKS HAVE A PLANNED STRATEGY AND NO SURPISES
ABLE TO KEEP IN PACE WITH THE SPEED OF DEVELOPMENT
AUTOMATED PROCESSES FOR STATIC AND DYNAMIC TEST ( SAST , DAST , IAST )
WHAT WE NEED IS TOOLS AND PROCESS ?
MONITORING
&
SECURITY
TO BE ADDED TO
MAKE IT CONTINOUS
CHECKS PRESENT
CHECKS PRESENT
NEEDS ACTION
NEEDS ACTION
NEEDS ACTION
NEEDS ACTION
CI / CD SOLUTION IS ONE OF THE
IMPORTANT TOOLS FOR DEVSECOPS
CI / CD PIPLELINE IS WHERE THE ACTION HAPPENS
BUILD PROCESSES ALONG THAT
1. REVIEW ACCESS ROLES
2. HARDENNING SERVERS AND NODES
3. ARTIFACTS / THIRD PARTY LIBS VALIDATION BEFORE ADDING THEM TO THE TRUNK
4. STATIC CODE ANALYSIS
5. DYNAMIC ANALYSIS
MILLION DOLLAR QUESTION ?
WHO BROKE THE BUILD ?
DO NOT LET SECURITY BREAK YOUR BUILD
When Cl breaks (and it breaks) it impacts everyone and everything in the process.
Creating a significant delay in the release cycle.
Start implementing security before the Continuous integration stage.
If you have 365 developers and each developer breaks only a single build once a year (usually much
more), you have an average of one build break per day.
SECURITY CANNOT BE A BLOCKER IT HAS TO KEEP PACE
SECURITY WISH LIST
OPERATIONAL CHECKS
AUTOMATIC FAULT DETECTION
AND CORRECTION
AUTOMATION REMIADIATION
AUTOMATIC AUDITING & FORENSICS
CODE LEVEL CHECKS
SECURE CODING PRACTICES
PRO ACTIVE CONTROLS IN THE CODE
BUILD LEVEL CHECKS
VULNERABILITY CHECKS
CONFIGURATION SCRUBBING
DEPLOY CHECKS
CONTINOUS VULNERABILITY SCANS
PICK ONLY AUTHENTIC IMAGES
GRANT JUST ENOUGH SERVER ACCESS
Command and
Control
Low trust
Organizations
Empowered
High trust
Organizations
DEVOPS IS FOR HORSES TOO NOT ONLY UNICORNS
MYTH
IF YOU CAN DO IT FOR SAP YOU CAN DO IT FOR ANYTHING
PROBLEMS & SOLUTIONS
IN FRONT OF US
PUSH THE RESPONSIBILTY TO THE DEVELOPERS
Whitepaper : ROI of Shifting Left in your SDLC
AIM FOR LESS FALSE POSITIVES
AIM FOR HIGH QUALITY
AIM FOR SPEED OF DELIVERY
SECURITY NEEDS MORE THAN JUST LIP SERVICE
Typically the ratio of DEVto OPSto SEC is 100/ 10 / 1
APPLICATION SECURITY
ACCOUNTS FOR
ABOUT
29 ~ 40 % OF ALL BREACHES
Automatic has issues as
Security Issues if found cannot be
stopped
How To Put The Sec In DevOps – Helen Bravo
Manual has better
control not faster
THE NETFLIX WAY
Aardvark and Repokid
PRINCIPLE OF LEAST PRIVILEGE
Positive testing determines that your application works
as expected. If an error is encountered during positive
testing, the test fails.
Negative testing ensures that your application can
gracefully handle invalid input or unexpected user
behavior.
Invite both sides of the table to the meeting DEV and OPS
Incidents
Threat Modelling
Security Sprints Etc.
AVOID FALSE POSITIVES
MEASURE MEASURE & MEASURE
FEED BACK PENETRATION RESULTS INTO UNIT TESTS
CREATE A CULTURE WHICH IS HIGH ON THE SECURITY DNA
Make it public when you fix things and update on internal wiki
Share Point or CMDB for all fixes on Security
Do not make it personal fix the issue not the person
Arrange for tech talks to spread the know how of the fixes
Educate DEV and OPS to read security tool analysis well
Shadow resources who could build capabilities
The further right the project is
on the DevOps scale the
further
left it should start
implementing security checks
https://developer.akamai.com/blog/2017/10/11/cdns-evolving-role-new-devops-world
DEVOPS EVOLUTION
COST OF NOT FIXING AT THE RIGHT TIME
SHIFT LEFT TO GAIN
Courtesy : Tanya Janca, Senior Cloud Developer Advocate, Microsoft
MOVE SECURITY UP THE CHAIN IN REVERSE ORDER
Courtesy : Tanya Janca, Senior Cloud Developer Advocate, Microsoft
CONTINOUS LEARNING IS KEY
ACTION ITEMS POST THIS CONFERENCE
Add security verification to Cl/CD Pipelines
Critical security bugs break the build
In the first three months following this presentation you should:
Create Negative Unit Tests from existing positive unit tests
Lessons on top 3 security bugs
High security bugs break the build
Within six months you should:
Regular lessons on AppSec, including a security exercise or simulation
Improvements of security processes for speed and removal of obstacles
Creation of parallel security pipeline
Medium security bugs break the build
NEXT STEPS FOR YOU
LIST OF TOOLS OUT THERE
USEFUL THOUGHT TO CARRY ☺
REFERENCES
1. https://www.linkedin.com/pulse/dynamics-devops-adoption-dr-pallab-saha/
2. https://www.youtube.com/watch?v=Qa_Fq7wWRdA
3. https://developer.akamai.com/blog/2017/10/11/cdns-evolving-role-new-devops-world
4. https://www.youtube.com/watch?v=Qa_Fq7wWRdA
5. https://www.youtube.com/watch?v=i43yWwcQfTs&list=PLjNII-Jkdjfz5EXWlGMBRk63PC8uJsHMo&index=3
6. https://www.youtube.com/watch?v=ayKTn2ZgGJI
7. https://www.youtube.com/watch?v=0KG9XRCKK78&t=108s
8. https://www.waratek.com/waf-to-runtime-protection/
9. https://www.opengroup.org/cio/ReferenceArc-Final1.pdf
www.eturnti.com
kiran@eturnti.com
twitter : @eturnti
+91-9886488030
Kiran Divakaran

Contenu connexe

Tendances

PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops finalGene Kim
 
The DevOps Revolution And Beyond...
The DevOps Revolution And Beyond...The DevOps Revolution And Beyond...
The DevOps Revolution And Beyond...Chris Sterling
 
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...Gene Kim
 
Another Agile Intro
Another Agile IntroAnother Agile Intro
Another Agile IntroSteve Hayes
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
What skills and personality do you need for a career in DevOps?
What skills and personality do you need for a career in DevOps?What skills and personality do you need for a career in DevOps?
What skills and personality do you need for a career in DevOps?Puppet
 
Optimizing DevOps strategy in a large enterprise
Optimizing DevOps strategy in a large enterpriseOptimizing DevOps strategy in a large enterprise
Optimizing DevOps strategy in a large enterpriseEyal Edri
 
Seven Deadly Habits of Dysfunctional Software Managers
Seven Deadly Habits of Dysfunctional Software ManagersSeven Deadly Habits of Dysfunctional Software Managers
Seven Deadly Habits of Dysfunctional Software ManagersTechWell
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
Scaling Agile: Remembering Tolstoy’s Unhappy Family Analogy
Scaling Agile: Remembering Tolstoy’s Unhappy Family AnalogyScaling Agile: Remembering Tolstoy’s Unhappy Family Analogy
Scaling Agile: Remembering Tolstoy’s Unhappy Family AnalogyTechWell
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous IntegrationPreetam Palwe
 
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013ChileAgil
 
Agile Methods - 2 day workshop
Agile Methods - 2 day workshopAgile Methods - 2 day workshop
Agile Methods - 2 day workshopEvan Leybourn
 

Tendances (20)

PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops final
 
The DevOps Revolution And Beyond...
The DevOps Revolution And Beyond...The DevOps Revolution And Beyond...
The DevOps Revolution And Beyond...
 
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
 
Another Agile Intro
Another Agile IntroAnother Agile Intro
Another Agile Intro
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
7 Myths of Agile Development
7 Myths of Agile Development7 Myths of Agile Development
7 Myths of Agile Development
 
What skills and personality do you need for a career in DevOps?
What skills and personality do you need for a career in DevOps?What skills and personality do you need for a career in DevOps?
What skills and personality do you need for a career in DevOps?
 
Optimizing DevOps strategy in a large enterprise
Optimizing DevOps strategy in a large enterpriseOptimizing DevOps strategy in a large enterprise
Optimizing DevOps strategy in a large enterprise
 
Seven Deadly Habits of Dysfunctional Software Managers
Seven Deadly Habits of Dysfunctional Software ManagersSeven Deadly Habits of Dysfunctional Software Managers
Seven Deadly Habits of Dysfunctional Software Managers
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
 
Scaling Agile: Remembering Tolstoy’s Unhappy Family Analogy
Scaling Agile: Remembering Tolstoy’s Unhappy Family AnalogyScaling Agile: Remembering Tolstoy’s Unhappy Family Analogy
Scaling Agile: Remembering Tolstoy’s Unhappy Family Analogy
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
Devops or die!
Devops or die!Devops or die!
Devops or die!
 
Agile Adoption - Opportunities and Challenges
Agile Adoption - Opportunities and ChallengesAgile Adoption - Opportunities and Challenges
Agile Adoption - Opportunities and Challenges
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous Integration
 
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
"The Lean Mindset": Mary & Tom Poppendieck's Keynote at AgileDayChile 2013
 
Scrum & Waterfall: Friend or Foe?
Scrum & Waterfall: Friend or Foe?Scrum & Waterfall: Friend or Foe?
Scrum & Waterfall: Friend or Foe?
 
Agile Methods - 2 day workshop
Agile Methods - 2 day workshopAgile Methods - 2 day workshop
Agile Methods - 2 day workshop
 

Similaire à Agile Relevance in the age of Continuous Everything ....

Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019Eturnti Consulting Pvt Ltd
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Yazad Khandhadia
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Aggregage
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzSeniorStoryteller
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Phoenix User Group Slides
Phoenix User Group SlidesPhoenix User Group Slides
Phoenix User Group Slidesagilebuddy
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseJames Wickett
 
DevOps for the Discouraged
DevOps for the Discouraged DevOps for the Discouraged
DevOps for the Discouraged James Wickett
 
ALM and DevOps in the health industry
ALM and DevOps in the health industryALM and DevOps in the health industry
ALM and DevOps in the health industryAgile Partner S.A.
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 

Similaire à Agile Relevance in the age of Continuous Everything .... (20)

Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Phoenix User Group Slides
Phoenix User Group SlidesPhoenix User Group Slides
Phoenix User Group Slides
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
DevOps for the Discouraged
DevOps for the Discouraged DevOps for the Discouraged
DevOps for the Discouraged
 
ALM and DevOps in the health industry
ALM and DevOps in the health industryALM and DevOps in the health industry
ALM and DevOps in the health industry
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Agile Relevance in the age of Continuous Everything ....

  • 1. CONTINOUS EVERYTHING IN THE AGE OF INSTANT EVERYTHING KIRAN DIVAKARAN @ETURNTI
  • 2. Misys BFL Consultant and Technology Evangelist with companies to help them in their business transformation and digital transformation journeys Training and mentoring Architects and Technology leaders Enterprise Architecture Expert with the Digital India Initiative Ex Vice Chair TOGAF® Standing Committee Governing Board Member CCICI WHAT DO I DO ?
  • 3. NEED FOR EVERYTHING COUNTINOUS AND BOUNDARY LESS
  • 4. NOT ONLY IN PRODUCT PIPELINES BUT ALSO IN INDUSTRY VALUE CHAINS
  • 5. ALL OF THIS NEEDS A CONTINUUM AND NOT BROKEN PIECES -JACK WELSH
  • 6. AGE OF BOUNDARYLESS INFORMATION FLOW
  • 7. APIs EVERY WHERE ENTERPRISE ARCHITECTURE AND BLURRING THE BOUNDARIES, API ECONOMY -DISCOVERING NEW BUSINESS MODELS AT INTERSECTIONS – MDI GURGAON
  • 8. Courtesy : DZone APIs WITHIN A VALUE CHAIN
  • 10. In 2017, the Equifax credit reporting agency used Struts in an online portal, and due to Equifax not identifying and patching a vulnerable version of Struts, attackers were able to capture personal consumer information such as names, Social Security numbers, birth dates and addresses of over 148 million US consumers, nearly 700,000 UK residents, and more than 19,000 Canadian customers. EQUIFAX SCAM
  • 11. VALUE CHAIN CUTTING ACROSS MANY DOMAINS TO ACHIEVE BIZ VALUE
  • 12. SALESFORCE.COM GENERATES 50 PERCENT OF ITS REVENUES VIA ITS API VIA ITS API. TRAVEL SITE, EXPEDIA, A WHOPPING 90 PERCENT OF ITS REVENUE IS CONDUCTED VIA ITS API.
  • 13. EVERYTHING AROUND US HAS TO BE CONTINOUS
  • 16. DEVOPS IS A JOURNEY ITSELF INTRODUCING SECURITY ADDS TO THE COMPLEXITY
  • 17. CAN SECURITY PACE WITH THE RATE AT WHICH CODE IS PUSHED ?
  • 18. ENTER DEV SECOPS / SEC DEV / RUGGED DEV OPS = SECURITY AUTOMATION AT SCALE
  • 19. IMPACT OF SECURITY ON BUSINESS Proliferation of Shadow IT Business Agility impacted due to slow security cycles. Security unable to keep pace with Business Adhoc projects and rogue development True DevOps requires maturity Slow threat assessments Not enough patching Reactive security posture of the company SECURITY OPERATIONS
  • 20. WHAT ARE WE MISSING HERE ? Courtesy :Henrik Kniberg
  • 21. 1. We need to discover a solution that is valuable, usable, feasible and viable. 2. We need to deliver a solution that is reliable, scalable, performant and maintainable. & Of Course SECURE WHAT WE ARE NOT CAPTURING ARE THE UNDERLYING ISSUES
  • 22. Value Risk - will they use/buy it? Usability Risk - can they use it? Feasibility Risk - can we build it? Business Viability Risk - will this work for our business? Security Risk – Is our solution vulnerable or hack proof ? SOLVE OR BRAINSTORM ON THESE RISKS BEFORE YOU WRITE A LINE OF CODE
  • 23. DISCOVERY AND DELIVERY Courtesy : Marty Cagan SVPG Build to learn Build to run a business DUAL TRACK AGILE - JEFF PATTON More frequent Iterations per week 1 or 2 Iterations per week PRODUCT MANAGERS / DESIGNERS ENGINEERS
  • 24. Adapted from Courtesy : Marty Cagan SVPG SECURITY ADDING SECURITY TO THE ATTRIBUTE LIST
  • 25. Courtesy : Marty Cagan SVPG
  • 26. MOST OFTEN USED AT GOOGLE Courtesy : Marty Cagan SVPG
  • 27. Y-COMBINATOR TERMINOLOGY AiRBnB USES IT Courtesy : Marty Cagan SVPG
  • 28. Courtesy : Marty Cagan SVPG SPRINTS THAT WE NEED TO CONSIDER
  • 29. By 2021, DevSecOps practices will be embedded in 80 per cent of development teams, up from 15 per cent in 2017. -Gartner
  • 30. DEV SEC OPS - WHY Pace of innovation meets – Pace of Security Automation Scalable Architectures need Scalable Security Vulnerabilities need to be healed at the rate at which software is getting churned. Risk Identification and Remediation at the speed of delivery
  • 31. Slow threat assessments Can't patch fast enough Reactive security posture Lack of business agility Slow to onboard new customers Slow turn around time Trailblazer dev projects gone wrong Lack of SecOps agility PROBLEMS AS THEY STAND
  • 33. WHAT WE NEED ? MONITORING & SECURITY TO BE ADDED TO MAKE IT CONTINOUS PLAN – CODE –BUILD-TEST-RELEASE-DEPLOY-OPERATE-MONITOR-PLAN
  • 34. CLOUD ADDS TO THE COMPLEXITY MOVING TO THE CLOUD BABY STEPS MORE THAN ONE CLOUD MULTI CLOUD SCENARIO SECURITY RESOURCES & CHECKLISTS COMPLIANCE AND REGULATIONS OPEX
  • 35. DEVS OPS DESIGN REVIEW TEST UNIT TEST MOCK TESTS PERFORMANCE SECURITY MEMORY MANAGEMENT NRFS SECURITY RESPONSIVE NESS RUN STUFF BREAK THE BUILD REPEAT HOW DEVELOPERS SEE OPS FOLKS ?
  • 36. WHAT DEVELOPERS WANT ? Ease of checking in and checking out Able to play and experiment with emerging technologies Ability to push code regardless of the platform ABOVE ALL A GOOD NIGHTS SLEEP
  • 37. DEVS DEV ITIL COMPLIANCE REDUCE CARBON FOOTPRINT TEST GO GREEN SUPPORT DIFF ENVS TICKETING SECURITY VIRTUALIZE CMRB PCI DSS KEEP THE LIGHTS ON WRITE CODE TEST SOME AND RELEASE HOW OPERATIONS FOLKS SEE DEVELOPERS NETWORKS OS ACCESS CONTROL
  • 38. WHAT MAKES SECURITY FOLKS RELAX ALL VULNERABILITIES ARE DISCOVERED AND FIXED IN TIME ALL COMPLIANCES AND REGULATIONS ARE MET ALL ATTACKS HAVE A PLANNED STRATEGY AND NO SURPISES ABLE TO KEEP IN PACE WITH THE SPEED OF DEVELOPMENT AUTOMATED PROCESSES FOR STATIC AND DYNAMIC TEST ( SAST , DAST , IAST )
  • 39. WHAT WE NEED IS TOOLS AND PROCESS ? MONITORING & SECURITY TO BE ADDED TO MAKE IT CONTINOUS CHECKS PRESENT CHECKS PRESENT NEEDS ACTION NEEDS ACTION NEEDS ACTION NEEDS ACTION
  • 40. CI / CD SOLUTION IS ONE OF THE IMPORTANT TOOLS FOR DEVSECOPS
  • 41. CI / CD PIPLELINE IS WHERE THE ACTION HAPPENS BUILD PROCESSES ALONG THAT 1. REVIEW ACCESS ROLES 2. HARDENNING SERVERS AND NODES 3. ARTIFACTS / THIRD PARTY LIBS VALIDATION BEFORE ADDING THEM TO THE TRUNK 4. STATIC CODE ANALYSIS 5. DYNAMIC ANALYSIS
  • 42. MILLION DOLLAR QUESTION ? WHO BROKE THE BUILD ?
  • 43. DO NOT LET SECURITY BREAK YOUR BUILD When Cl breaks (and it breaks) it impacts everyone and everything in the process. Creating a significant delay in the release cycle. Start implementing security before the Continuous integration stage. If you have 365 developers and each developer breaks only a single build once a year (usually much more), you have an average of one build break per day.
  • 44. SECURITY CANNOT BE A BLOCKER IT HAS TO KEEP PACE
  • 45. SECURITY WISH LIST OPERATIONAL CHECKS AUTOMATIC FAULT DETECTION AND CORRECTION AUTOMATION REMIADIATION AUTOMATIC AUDITING & FORENSICS CODE LEVEL CHECKS SECURE CODING PRACTICES PRO ACTIVE CONTROLS IN THE CODE BUILD LEVEL CHECKS VULNERABILITY CHECKS CONFIGURATION SCRUBBING DEPLOY CHECKS CONTINOUS VULNERABILITY SCANS PICK ONLY AUTHENTIC IMAGES GRANT JUST ENOUGH SERVER ACCESS
  • 47. DEVOPS IS FOR HORSES TOO NOT ONLY UNICORNS MYTH
  • 48. IF YOU CAN DO IT FOR SAP YOU CAN DO IT FOR ANYTHING
  • 49. PROBLEMS & SOLUTIONS IN FRONT OF US
  • 50. PUSH THE RESPONSIBILTY TO THE DEVELOPERS Whitepaper : ROI of Shifting Left in your SDLC
  • 51. AIM FOR LESS FALSE POSITIVES AIM FOR HIGH QUALITY AIM FOR SPEED OF DELIVERY
  • 52. SECURITY NEEDS MORE THAN JUST LIP SERVICE Typically the ratio of DEVto OPSto SEC is 100/ 10 / 1
  • 54. Automatic has issues as Security Issues if found cannot be stopped How To Put The Sec In DevOps – Helen Bravo Manual has better control not faster
  • 55. THE NETFLIX WAY Aardvark and Repokid PRINCIPLE OF LEAST PRIVILEGE
  • 56. Positive testing determines that your application works as expected. If an error is encountered during positive testing, the test fails. Negative testing ensures that your application can gracefully handle invalid input or unexpected user behavior.
  • 57. Invite both sides of the table to the meeting DEV and OPS Incidents Threat Modelling Security Sprints Etc.
  • 59. MEASURE MEASURE & MEASURE
  • 60. FEED BACK PENETRATION RESULTS INTO UNIT TESTS
  • 61. CREATE A CULTURE WHICH IS HIGH ON THE SECURITY DNA Make it public when you fix things and update on internal wiki Share Point or CMDB for all fixes on Security Do not make it personal fix the issue not the person Arrange for tech talks to spread the know how of the fixes Educate DEV and OPS to read security tool analysis well Shadow resources who could build capabilities
  • 62. The further right the project is on the DevOps scale the further left it should start implementing security checks
  • 64. COST OF NOT FIXING AT THE RIGHT TIME SHIFT LEFT TO GAIN Courtesy : Tanya Janca, Senior Cloud Developer Advocate, Microsoft
  • 65. MOVE SECURITY UP THE CHAIN IN REVERSE ORDER Courtesy : Tanya Janca, Senior Cloud Developer Advocate, Microsoft
  • 67. ACTION ITEMS POST THIS CONFERENCE
  • 68. Add security verification to Cl/CD Pipelines Critical security bugs break the build In the first three months following this presentation you should: Create Negative Unit Tests from existing positive unit tests Lessons on top 3 security bugs High security bugs break the build Within six months you should: Regular lessons on AppSec, including a security exercise or simulation Improvements of security processes for speed and removal of obstacles Creation of parallel security pipeline Medium security bugs break the build NEXT STEPS FOR YOU
  • 69. LIST OF TOOLS OUT THERE
  • 70. USEFUL THOUGHT TO CARRY ☺
  • 71. REFERENCES 1. https://www.linkedin.com/pulse/dynamics-devops-adoption-dr-pallab-saha/ 2. https://www.youtube.com/watch?v=Qa_Fq7wWRdA 3. https://developer.akamai.com/blog/2017/10/11/cdns-evolving-role-new-devops-world 4. https://www.youtube.com/watch?v=Qa_Fq7wWRdA 5. https://www.youtube.com/watch?v=i43yWwcQfTs&list=PLjNII-Jkdjfz5EXWlGMBRk63PC8uJsHMo&index=3 6. https://www.youtube.com/watch?v=ayKTn2ZgGJI 7. https://www.youtube.com/watch?v=0KG9XRCKK78&t=108s 8. https://www.waratek.com/waf-to-runtime-protection/ 9. https://www.opengroup.org/cio/ReferenceArc-Final1.pdf