SlideShare a Scribd company logo
Security Process
in
Jirayut Nimsaeng (Dear)
CEO & Founder, Opsta (Thailand) Co.,Ltd.
TechTalkThai Conference: Enterprise Cybersecurity 2021
October 5, 2021 https://bit.ly/opsta-ttt-sec-in-devops
Security Process in DevSecOps
#whoami
Jirayut Nimsaeng (Dear)
Jirayut has been involved in DevSecOps, Container, Cloud
Technology and Open Source for over 10 years. He has experienced
and succeeded in transforming several companies to deliver greater
values and be more agile.
● He is Founder and CEO of Opsta (Thailand) Co.,Ltd.
● He is Cloud/DevSecOps Transformation Consultant and
Solution Architecture
● He is the first Certified Kubernetes Security Specialist
(CKS) and Certified Kubernetes Administrator (CKA) in
Thailand
Security Process in DevSecOps
Agenda
● Automation Security
● Precommit Stage
● Acceptance Stage
● Production Stage
● Wrap Up
Security Process in DevSecOps
Security
Process in
Automation Security
Security Process in DevSecOps
DevOps Flow
Infrastructure
Support
Tools
VCS
Artifacts
CI CD
Dev
Test
Prod
Monitoring
Load Testing
Automation &
Infrastructure as Code
Developer
Operation
& SRE
Communication
Security
Security
Security Process in DevSecOps
DevSecOps Flow
Infrastructure
Support
Tools
VCS
Artifacts
CI CD
Dev
Test
Prod
Monitoring
Load Testing
Automation &
Infrastructure as Code
Developer
Operation
& SRE
Security
Communication
Security Shift Left with Automation
Security Process in DevSecOps
Automation Security
Infrastructure
Support
Tools
VCS
Artifacts
CI CD
Dev
Test
Prod
Monitoring
Load Testing
Automation &
Infrastructure as Code
Developer
Operation
& SRE
Security
Automation Security
Communication
Security Process in DevSecOps
Security Automation in every steps
Secure Coding
SAST
SCA
Vulnerability Assessment
Penetration Testing
IAST
Compliance
Validation
Threat
Intelligence
Secret Manager
DAST
Binary Analysis
Threat
Modelling
SOC
SOAR
Security Process in DevSecOps
Automation Security Tools
Code Build Secret
Test Release Runtime Monitor
Multi-purpose Commercial
Security Process in DevSecOps
Security Stages on DevOps Flow
Code Build Secret
Test Release Runtime Monitor
Precommit Stage Acceptance Stage Production Stage
Security Process in DevSecOps
Security
Process in
Automation Security:
Precommit Stage
Security Process in DevSecOps
Secure Coding
Secure coding is the practice of writing software that's protected
from vulnerabilities. Some examples below refer from OWASP Secure
Coding Practices
● Input Validation
● Authentication and Password Management
● Session Management
● Access Control
● Cryptographic Practices
● Error Handling and Logging
● Communication Security
● and much more...
Security Process in DevSecOps
SAST (Static Application Security Testing)
SAST is a testing methodology that analyzes source code to find
security vulnerabilities. SAST scans an application before the code is
compiled. It’s also known as white box testing.
Security Process in DevSecOps
SAST (Static Application Security Testing)
Security Process in DevSecOps
SCA (Software Composition Analysis)
SCA scans source code to inventory all open-source components to
eliminate vulnerabilities those listed in the National Vulnerability Database
(NVD) and compatibility issues with open-source licenses.
Security Process in DevSecOps
SCA (Software Composition Analysis)
Security Process in DevSecOps
Security
Process in
Automation Security:
Acceptance Stage
Security Process in DevSecOps
Software Security Testing (1)
Software security testing is the process of assessing and testing a system to
discover security risks and vulnerabilities of the system and its data.
● Penetration Testing - The system undergoes analysis and attack from
simulated malicious attackers.
● Fuzz Testing - is a brute-force reliability testing technique wherein you
create and inject random data into a file or API in order to intentionally
cause errors and then see what happens
Security Process in DevSecOps
Software Security Testing (2)
● Vulnerability Assessment - The system is scanned and analyzed for
security issues.
● DAST (Dynamic Application Security Testing) tools automate security
tests for a variety of real-world threats. DAST is a black-box testing method
to identify vulnerabilities in their applications from an external
perspective to better simulate threats most easily accessed by hackers
outside their organization
Security Process in DevSecOps
VA Scan and DAST
Security Process in DevSecOps
IAST (Interactive Application Security Testing)
IAST instruments applications by deploying agents and sensors in
running applications and continuously analyzing all application
interactions initiated by manual tests, automated tests, or a combination of
both to identify vulnerabilities in real time
Security Process in DevSecOps
IAST (Interactive Application Security Testing)
Security Process in DevSecOps
Infrastructure as Code (IaC) Security
IaC Security test and monitor your infrastructure as code such as
Ansible, Terraform modules and Kubernetes YAML, JSON, and Helm charts
to detect configuration issues that could open your deployments to attack
and malicious behavior.
Security Process in DevSecOps
Kubernetes Security
● Kubernetes Certificates
● Secret
● Network Policy
● Namespace
● Quota
● TLS Ingress Endpoint
● Secure Node Metadata
● CIS Benchmark
● Verify Platform Binary
● Harden Docker Image
● Image Policy Webhook
● Immutability
● RBAC
● Secure Service Account
● Secure API Endpoint
● Admission Controller
● Node Restriction
● Runtime Sandbox
● Non-Root Container
● Security Context
● Pod Security Policy
● Open Policy Agent
● Auditing
Security Process in DevSecOps
Container Image Security
Container security software is used to secure multiple components
of containerized applications or files, along with their infrastructure and
connected networks. Testing capabilities will assist in developing security
policies, discover zero-day vulnerabilities, and simulate attacks from
common threat sources.
Security Process in DevSecOps
Container Image Security
Security Process in DevSecOps
Signed Container Image
Security Process in DevSecOps
Secrets Management
Secrets management refers to the tools and methods for managing
digital authentication credentials (secrets), including passwords, keys, APIs,
and tokens for use in applications, services, privileged accounts and other
sensitive parts of the IT ecosystem.
Security Process in DevSecOps
Privileged Access Management (PAM)
PAM software allows companies to secure their privileged credentials
in a centralized, secure vault (a password safe). Additionally, these
solutions control who has access to, and therefore who can use, the
privileged credentials based on access policies (including user permissions
and specific timeframes), often recording or logging user activity while
using the credentials.
Security Process in DevSecOps
Privileged Access Management (PAM)
Security Process in DevSecOps
Security
Process in
Automation Security:
Production Stage
Security Process in DevSecOps
Automation Security Baseline
Automation Security Baseline build standard hardening steps into
your recipes instead of using scripts or manual checklists. This includes
minimizing the attack surface by removing all packages that aren’t needed
and that have known problems; and changing default configurations to be
safe.
Security Process in DevSecOps
Automation Security Baseline Tools
Security Process in DevSecOps
Cloud Security Automation
● Monitoring - it is necessary that you monitor the workflow of all the
tasks in your infrastructure.
● Evaluation - give you insights into which tasks can be automated like
repetitive tasks, resource provisioning, deployments, creating security
rules, etc.
● In-depth analysis - analyze the collected information in depth by
differentiating it on the basis of severity as high, medium or low risk.
● Reporting - The automation processes should be configured to
generate the reports to present the overview of the changes before or
after.
● Remediations - implement remediation and improve overall security
posture.
Security Process in DevSecOps
RASP (Run-time Application Security Protection)
RASP works inside the application. It’s plugged into an application or
its runtime environment and can control application execution. RASP lets
an app run continuous security checks on itself and respond to live
attacks by terminating an attacker’s session and alerting defenders to the
attack.
Security Process in DevSecOps
WAF (Web Application Firewall)
WAF or Web Application Firewall helps protect web applications by
filtering and monitoring HTTP traffic between a web application and the
Internet. It typically protects web applications from attacks such as
cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection,
among others. A WAF is a protocol layer 7 defense (in the OSI model)
Security Process in DevSecOps
Security monitoring, sometimes referred to as "security information
monitoring (SIM)" or "security event monitoring (SEM)," involves
collecting and analysing information to detect suspicious behavior or
unauthorised system changes on your network, defining which types of
behavior should trigger alerts, and taking action on alerts as needed.
Security Monitoring
Security Process in DevSecOps
Security
Process in
Wrap Up
Security Process in DevSecOps
Automation Security
Agile
Focus
DevOps
Focus on Automation
Security in every steps
with Automation
Code Build Integrate Test Release Configure Monitor
Plan Deploy
Security Process in DevSecOps
More questions?
jirayut@opsta.co.th
Jirayut Nimsaeng
CEO & Founder
Opsta (Thailand)
086-069-4042
Facebook

More Related Content

PPTX
DEVSECOPS.pptx
PDF
DevSecOps Implementation Journey
PDF
Scaling DevSecOps Culture for Enterprise
PDF
Snyk Intro - Developer Security Essentials 2022
PPTX
CI/CD Overview
PDF
Continuous Inspection of Code Quality: SonarQube
DEVSECOPS.pptx
DevSecOps Implementation Journey
Scaling DevSecOps Culture for Enterprise
Snyk Intro - Developer Security Essentials 2022
CI/CD Overview
Continuous Inspection of Code Quality: SonarQube

What's hot (20)

PDF
DevSecOps and the CI/CD Pipeline
PDF
Practical DevSecOps Course - Part 1
PDF
Demystifying DevSecOps
PDF
2019 DevSecOps Reference Architectures
PDF
The State of DevSecOps
PPTX
Introduction to DevSecOps
PDF
DevSecOps | DevOps Sec
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PPTX
Introduction to DevOps
PDF
Shift Left Security - The What, Why and How
PDF
DevSecOps Basics with Azure Pipelines
PDF
The What, Why, and How of DevSecOps
PPTX
DevSecOps reference architectures 2018
PPTX
DevSecOps
PPTX
DevOps 101 - an Introduction to DevOps
PDF
Shift Left Security
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PPTX
DevSecOps : an Introduction
DevSecOps and the CI/CD Pipeline
Practical DevSecOps Course - Part 1
Demystifying DevSecOps
2019 DevSecOps Reference Architectures
The State of DevSecOps
Introduction to DevSecOps
DevSecOps | DevOps Sec
DevSecOps: What Why and How : Blackhat 2019
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Introduction to DevOps
Shift Left Security - The What, Why and How
DevSecOps Basics with Azure Pipelines
The What, Why, and How of DevSecOps
DevSecOps reference architectures 2018
DevSecOps
DevOps 101 - an Introduction to DevOps
Shift Left Security
[DevSecOps Live] DevSecOps: Challenges and Opportunities
DevSecOps : an Introduction
Ad

Similar to Security Process in DevSecOps (20)

PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PDF
4 approaches to integrate dev secops in development cycle
PDF
DevSecOps
PPTX
Dev{sec}ops
PPTX
What are DevSecOps Tools and Why Do You Need Them?
PPTX
What are DevSecOps Tools and Why Do You Need Them.pptx
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
Top 20 DevSecOps Interview Questions and Answers
PDF
Are You Ready to Ace Your DevSecOps Interview?
PDF
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
PDF
Top 20 DevsecOps Interview Questions.pdf
PPTX
Streamlining Your Security with These Essential DevSecOps Tools
PPTX
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
PDF
DevSecOps - Background, Status and Future Challenges
PDF
Pragmatic Pipeline Security
PDF
DevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Best Practices-Safeguarding Your Digital Landscape
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
4 approaches to integrate dev secops in development cycle
DevSecOps
Dev{sec}ops
What are DevSecOps Tools and Why Do You Need Them?
What are DevSecOps Tools and Why Do You Need Them.pptx
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
Top 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions and Answers
Are You Ready to Ace Your DevSecOps Interview?
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
Top 20 DevSecOps Interview Questions.pdf
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
Top 20 DevsecOps Interview Questions.pdf
Streamlining Your Security with These Essential DevSecOps Tools
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps - Background, Status and Future Challenges
Pragmatic Pipeline Security
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Ad

More from Opsta (20)

PDF
Deploy 22 microservices from scratch in 30 mins with GitOps
PDF
Let's build Developer Portal with Backstage
PDF
Kubernetes Secrets Management on Production with Demo
PDF
Introduction of CCE and DevCloud
PDF
How to build DevSecOps Platform on Huawei Cloud
PDF
Make a better DevOps with GitOps
PDF
Deploy Application on Kubernetes
PDF
Platform Engineering
PDF
Manage Kubernetes Clusters with Cluster API and ArgoCD
PDF
How we can do Multi-Tenancy on Kubernetes
PDF
Introduction to Kubernetes with demo
PDF
Introduction to Kubernetes and GKE
PDF
Introduction to Google Cloud Platform
PDF
Managing traffic routing with istio and envoy workshop
PDF
How to pass the Google Certification Exams
PDF
How to Become DevOps
PDF
DevOps: The Future of Software Development
PDF
Real World CI/CD with Kubernetes
PDF
Journey of Kubernetes Scaling
PDF
DevOps Transformation in Technical
Deploy 22 microservices from scratch in 30 mins with GitOps
Let's build Developer Portal with Backstage
Kubernetes Secrets Management on Production with Demo
Introduction of CCE and DevCloud
How to build DevSecOps Platform on Huawei Cloud
Make a better DevOps with GitOps
Deploy Application on Kubernetes
Platform Engineering
Manage Kubernetes Clusters with Cluster API and ArgoCD
How we can do Multi-Tenancy on Kubernetes
Introduction to Kubernetes with demo
Introduction to Kubernetes and GKE
Introduction to Google Cloud Platform
Managing traffic routing with istio and envoy workshop
How to pass the Google Certification Exams
How to Become DevOps
DevOps: The Future of Software Development
Real World CI/CD with Kubernetes
Journey of Kubernetes Scaling
DevOps Transformation in Technical

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Tartificialntelligence_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Security Process in DevSecOps

  • 1. Security Process in Jirayut Nimsaeng (Dear) CEO & Founder, Opsta (Thailand) Co.,Ltd. TechTalkThai Conference: Enterprise Cybersecurity 2021 October 5, 2021 https://bit.ly/opsta-ttt-sec-in-devops
  • 2. Security Process in DevSecOps #whoami Jirayut Nimsaeng (Dear) Jirayut has been involved in DevSecOps, Container, Cloud Technology and Open Source for over 10 years. He has experienced and succeeded in transforming several companies to deliver greater values and be more agile. ● He is Founder and CEO of Opsta (Thailand) Co.,Ltd. ● He is Cloud/DevSecOps Transformation Consultant and Solution Architecture ● He is the first Certified Kubernetes Security Specialist (CKS) and Certified Kubernetes Administrator (CKA) in Thailand
  • 3. Security Process in DevSecOps Agenda ● Automation Security ● Precommit Stage ● Acceptance Stage ● Production Stage ● Wrap Up
  • 4. Security Process in DevSecOps Security Process in Automation Security
  • 5. Security Process in DevSecOps DevOps Flow Infrastructure Support Tools VCS Artifacts CI CD Dev Test Prod Monitoring Load Testing Automation & Infrastructure as Code Developer Operation & SRE Communication Security Security
  • 6. Security Process in DevSecOps DevSecOps Flow Infrastructure Support Tools VCS Artifacts CI CD Dev Test Prod Monitoring Load Testing Automation & Infrastructure as Code Developer Operation & SRE Security Communication Security Shift Left with Automation
  • 7. Security Process in DevSecOps Automation Security Infrastructure Support Tools VCS Artifacts CI CD Dev Test Prod Monitoring Load Testing Automation & Infrastructure as Code Developer Operation & SRE Security Automation Security Communication
  • 8. Security Process in DevSecOps Security Automation in every steps Secure Coding SAST SCA Vulnerability Assessment Penetration Testing IAST Compliance Validation Threat Intelligence Secret Manager DAST Binary Analysis Threat Modelling SOC SOAR
  • 9. Security Process in DevSecOps Automation Security Tools Code Build Secret Test Release Runtime Monitor Multi-purpose Commercial
  • 10. Security Process in DevSecOps Security Stages on DevOps Flow Code Build Secret Test Release Runtime Monitor Precommit Stage Acceptance Stage Production Stage
  • 11. Security Process in DevSecOps Security Process in Automation Security: Precommit Stage
  • 12. Security Process in DevSecOps Secure Coding Secure coding is the practice of writing software that's protected from vulnerabilities. Some examples below refer from OWASP Secure Coding Practices ● Input Validation ● Authentication and Password Management ● Session Management ● Access Control ● Cryptographic Practices ● Error Handling and Logging ● Communication Security ● and much more...
  • 13. Security Process in DevSecOps SAST (Static Application Security Testing) SAST is a testing methodology that analyzes source code to find security vulnerabilities. SAST scans an application before the code is compiled. It’s also known as white box testing.
  • 14. Security Process in DevSecOps SAST (Static Application Security Testing)
  • 15. Security Process in DevSecOps SCA (Software Composition Analysis) SCA scans source code to inventory all open-source components to eliminate vulnerabilities those listed in the National Vulnerability Database (NVD) and compatibility issues with open-source licenses.
  • 16. Security Process in DevSecOps SCA (Software Composition Analysis)
  • 17. Security Process in DevSecOps Security Process in Automation Security: Acceptance Stage
  • 18. Security Process in DevSecOps Software Security Testing (1) Software security testing is the process of assessing and testing a system to discover security risks and vulnerabilities of the system and its data. ● Penetration Testing - The system undergoes analysis and attack from simulated malicious attackers. ● Fuzz Testing - is a brute-force reliability testing technique wherein you create and inject random data into a file or API in order to intentionally cause errors and then see what happens
  • 19. Security Process in DevSecOps Software Security Testing (2) ● Vulnerability Assessment - The system is scanned and analyzed for security issues. ● DAST (Dynamic Application Security Testing) tools automate security tests for a variety of real-world threats. DAST is a black-box testing method to identify vulnerabilities in their applications from an external perspective to better simulate threats most easily accessed by hackers outside their organization
  • 20. Security Process in DevSecOps VA Scan and DAST
  • 21. Security Process in DevSecOps IAST (Interactive Application Security Testing) IAST instruments applications by deploying agents and sensors in running applications and continuously analyzing all application interactions initiated by manual tests, automated tests, or a combination of both to identify vulnerabilities in real time
  • 22. Security Process in DevSecOps IAST (Interactive Application Security Testing)
  • 23. Security Process in DevSecOps Infrastructure as Code (IaC) Security IaC Security test and monitor your infrastructure as code such as Ansible, Terraform modules and Kubernetes YAML, JSON, and Helm charts to detect configuration issues that could open your deployments to attack and malicious behavior.
  • 24. Security Process in DevSecOps Kubernetes Security ● Kubernetes Certificates ● Secret ● Network Policy ● Namespace ● Quota ● TLS Ingress Endpoint ● Secure Node Metadata ● CIS Benchmark ● Verify Platform Binary ● Harden Docker Image ● Image Policy Webhook ● Immutability ● RBAC ● Secure Service Account ● Secure API Endpoint ● Admission Controller ● Node Restriction ● Runtime Sandbox ● Non-Root Container ● Security Context ● Pod Security Policy ● Open Policy Agent ● Auditing
  • 25. Security Process in DevSecOps Container Image Security Container security software is used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Testing capabilities will assist in developing security policies, discover zero-day vulnerabilities, and simulate attacks from common threat sources.
  • 26. Security Process in DevSecOps Container Image Security
  • 27. Security Process in DevSecOps Signed Container Image
  • 28. Security Process in DevSecOps Secrets Management Secrets management refers to the tools and methods for managing digital authentication credentials (secrets), including passwords, keys, APIs, and tokens for use in applications, services, privileged accounts and other sensitive parts of the IT ecosystem.
  • 29. Security Process in DevSecOps Privileged Access Management (PAM) PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials.
  • 30. Security Process in DevSecOps Privileged Access Management (PAM)
  • 31. Security Process in DevSecOps Security Process in Automation Security: Production Stage
  • 32. Security Process in DevSecOps Automation Security Baseline Automation Security Baseline build standard hardening steps into your recipes instead of using scripts or manual checklists. This includes minimizing the attack surface by removing all packages that aren’t needed and that have known problems; and changing default configurations to be safe.
  • 33. Security Process in DevSecOps Automation Security Baseline Tools
  • 34. Security Process in DevSecOps Cloud Security Automation ● Monitoring - it is necessary that you monitor the workflow of all the tasks in your infrastructure. ● Evaluation - give you insights into which tasks can be automated like repetitive tasks, resource provisioning, deployments, creating security rules, etc. ● In-depth analysis - analyze the collected information in depth by differentiating it on the basis of severity as high, medium or low risk. ● Reporting - The automation processes should be configured to generate the reports to present the overview of the changes before or after. ● Remediations - implement remediation and improve overall security posture.
  • 35. Security Process in DevSecOps RASP (Run-time Application Security Protection) RASP works inside the application. It’s plugged into an application or its runtime environment and can control application execution. RASP lets an app run continuous security checks on itself and respond to live attacks by terminating an attacker’s session and alerting defenders to the attack.
  • 36. Security Process in DevSecOps WAF (Web Application Firewall) WAF or Web Application Firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model)
  • 37. Security Process in DevSecOps Security monitoring, sometimes referred to as "security information monitoring (SIM)" or "security event monitoring (SEM)," involves collecting and analysing information to detect suspicious behavior or unauthorised system changes on your network, defining which types of behavior should trigger alerts, and taking action on alerts as needed. Security Monitoring
  • 38. Security Process in DevSecOps Security Process in Wrap Up
  • 39. Security Process in DevSecOps Automation Security Agile Focus DevOps Focus on Automation Security in every steps with Automation Code Build Integrate Test Release Configure Monitor Plan Deploy
  • 40. Security Process in DevSecOps More questions? [email protected] Jirayut Nimsaeng CEO & Founder Opsta (Thailand) 086-069-4042 Facebook