SlideShare una empresa de Scribd logo
1 de 51
Descargar para leer sin conexión
©2022 Cprime, Inc. All rights reserved and no copying without express written permission. cprime.com | 877.800.5221
The What, Why, and How of DevSecOps
The time is now to shift left in security
Chris Knotts
Cprime Learning Product Director
linkedin.com/in/chris-knotts/
Speaker
01 DevSecOps Prerequisites
02 Why DevSecOps? Foundations
03 Who is Responsible for DevSecOps?
04 Practical Tips for Getting Started
05 Keep the Conversation Going/Q&A
Agenda
Part 1
DevSecOps Prerequisites
• Leadership buy-in
• Commitment to cultural change
• Literacy and progress with DevOps
• Collaboration across design roles, work intake processes, testing,
security, development, and IT production staff
DevSecOps Prerequisites
Executive Buy-In
Commitment to
Cultural Change
Literacy and Progress With DevOps
Collaboration Across
Design Roles, Work
Intake Processes,
Testing, Security,
Development, and IT
Production Staff
Part 2
DevSecOps Foundations
• Traditional systems and IT
service development has relied
on a plan-driven, phase-gated
style of enterprise workflow.
• This style of managing projects
and products can work well for
physical, mission-critical work,
but doesn’t work well with
software and IT systems.
Agility
• Furthermore, plan-driven
work with a focus on
requirements and
documentation fails to take
advantage of a few of
software engineering’s
greatest strengths.
• Agility means quick,
adaptive, responsive cycles
of work…including a
welcoming attitude towards
changing requirements,
emergent needs, and real-
time customer feedback.
Agility
Agility
• Fundamentally, the DevOps
movement is about
understanding competing
incentives
• A lack of “systems thinking”
means that goals tend to get
optimized according to local,
departmental goals
• This dynamic has big
implications for security,
especially application security
DevOps
Originally defined in Continuous Delivery by Jez Humble and David Farley
• CI/CD pipelines usually
represent the practical
execution of DevOps
and technical agility
concepts
• The idea is to set up
progressive layers of
automation which force
software/system
features to “prove
themselves” before
progressing to the next
step towards
deployment
Software
Development
Pipelines
Systems Thinking
What is a “Shift Left”?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Feedback?
What is a “Shift Left”?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Feedback?
Shifting Left: Planning and Including Downstream Functions Earlier
Business
unit
constructs
Feature or
business
need
PMO
Project management
Delivery
Risk/security
Feedback?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Security is fundamentally about
understanding and managing risk
…of movement
…of actions
…of decisions
…protection against risk
…safety (of job, of employer, of money, etc.)
…defensibility against attack
Security Freedom
Security is fundamentally about understanding and managing risk
Condition White
• Most people live in this condition
• You are in a relaxed state and are unaware of your surroundings
• Avoid condition white!
Condition Yellow
• Still in a relaxed state, but are aware of what’s going on around you
• Be cautious (not paranoid)
• Learn to live in condition yellow!
• More than 6,000 online criminal marketplaces sell ransomware products
and services.
(Source: McAfee)
• 444,259 ransomware attacks took place worldwide in 2018.
(Source: Statista)
• As of 2020, Hackers create 300,000 new pieces of malware daily.
(Source: McAfee)
Important Data Points
The bottom line:
• Observe the growth since
2016
• $3.2 million – the average
cost of a data breach in 2019
• $12 billion – the cost of
business email compromise
(BEC) in 2019
The World’s
Biggest Data
Breaches, as of
2020
YOU, the user, are the weakest link in
any enterprise’s security.
Part 3
Who is responsible for DevSecOps?
DevSecOps Roles
Decision Makers
Feedback: Measurement, improvement
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Security
DevSecOps Roles
Part 4
Practical tips for getting started
Risk identification and classification
Factors and their probabilities
Impact estimation
Risk severity
What should be fixed and when
Five places where you should look
for risk:
1. Encryption
2. Authentication
3. Logging
4. Asset management
5. Zoning and containment
Risk Review
Threat Factors:
• Skill level
• Motive
• Opportunity
• Size
Vulnerability Factors:
• Ease of discovery
• Ease of exploit
• Awareness
• Intrusion detection
Risk Review
Business Impact Factors:
• Financial damage
• Reputation damage
• Non-compliance
• Privacy violation
Technical Impact Factors:
• Confidentiality
• Integrity
• Availability
• Accountability
Risk Review
Prioritize Testing for Risk
• Identify assets
• Identify threats
• Identify vulnerabilities
Prioritize vulnerabilities using methods :
• Damage, reproducibility, exploitability, affected users,
and discoverability (DREAD)
• Spoofing, Tampering, Repudiation, Denial of Service,
Information Disclosure and Elevation of Privilege
DevSecOps and Testing
Priorities:
• Compiling steps (dependencies)
• Framework analysis (like Spring)
• Pattern matching
• Control flow
• Data flow (e.g., untrusted inputs)
• Taint and string analysis
Static Analysis Security Testing (SAST)
OWASP Projects for SAST
• SonarQube (code quality)
• PHP, Java, JavaScript
• O2 (.NET and Windows)
• OWASP Web Application
Protection (PHP)
• Input validation
• SQLI, XSS, RFI, LFI, DT/PT, SCD,
OSC
Open Source SAST
• Bandit (Python)
• Brakeman and Codesake Dawn (Ruby)
• PMD, SpotBugs, and FindSecBugs
(Java)
• Flawfinder (C, C++,)
• LGTM (C, C++, Java, JS, TypeScrypt,
Python)
• Google CodeSearchDiggity (cloud)
• .NET Security Guard
• RIPS and phpcs (PHP)
• SonarQube & VisualCodeGrepper
(VCG)
Static Analysis Security Testing (SAST)
• Xray & Jira Test Management - Xray helps you manage your tests in an
organized way. It lets you create tests, group them into test sets, and
create test plans.
• Snyk - Snyk is a developer security platform. Integrating directly into
development tools, workflows, and automation pipelines.
Others We Like (Cprime Partners!)
• Validate ALL inputs
• Encode and Standardize Outputs
• Implement Authentication &
Authorization
• Manage Sessions Inside Trust
Boundaries
• Zero Trust?
• Enforce Access Control
• Implement updated Cryptography
• Handle Errors and Logs
• Protect Data
• Secure Communication Channels
• Update Systems, Secure by Default
• Secure Database Access
• Strict File Access
• Secure Memory Management
Secure Code & Secure Development Flyover
IAM Frameworks & Standards:
• Security Assertion Markup
Language (SAML 2.0)
• OpenID
• OAuth
• WS-Trust
• WS-Federation
IAM Vendors:
• Okta
• OneLogin
• Ping
• IBM IAA
• Microsoft Azure
• Oracle Identity CS
• Amazon
IAM
Should be used as a development building block, and a component of automation
• Repository access
• Artifacts signing
• Encrypt everywhere
• DB role provisioning
• Granular net access
• Storage assignment
• Monitoring & alerts
How Does IAM Enable Automation?
• Introduce changes that can be switched
on/off without a new release
• Validate hypothesis, testing in production
• Implement A/B Testing
• Watch relevant metrics
• Disable feature if it’s disruptive
Type of toggles:
• Toggle points: Breakpoints to switch
on/off
• Toggle router: Code that chooses what
code path is active for each runtime
thread.
• Toggle configuration: Provide context,
define expectation on what it does.
Requests might be an outcome from:
• Threat modeling
• Dependency check
• CVE publication
• Security incident
• Alarm triggered by logs or events
Favorite DevOps Deployment Patterns – Feature Toggles
• Usually implemented with
feature toggles
• Deploy to a reduced set of
users without notification
• Watch relevant metrics and
evaluate user behavior
Favorite DevOps Deployment Patterns – Dark Launches
• Data flows
• Trust boundaries
• Technical debt
• Refactoring monolithic
architecture
• Application security
testing
• Testing in parallel
• Mutation testing
• Staging
• Packages
• Infrastructure as secure
code
• Incident response
• Emergency drills
• Chaos engineering
• Game days
• Blue/green deployments
• Reliability engineering
• Monitoring and
observability
• Intelligent alerts
• AIOps
• Log management
• Policy, governance and
audit
• Coding for compliance
• Change management
• Segregation of duties
• Automating change
management
And So Much More…
• Checkbox compliance
• Security as gatekeeper of prod
• Hundreds or thousands of checks sent
back to dev teams
• 1 InfoSec expert per 10 Ops
• 1 InfoSec expert per 100 Devs
• Shift left
• Automate testing
• Self-service tools
• Quick feedback loops
• Security training
• Security by design
Key Takeaways
DevOps
Traditional Security
DevSecOps Training from Cprime
• DevSecOps Boot Camp
• Application Security with Snyk
• Fundamentals of Secure Application Development
• Enterprise Test Management with Xray
Custom Coding and Integration by Cprime Studios
Cprime Studios is the software product development division of Cprime. Using
agile working methods, we team up with businesses who want to turn ideas into
reality, from the design of the software product to development, infrastructure,
and scaling.
Key Takeaways
DevSecOps Tooling
Cprime can help you select the right tools for:
• Automated dependency checks
• Static application security testing
• Dynamic application security testing
• Fuzz testing
• Penetration testing
• Automated security attacks
Key Takeaways
Connect with our
speakers on LinkedIn
Check out Cprime
upcoming webinars,
read our blog,
download
whitepapers/case
studies & more:
cprime.com/resources
Share with us what
topics you are
interested in, ask us
questions or give us
feedback!
learn@cprime.com
Keep the Conversation Going…
Share in the conversation & keep updated on
thought leadership, events & more!
on LinkedIn, Twitter, Facebook, & YouTube
Follow Us on Social Media
QUESTIONS?
cprime.com | 877.800.5221
Thank You
cprime.com | 877.800.5221

Más contenido relacionado

La actualidad más candente

DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 

La actualidad más candente (20)

DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
 
Creating an Enterprise Cloud Centre of Excellence
Creating an Enterprise Cloud Centre of ExcellenceCreating an Enterprise Cloud Centre of Excellence
Creating an Enterprise Cloud Centre of Excellence
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 

Similar a The What, Why, and How of DevSecOps

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015
Daniel Liber
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
Saravanan Purushothaman
 

Similar a The What, Why, and How of DevSecOps (20)

AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 

Más de Cprime

AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPTAI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
Cprime
 

Más de Cprime (20)

Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
 
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and AdoptionHarnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
 
AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...
 
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
 
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPTAI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
 
From Project to Product - The Need for Speed
From Project to Product - The Need for SpeedFrom Project to Product - The Need for Speed
From Project to Product - The Need for Speed
 
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product OwnerWe Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
 
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPTHow to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
 
Modern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your TeamsModern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your Teams
 
Enterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and MarketingEnterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and Marketing
 
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
 
Perfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service ManagementPerfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service Management
 
From Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to YouFrom Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to You
 
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
 
6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them
 
Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1
 
How to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service ManagementHow to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service Management
 
The Five Phases of Agile Maturity (Part 3): Phase 5
The Five Phases of Agile Maturity (Part 3): Phase 5The Five Phases of Agile Maturity (Part 3): Phase 5
The Five Phases of Agile Maturity (Part 3): Phase 5
 

Último

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

The What, Why, and How of DevSecOps

  • 1. ©2022 Cprime, Inc. All rights reserved and no copying without express written permission. cprime.com | 877.800.5221
  • 2. The What, Why, and How of DevSecOps The time is now to shift left in security
  • 3. Chris Knotts Cprime Learning Product Director linkedin.com/in/chris-knotts/ Speaker
  • 4. 01 DevSecOps Prerequisites 02 Why DevSecOps? Foundations 03 Who is Responsible for DevSecOps? 04 Practical Tips for Getting Started 05 Keep the Conversation Going/Q&A Agenda
  • 6. • Leadership buy-in • Commitment to cultural change • Literacy and progress with DevOps • Collaboration across design roles, work intake processes, testing, security, development, and IT production staff DevSecOps Prerequisites
  • 9. Literacy and Progress With DevOps
  • 10. Collaboration Across Design Roles, Work Intake Processes, Testing, Security, Development, and IT Production Staff
  • 12. • Traditional systems and IT service development has relied on a plan-driven, phase-gated style of enterprise workflow. • This style of managing projects and products can work well for physical, mission-critical work, but doesn’t work well with software and IT systems. Agility
  • 13. • Furthermore, plan-driven work with a focus on requirements and documentation fails to take advantage of a few of software engineering’s greatest strengths. • Agility means quick, adaptive, responsive cycles of work…including a welcoming attitude towards changing requirements, emergent needs, and real- time customer feedback. Agility
  • 15. • Fundamentally, the DevOps movement is about understanding competing incentives • A lack of “systems thinking” means that goals tend to get optimized according to local, departmental goals • This dynamic has big implications for security, especially application security DevOps
  • 16. Originally defined in Continuous Delivery by Jez Humble and David Farley • CI/CD pipelines usually represent the practical execution of DevOps and technical agility concepts • The idea is to set up progressive layers of automation which force software/system features to “prove themselves” before progressing to the next step towards deployment Software Development Pipelines
  • 18. What is a “Shift Left”?
  • 19. Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Feedback? What is a “Shift Left”?
  • 20. Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Feedback? Shifting Left: Planning and Including Downstream Functions Earlier
  • 22. Security is fundamentally about understanding and managing risk
  • 23. …of movement …of actions …of decisions …protection against risk …safety (of job, of employer, of money, etc.) …defensibility against attack Security Freedom Security is fundamentally about understanding and managing risk
  • 24. Condition White • Most people live in this condition • You are in a relaxed state and are unaware of your surroundings • Avoid condition white! Condition Yellow • Still in a relaxed state, but are aware of what’s going on around you • Be cautious (not paranoid) • Learn to live in condition yellow!
  • 25. • More than 6,000 online criminal marketplaces sell ransomware products and services. (Source: McAfee) • 444,259 ransomware attacks took place worldwide in 2018. (Source: Statista) • As of 2020, Hackers create 300,000 new pieces of malware daily. (Source: McAfee) Important Data Points
  • 26. The bottom line: • Observe the growth since 2016 • $3.2 million – the average cost of a data breach in 2019 • $12 billion – the cost of business email compromise (BEC) in 2019 The World’s Biggest Data Breaches, as of 2020
  • 27. YOU, the user, are the weakest link in any enterprise’s security.
  • 28. Part 3 Who is responsible for DevSecOps?
  • 31. Feedback: Measurement, improvement Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Security DevSecOps Roles
  • 32. Part 4 Practical tips for getting started
  • 33. Risk identification and classification Factors and their probabilities Impact estimation Risk severity What should be fixed and when Five places where you should look for risk: 1. Encryption 2. Authentication 3. Logging 4. Asset management 5. Zoning and containment Risk Review
  • 34. Threat Factors: • Skill level • Motive • Opportunity • Size Vulnerability Factors: • Ease of discovery • Ease of exploit • Awareness • Intrusion detection Risk Review
  • 35. Business Impact Factors: • Financial damage • Reputation damage • Non-compliance • Privacy violation Technical Impact Factors: • Confidentiality • Integrity • Availability • Accountability Risk Review
  • 36. Prioritize Testing for Risk • Identify assets • Identify threats • Identify vulnerabilities Prioritize vulnerabilities using methods : • Damage, reproducibility, exploitability, affected users, and discoverability (DREAD) • Spoofing, Tampering, Repudiation, Denial of Service, Information Disclosure and Elevation of Privilege DevSecOps and Testing
  • 37. Priorities: • Compiling steps (dependencies) • Framework analysis (like Spring) • Pattern matching • Control flow • Data flow (e.g., untrusted inputs) • Taint and string analysis Static Analysis Security Testing (SAST)
  • 38. OWASP Projects for SAST • SonarQube (code quality) • PHP, Java, JavaScript • O2 (.NET and Windows) • OWASP Web Application Protection (PHP) • Input validation • SQLI, XSS, RFI, LFI, DT/PT, SCD, OSC Open Source SAST • Bandit (Python) • Brakeman and Codesake Dawn (Ruby) • PMD, SpotBugs, and FindSecBugs (Java) • Flawfinder (C, C++,) • LGTM (C, C++, Java, JS, TypeScrypt, Python) • Google CodeSearchDiggity (cloud) • .NET Security Guard • RIPS and phpcs (PHP) • SonarQube & VisualCodeGrepper (VCG) Static Analysis Security Testing (SAST)
  • 39. • Xray & Jira Test Management - Xray helps you manage your tests in an organized way. It lets you create tests, group them into test sets, and create test plans. • Snyk - Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines. Others We Like (Cprime Partners!)
  • 40. • Validate ALL inputs • Encode and Standardize Outputs • Implement Authentication & Authorization • Manage Sessions Inside Trust Boundaries • Zero Trust? • Enforce Access Control • Implement updated Cryptography • Handle Errors and Logs • Protect Data • Secure Communication Channels • Update Systems, Secure by Default • Secure Database Access • Strict File Access • Secure Memory Management Secure Code & Secure Development Flyover
  • 41. IAM Frameworks & Standards: • Security Assertion Markup Language (SAML 2.0) • OpenID • OAuth • WS-Trust • WS-Federation IAM Vendors: • Okta • OneLogin • Ping • IBM IAA • Microsoft Azure • Oracle Identity CS • Amazon IAM Should be used as a development building block, and a component of automation
  • 42. • Repository access • Artifacts signing • Encrypt everywhere • DB role provisioning • Granular net access • Storage assignment • Monitoring & alerts How Does IAM Enable Automation?
  • 43. • Introduce changes that can be switched on/off without a new release • Validate hypothesis, testing in production • Implement A/B Testing • Watch relevant metrics • Disable feature if it’s disruptive Type of toggles: • Toggle points: Breakpoints to switch on/off • Toggle router: Code that chooses what code path is active for each runtime thread. • Toggle configuration: Provide context, define expectation on what it does. Requests might be an outcome from: • Threat modeling • Dependency check • CVE publication • Security incident • Alarm triggered by logs or events Favorite DevOps Deployment Patterns – Feature Toggles
  • 44. • Usually implemented with feature toggles • Deploy to a reduced set of users without notification • Watch relevant metrics and evaluate user behavior Favorite DevOps Deployment Patterns – Dark Launches
  • 45. • Data flows • Trust boundaries • Technical debt • Refactoring monolithic architecture • Application security testing • Testing in parallel • Mutation testing • Staging • Packages • Infrastructure as secure code • Incident response • Emergency drills • Chaos engineering • Game days • Blue/green deployments • Reliability engineering • Monitoring and observability • Intelligent alerts • AIOps • Log management • Policy, governance and audit • Coding for compliance • Change management • Segregation of duties • Automating change management And So Much More…
  • 46. • Checkbox compliance • Security as gatekeeper of prod • Hundreds or thousands of checks sent back to dev teams • 1 InfoSec expert per 10 Ops • 1 InfoSec expert per 100 Devs • Shift left • Automate testing • Self-service tools • Quick feedback loops • Security training • Security by design Key Takeaways DevOps Traditional Security
  • 47. DevSecOps Training from Cprime • DevSecOps Boot Camp • Application Security with Snyk • Fundamentals of Secure Application Development • Enterprise Test Management with Xray Custom Coding and Integration by Cprime Studios Cprime Studios is the software product development division of Cprime. Using agile working methods, we team up with businesses who want to turn ideas into reality, from the design of the software product to development, infrastructure, and scaling. Key Takeaways
  • 48. DevSecOps Tooling Cprime can help you select the right tools for: • Automated dependency checks • Static application security testing • Dynamic application security testing • Fuzz testing • Penetration testing • Automated security attacks Key Takeaways
  • 49. Connect with our speakers on LinkedIn Check out Cprime upcoming webinars, read our blog, download whitepapers/case studies & more: cprime.com/resources Share with us what topics you are interested in, ask us questions or give us feedback! learn@cprime.com Keep the Conversation Going…
  • 50. Share in the conversation & keep updated on thought leadership, events & more! on LinkedIn, Twitter, Facebook, & YouTube Follow Us on Social Media
  • 51. QUESTIONS? cprime.com | 877.800.5221 Thank You cprime.com | 877.800.5221