SlideShare a Scribd company logo
2
Most read
4
Most read
15
Most read
z
DevSecOps
Prashanth Bharathi Prakash
z
Its an evolution..
z
The Facts
• 159,700 total cyber incidents
• 7 billion records exposed in first 3 Qtr
• $5 billion financial impact
• 93% of breaches could have been prevented
*Online Trust Alliance report 2018
z
How we manage software security?
Source: “Managing Application Security”, Security Compass, 2017.
z
Challenges of Secure Software
Development
 Legacy Software
 Writing Secure code is hard
 Lack of security skills
 Emphasis on speed
 Lack of risk focus, audits
and controls points
 Unsupervised collaboration
 Wrong automated tools
 Best practices are
insufficient!
 Vulnerabilities in
development pipeline
z
So we do last minute security..
z
Lets define DevSecOps
 Do we need Security? Obviously! → DevSecOps
 Do we need order in configuration? Sure! → DevSecConfOps
 And do we need to automate? Ideally yes. → DevSecConfAutoOps
 Resilient? This is so important! → DevSecConfAutoResOps
 Backups! We forgot about backups! → DevSecConfAutoResBackOps
 Monitoring :-) → DevSecConfAutoResBackMonOp
 Should I stop here? No → DevSecConfAutoResBackMonNoOp
 Pigeons ate my breakfast while I was entertaining you →
DevSecConfAutoResBackMonNoPigeonsAteMyBreakfastWhileIwasEntertaining
YouOps
z
Security becomes paramount in the new world
of connected devices and must be addressed
without breaking the rapid delivery, continuous
feedback model!
z
The Guiding Principles
 Security is everybody’s business!
 Start with the 3 Ps:
 People
 Process
 Platform
 Establish a process to enable people to succeed in using
platform to develop secure applications
 Build on existing people, process and tools
z
The Guiding Principles
Adopt Secure-by-Design rather than Secure-by-Test approach
Enable development teams to create secure applications
Automate as much as possible
Reuse existing technology as much as possible
Heavy collaboration between all stakeholders
z
People
 Invest in training on security skills!
 Make learning a fun exercise!
 Collaborate heavily (Dev Sec Ops)
 Secure Design Decisions
 Secure Environment Configuration
 Secure Deployment planning
 Secure code review
z
Platforms
 Automate environment
creation and provisioning
 Maintain parity between
environments: dev, QA and
production
 Automated infrastructure
testing
 Be Open-Source aware!
z
Process
 Build on existing risk assessment processes / policies
 Check the awareness of security policies in dev & ops teams
 Create new processes only to improve existing ones
Change is a journey.. Not a sprint !!
z
How to bring-in Operations
Monitor Key KPIs
No. of applications threat modelled / scanned for vulnerabilities
No. of applications reviewed by Architects
No. of security requirements implemented
% of open source libraries analysed
Total number of critical and high vulnerabilities
Number of penetration test vulnerabilities detected
….
Monitor, Feedback, Remediate and Improve
z
DevSecOps In Action
Source
Control
Code
Review
Build
Code
Quality
Deploy Testing A/B TestDesign
Secure
Coding
Cloud-based hosting and access to application services through Cloud Platform Release
Code Analysis
(SonarQube, Coverity and
Black Duck)
Threat Modeling
(Microsoft Threat
Modeller, Secure
Tree)
Secure Coding Practices
(Source Code Warrior, in-
house trainings)
Static Application
Security Scanning
(Fortify, Veracode, Coverity)
Dynamic App Security
Scanner
(Fortify, IBM AppScan,
Chekmarx, Veracode)
DevSecOps Enabling tools
Integrated
Development
Environment (Eclipse,
X-code)
Source Code Repository
(Git / Gerrit)
Continuous Integration
(Jenkins)
Deploy
(Chef, Docker, Kubernetes)
Test
(Selenium, Grid, Cucumber)
DevOps Enabling tools
z
Reference Services for DevSecOps
 Governance
 Maturity Assessment
 Process Engineering
 Secure-By-Design
 Security Training Curriculum
 Threat Modeling
 Code scanning Tool Integration
 SAST, DAST, OSCA
 Penetration Testing
 DevSecOps Operationalization
 Monitoring and Operations
 SEIM Integration
 Infrastructure Security
z
Summary
 DevSecOps is cultural change encompassing people, processes
and technologies.
 There is no “one-size fits-all“ scenario.
 New technologies and ubiquitous access across devices /
platforms makes application security the central focal point in
software development.
DevSecOps is the new mantra in S/W Dev Methodology
z
For more information
 SEI –Carnegie Mellon University
 DevOps Blog: https://insights.sei.cmu.edu/devops
 Webinar : https://www.sei.cmu.edu/publications/webinars/index.cfm
 Podcast : https://www.sei.cmu.edu/publications/podcasts/index.cfm
 DevSecOps: http://www.devsecops.org
 Rugged Software: https://www.ruggedsoftware.org

More Related Content

PDF
DevSecOps: Taking a DevOps Approach to Security
PPTX
DevSecOps
PDF
DevSecOps Basics with Azure Pipelines
PPTX
DevOps to DevSecOps Journey..
PDF
DevSecOps in Baby Steps
PDF
DevSecOps | DevOps Sec
PPTX
ABN AMRO DevSecOps Journey
PDF
Practical DevSecOps Course - Part 1
DevSecOps: Taking a DevOps Approach to Security
DevSecOps
DevSecOps Basics with Azure Pipelines
DevOps to DevSecOps Journey..
DevSecOps in Baby Steps
DevSecOps | DevOps Sec
ABN AMRO DevSecOps Journey
Practical DevSecOps Course - Part 1

What's hot (20)

PDF
The State of DevSecOps
PDF
The What, Why, and How of DevSecOps
PDF
Introduction to DevSecOps
PDF
2019 DevSecOps Reference Architectures
PDF
DevSecOps and the CI/CD Pipeline
PDF
DevSecOps Implementation Journey
PDF
Security Process in DevSecOps
PDF
DevSecOps What Why and How
PDF
Demystifying DevSecOps
PPTX
DEVSECOPS.pptx
PDF
DevSecOps, The Good, Bad, and Ugly
PPTX
DevSecOps reference architectures 2018
PDF
Practical DevSecOps - Arief Karfianto
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
Shift Left Security
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
The State of DevSecOps
The What, Why, and How of DevSecOps
Introduction to DevSecOps
2019 DevSecOps Reference Architectures
DevSecOps and the CI/CD Pipeline
DevSecOps Implementation Journey
Security Process in DevSecOps
DevSecOps What Why and How
Demystifying DevSecOps
DEVSECOPS.pptx
DevSecOps, The Good, Bad, and Ugly
DevSecOps reference architectures 2018
Practical DevSecOps - Arief Karfianto
DevSecOps: What Why and How : Blackhat 2019
Shift Left Security
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecOps Training Bootcamp - A Practical DevSecOps Course
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Ad

Similar to DevSecOps : an Introduction (20)

PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PPTX
DevSecOps Powerpoint Presentation for Students
PDF
Scale security for a dollar or less
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
PPTX
The DevSecOps Advantage: A Comprehensive Guide
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PPTX
Devsec ops
PDF
How To Implement DevSecOps In Your Existing DevOps Workflow
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
Secure DevOPS Implementation Guidance
PPTX
What is devsecops and what is the characteristics of it
PDF
AppSec How-To: Achieving Security in DevOps
PDF
Understanding DevSecOps.pdf
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
DevSecOps OWASP
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps Best Practices-Safeguarding Your Digital Landscape
The Rise of DevSecOps in CI_CD Workflows.pdf
DevSecOps Powerpoint Presentation for Students
Scale security for a dollar or less
From DevOps to DevSecOps: Evolution of Secure Software Development
The DevSecOps Advantage: A Comprehensive Guide
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
Devsec ops
How To Implement DevSecOps In Your Existing DevOps Workflow
Outpost24 webinar: Turning DevOps and security into DevSecOps
Secure DevOps - Evolution or Revolution?
Secure DevOPS Implementation Guidance
What is devsecops and what is the characteristics of it
AppSec How-To: Achieving Security in DevOps
Understanding DevSecOps.pdf
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Succeeding-Marriage-Cybersecurity-DevOps final
DevSecOps OWASP
Why Security Engineer Need Shift-Left to DevSecOps?
DevSecOps: Integrating Security Into DevOps! {Business Security}
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
August Patch Tuesday
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
August Patch Tuesday
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cloud_computing_Infrastucture_as_cloud_p
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TLE Review Electricity (Electricity).pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative study of natural language inference in Swahili using monolingua...
Machine Learning_overview_presentation.pptx
1. Introduction to Computer Programming.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
SOPHOS-XG Firewall Administrator PPT.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Machine learning based COVID-19 study performance prediction

DevSecOps : an Introduction

  • 3. z The Facts • 159,700 total cyber incidents • 7 billion records exposed in first 3 Qtr • $5 billion financial impact • 93% of breaches could have been prevented *Online Trust Alliance report 2018
  • 4. z How we manage software security? Source: “Managing Application Security”, Security Compass, 2017.
  • 5. z Challenges of Secure Software Development  Legacy Software  Writing Secure code is hard  Lack of security skills  Emphasis on speed  Lack of risk focus, audits and controls points  Unsupervised collaboration  Wrong automated tools  Best practices are insufficient!  Vulnerabilities in development pipeline
  • 6. z So we do last minute security..
  • 7. z Lets define DevSecOps  Do we need Security? Obviously! → DevSecOps  Do we need order in configuration? Sure! → DevSecConfOps  And do we need to automate? Ideally yes. → DevSecConfAutoOps  Resilient? This is so important! → DevSecConfAutoResOps  Backups! We forgot about backups! → DevSecConfAutoResBackOps  Monitoring :-) → DevSecConfAutoResBackMonOp  Should I stop here? No → DevSecConfAutoResBackMonNoOp  Pigeons ate my breakfast while I was entertaining you → DevSecConfAutoResBackMonNoPigeonsAteMyBreakfastWhileIwasEntertaining YouOps
  • 8. z Security becomes paramount in the new world of connected devices and must be addressed without breaking the rapid delivery, continuous feedback model!
  • 9. z The Guiding Principles  Security is everybody’s business!  Start with the 3 Ps:  People  Process  Platform  Establish a process to enable people to succeed in using platform to develop secure applications  Build on existing people, process and tools
  • 10. z The Guiding Principles Adopt Secure-by-Design rather than Secure-by-Test approach Enable development teams to create secure applications Automate as much as possible Reuse existing technology as much as possible Heavy collaboration between all stakeholders
  • 11. z People  Invest in training on security skills!  Make learning a fun exercise!  Collaborate heavily (Dev Sec Ops)  Secure Design Decisions  Secure Environment Configuration  Secure Deployment planning  Secure code review
  • 12. z Platforms  Automate environment creation and provisioning  Maintain parity between environments: dev, QA and production  Automated infrastructure testing  Be Open-Source aware!
  • 13. z Process  Build on existing risk assessment processes / policies  Check the awareness of security policies in dev & ops teams  Create new processes only to improve existing ones Change is a journey.. Not a sprint !!
  • 14. z How to bring-in Operations Monitor Key KPIs No. of applications threat modelled / scanned for vulnerabilities No. of applications reviewed by Architects No. of security requirements implemented % of open source libraries analysed Total number of critical and high vulnerabilities Number of penetration test vulnerabilities detected …. Monitor, Feedback, Remediate and Improve
  • 15. z DevSecOps In Action Source Control Code Review Build Code Quality Deploy Testing A/B TestDesign Secure Coding Cloud-based hosting and access to application services through Cloud Platform Release Code Analysis (SonarQube, Coverity and Black Duck) Threat Modeling (Microsoft Threat Modeller, Secure Tree) Secure Coding Practices (Source Code Warrior, in- house trainings) Static Application Security Scanning (Fortify, Veracode, Coverity) Dynamic App Security Scanner (Fortify, IBM AppScan, Chekmarx, Veracode) DevSecOps Enabling tools Integrated Development Environment (Eclipse, X-code) Source Code Repository (Git / Gerrit) Continuous Integration (Jenkins) Deploy (Chef, Docker, Kubernetes) Test (Selenium, Grid, Cucumber) DevOps Enabling tools
  • 16. z Reference Services for DevSecOps  Governance  Maturity Assessment  Process Engineering  Secure-By-Design  Security Training Curriculum  Threat Modeling  Code scanning Tool Integration  SAST, DAST, OSCA  Penetration Testing  DevSecOps Operationalization  Monitoring and Operations  SEIM Integration  Infrastructure Security
  • 17. z Summary  DevSecOps is cultural change encompassing people, processes and technologies.  There is no “one-size fits-all“ scenario.  New technologies and ubiquitous access across devices / platforms makes application security the central focal point in software development. DevSecOps is the new mantra in S/W Dev Methodology
  • 18. z For more information  SEI –Carnegie Mellon University  DevOps Blog: https://insights.sei.cmu.edu/devops  Webinar : https://www.sei.cmu.edu/publications/webinars/index.cfm  Podcast : https://www.sei.cmu.edu/publications/podcasts/index.cfm  DevSecOps: http://www.devsecops.org  Rugged Software: https://www.ruggedsoftware.org

Editor's Notes

  • #8: Placing Sec between Dev and Ops is the ideal way to show that one doesn't understand anything about sorting apples and oranges.
  • #17: DevSecOps Operationalization Monitoring and Operations SEIM Integration Infrastructure Security