SlideShare a Scribd company logo
DEV OPS
SEC
Integrating Security
Into DevOps
Implementing DevOps is known for:
Boosting efficiency
Cutting costs
Helping businesses flourish better
Security has not been the easiest to set up around a DevOps implementation. Security professionals need
to have a crystal clear understanding as to how their practices can be applied in the development and
production stages. They need time.
The ever-increasing demand for lightning pace delivery of software using DevOps and agile strategies,
with technologies like containers and public cloud, has caused a rift between the software production
teams and the security teams who, instead, need time.
Putting security at the end often fails because
many issues can be resolved at an initial level if
security experts were involved right from the
design phase. So the perfect solution is to have
security practices integrated throughout the entire
software delivery cycle.
Why
DevSecOps?
The key benefit of DevOps is speed and continuous delivery. But, with
secure DevOps, teams often suffer from the notion that there’s a tradeoff
between security and speed. However, that is not the scenario always.
Prudent use of Security automation allows the teams to maintain both security
and speed. The automated security testing makes the security consistent and
less vulnerable to human errors.
Shifting of the security practices left towards the design phase is a major
advantage. It is a big achievement to catch the security loophole at the design or
the development phase of a new feature.
This is what DevSecOps tooling strategies aim at.
How To
Approach?
People often avoid documentation and it is highly possible to change the security
skeleton of the DevOps team without even going for a single line of
documentation. Though it is hard to imagine, it is possible through instilling
security behaviors.
The 3 security behaviors to focus on:
● Threat modeling
● Code review
● Red teaming
Threat Modeling
Threat modeling involves considering the various
security impact of every design decision and you
need to start thinking like attackers, hackers or
infiltrators to your own system to search for the
loopholes.
Threat Modeling
You need to verify and select the design that will
protect the integrity of the customer data. In a
majority of the cases, DevOps teams view the
design form agile perspective, leaving behind the
security concerns. However, Threat Modeling
ensures to embed security directly into the
practices and design decisions.
Code Review
The code review security behavior revolves
around finding security concerns and flaws in the
code. This security behavior ensures to figure out
the errors in the code that may prove to be fatal if
it reaches the production. The DevOps teams use
stringent infrastructure and make sure that code
review is mandatory with each check-in to the
main line.
Red Teaming
The last security behavior, red teaming involves
attacking your code with the same level of ferocity
as potential attackers would do when it reaches
production. This helps in revealing the flaws using
rigorous testing, fixing them and pushing it to
production quickly.
Principles to
follow
The aim at establishing secure DevOps lies on two
major principles:
● Security as code
● Infrastructure as a code
The security as code involves building security into
the existing tools in the DevOps pipeline. It includes
usage of static analysis tools to validate portions
of code that has been modified rather than
scanning the entire codebase.
On the other hand, Infrastructure as code defines
the various DevOps tools to set up and update the
infrastructure components. A few examples include
Ansible, Puppet, etc. The system administrators no
longer fix the issues on a system. With the IaC if
your system lacks or faces an issue it is completely
disintegrated and a new one is generated to fill in
the gap.
Official Blog Link -
http://www.algoworks.com/blog/devsecop
s-integrating-security-into-devops/
Mail us at: sales@algoworks.com
Contact us at: +1-877-284-1028

More Related Content

PPTX
Haven’t Switched To ECM Yet? Think About Alfresco!
PPTX
Why and When Enterprise Should Adopt NativeScript for App Development
PPTX
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
PPTX
Strategies To Develop Location Aware Hyperlocal Android Apps
PPTX
Quickbooks Integration with Salesforce - Tips from Certified Consultants
PPTX
5 Hottest Trends The DevOps World Wants You To Know!
PPTX
Salesforce® Summer’17 To Raise The Temperature This Season!
PPTX
Salesforce Security – An Encryption Guide For The Paranoid
Haven’t Switched To ECM Yet? Think About Alfresco!
Why and When Enterprise Should Adopt NativeScript for App Development
[Business Strategy] DevOps Implementation Failure. Save It Before You Fail It!
Strategies To Develop Location Aware Hyperlocal Android Apps
Quickbooks Integration with Salesforce - Tips from Certified Consultants
5 Hottest Trends The DevOps World Wants You To Know!
Salesforce® Summer’17 To Raise The Temperature This Season!
Salesforce Security – An Encryption Guide For The Paranoid

What's hot (20)

PDF
Microservices Tools | Edureka
PDF
CodeBuild CodePipeline CodeDeploy CodeCommit in AWS | Edureka
PDF
The Business Benefits of GitOps
PDF
Dev secops managed service - kaiburr
PDF
Build & Track Your Mobile App
PDF
Azure Certification AZ-203 | Edureka
PDF
App center an overview
PDF
What Keeps Amazon Web Services Cloud On Top?
PDF
apidays LIVE Singapore - Green APIs by Alex-Adrien Auger, Sipios
PDF
Using Cookies to Store Your Postman Secrets
DOCX
linkedin-priceline
PDF
Intelligent Mobile App と Cloud Native が創るアプリ開発の未来 ~ これからの時代のアプリケーション開発ビジョン ~
PDF
Apex day 1.0 foex plugin framework peter raganitsch
PPTX
System Integration using Reactive Programming | Integration Monday
PPTX
How to Get Unstuck
PPTX
Creating reusable pieces in Logic Apps
PPTX
Connecting Your In-Premise Database To Mobile Apps
PPTX
Idea to production
PDF
Power apps for business applications
PPTX
Ian Margetts - ASOS’ Journey to Continuous Deployment
Microservices Tools | Edureka
CodeBuild CodePipeline CodeDeploy CodeCommit in AWS | Edureka
The Business Benefits of GitOps
Dev secops managed service - kaiburr
Build & Track Your Mobile App
Azure Certification AZ-203 | Edureka
App center an overview
What Keeps Amazon Web Services Cloud On Top?
apidays LIVE Singapore - Green APIs by Alex-Adrien Auger, Sipios
Using Cookies to Store Your Postman Secrets
linkedin-priceline
Intelligent Mobile App と Cloud Native が創るアプリ開発の未来 ~ これからの時代のアプリケーション開発ビジョン ~
Apex day 1.0 foex plugin framework peter raganitsch
System Integration using Reactive Programming | Integration Monday
How to Get Unstuck
Creating reusable pieces in Logic Apps
Connecting Your In-Premise Database To Mobile Apps
Idea to production
Power apps for business applications
Ian Margetts - ASOS’ Journey to Continuous Deployment
Ad

Similar to DevSecOps: Integrating Security Into DevOps! {Business Security} (20)

PPTX
What is devsecops and what is the characteristics of it
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PPTX
DevSecOps-Explained-converted.pptx
PDF
Why You Should Implement DevSecOps Approach?
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PDF
Strengthen and Scale Security for a dollar or less
PDF
DevSecOps Security: Is it Necessary?
PPTX
Devsec ops
PDF
Working on DevSecOps culture - a team centric view
PDF
DevSecOps at Agile 2019
PPTX
Why You Should Implement DevSecOps Approach?
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PDF
Scale security for a dollar or less
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DOCX
DevSecOps – The Importance of DevOps Security in 2023.docx
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DOCX
The Importance of DevOps Security in 2023.docx
PPTX
DevSecOps Story with added security controls
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
What is devsecops and what is the characteristics of it
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
DevSecOps-Explained-converted.pptx
Why You Should Implement DevSecOps Approach?
Why Security Engineer Need Shift-Left to DevSecOps?
Strengthen and Scale Security for a dollar or less
DevSecOps Security: Is it Necessary?
Devsec ops
Working on DevSecOps culture - a team centric view
DevSecOps at Agile 2019
Why You Should Implement DevSecOps Approach?
The Rise of DevSecOps in CI_CD Workflows.pdf
Scale security for a dollar or less
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
The Importance of DevOps Security in 2023.docx
DevSecOps Story with added security controls
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
DevSecOps Best Practices-Safeguarding Your Digital Landscape
Ad

More from Algoworks Inc (20)

PDF
Fintech Meetup 2024: The Best Fintech Show of the Year
PPTX
Dreamforce 23: Where Salesforce Meets AI
PPTX
Dreamforce 2022 - Algoworks.pptx
PPTX
The Next Big Thing In Mobile App Development – Trends 2019!
PPTX
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
PPTX
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
PPTX
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
PDF
DevOps & Its Impact | An Infographic
PPTX
Top 6 Upcoming Big Data Trends of 2018!
PPTX
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
PPTX
Xamarin Test Cloud – Automating Testing Effectively
PPTX
Latest Mobile App Development Trends
PPTX
User Manual Guide: Case Management App on Salesforce AppExchange
PPTX
10 top notch big data trends to watch out for in 2017
PPTX
Native WebRTC Mobile App Development: Tools & Tips
PDF
The Mobile Grenade | An Infographic
PDF
The Mobile Story 2016 [Infographic]
PDF
Mobile Retail and You | An Infographic
PDF
Mobile Marketing Mania [Infographic]
PPTX
Dreamforce 2016 : Highlights, Hacks and Rumors
Fintech Meetup 2024: The Best Fintech Show of the Year
Dreamforce 23: Where Salesforce Meets AI
Dreamforce 2022 - Algoworks.pptx
The Next Big Thing In Mobile App Development – Trends 2019!
The Best Design Trend Is To Not Follow One. We have 6! : UI Design Trends 2019!
[Business Strategy] Pump Up Your Revenue: Retain Customers With Salesforce!
Happening Dreamforce Parties 2018 | Dreamforce 2018 Countdown Is On. Are You ...
DevOps & Its Impact | An Infographic
Top 6 Upcoming Big Data Trends of 2018!
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
Xamarin Test Cloud – Automating Testing Effectively
Latest Mobile App Development Trends
User Manual Guide: Case Management App on Salesforce AppExchange
10 top notch big data trends to watch out for in 2017
Native WebRTC Mobile App Development: Tools & Tips
The Mobile Grenade | An Infographic
The Mobile Story 2016 [Infographic]
Mobile Retail and You | An Infographic
Mobile Marketing Mania [Infographic]
Dreamforce 2016 : Highlights, Hacks and Rumors

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced IT Governance
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Transforming Manufacturing operations through Intelligent Integrations
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Advanced IT Governance
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

DevSecOps: Integrating Security Into DevOps! {Business Security}

  • 2. Implementing DevOps is known for: Boosting efficiency Cutting costs Helping businesses flourish better
  • 3. Security has not been the easiest to set up around a DevOps implementation. Security professionals need to have a crystal clear understanding as to how their practices can be applied in the development and production stages. They need time. The ever-increasing demand for lightning pace delivery of software using DevOps and agile strategies, with technologies like containers and public cloud, has caused a rift between the software production teams and the security teams who, instead, need time.
  • 4. Putting security at the end often fails because many issues can be resolved at an initial level if security experts were involved right from the design phase. So the perfect solution is to have security practices integrated throughout the entire software delivery cycle.
  • 6. The key benefit of DevOps is speed and continuous delivery. But, with secure DevOps, teams often suffer from the notion that there’s a tradeoff between security and speed. However, that is not the scenario always.
  • 7. Prudent use of Security automation allows the teams to maintain both security and speed. The automated security testing makes the security consistent and less vulnerable to human errors. Shifting of the security practices left towards the design phase is a major advantage. It is a big achievement to catch the security loophole at the design or the development phase of a new feature. This is what DevSecOps tooling strategies aim at.
  • 9. People often avoid documentation and it is highly possible to change the security skeleton of the DevOps team without even going for a single line of documentation. Though it is hard to imagine, it is possible through instilling security behaviors. The 3 security behaviors to focus on: ● Threat modeling ● Code review ● Red teaming
  • 10. Threat Modeling Threat modeling involves considering the various security impact of every design decision and you need to start thinking like attackers, hackers or infiltrators to your own system to search for the loopholes.
  • 11. Threat Modeling You need to verify and select the design that will protect the integrity of the customer data. In a majority of the cases, DevOps teams view the design form agile perspective, leaving behind the security concerns. However, Threat Modeling ensures to embed security directly into the practices and design decisions.
  • 12. Code Review The code review security behavior revolves around finding security concerns and flaws in the code. This security behavior ensures to figure out the errors in the code that may prove to be fatal if it reaches the production. The DevOps teams use stringent infrastructure and make sure that code review is mandatory with each check-in to the main line.
  • 13. Red Teaming The last security behavior, red teaming involves attacking your code with the same level of ferocity as potential attackers would do when it reaches production. This helps in revealing the flaws using rigorous testing, fixing them and pushing it to production quickly.
  • 15. The aim at establishing secure DevOps lies on two major principles: ● Security as code ● Infrastructure as a code
  • 16. The security as code involves building security into the existing tools in the DevOps pipeline. It includes usage of static analysis tools to validate portions of code that has been modified rather than scanning the entire codebase.
  • 17. On the other hand, Infrastructure as code defines the various DevOps tools to set up and update the infrastructure components. A few examples include Ansible, Puppet, etc. The system administrators no longer fix the issues on a system. With the IaC if your system lacks or faces an issue it is completely disintegrated and a new one is generated to fill in the gap.
  • 18. Official Blog Link - http://www.algoworks.com/blog/devsecop s-integrating-security-into-devops/ Mail us at: [email protected] Contact us at: +1-877-284-1028