SlideShare a Scribd company logo
1 of 28
Download to read offline
DevSecOps
Reference Architectures
Derek E. Weeks
VP and DevOps Advocate
Sonatype
2018
About this
collection
1. The reference architectures can be used to validate choices you
have made or are planning to make.
2. They are curated from the community. You will notice a number
of common elements that are used repeatedly.
3. Each image has a link to its original source in the speaker
notes, enabling you to deep dive for more knowledge.
If you would like to have your reference architecture added to this deck,
please send it to weeks@sonatype.com.
Integration Points and Degree of Automation
DevSecOpsTooling Design Development (IDE) Repository
Manager
CI/CD Post-Deployment
Open source
governance
Open source
software analysis
n/a
Static Application
Security Testing
(SAST)
n/a
Dynamic
Application Security
Testing (DAST)
n/a n/a n/a
Interactive
Application Security
Testing (IAST)
n/a n/a n/a
Mobile Application
Security Testing
(MAST)
n/a n/a
Run-time
Application Self
Protection (RASP)
n/a n/a
n/a
Container and
Infrastructure
Security
n/a
Source: Gartner, December 2017, Structuring Application Security Practices and Tools to Support DevOps and DevSecOps
Degrees of
DevSecOps
Automation
Common Elements of a DevSecOps Pipeline
DevSecOps according to U.S. Dept of Defense/JIDO
Source: ADDO ‘17 “Governance and Transparency in GovSec DevOps: Leonel Garciga”
DevSecOps according to Magno Rodrigues
Source: Stefan Streichsbier Linked in Slides “DevSecOps - The big picture”
DevSecOps according to Carnegie Mellon’s SEI
Source: Derek Weeks, DZone “From Water-Scrum-Fall to DevSecOps”
DevSecOps
according to
Jim Bird
Source: Jim Bird, O’Reilly “DevOpsSec:
Securing Software through Continuous Delivery”
DevSecOps according to Larry Maccherone
Source: Larry Maccherone @Lmaccherone, Twitter “Annotated DevSecOps cycle”
DevSecOps according to Steve Springett
Source: Steve Springett, GitHub “Dependency-Track”
DevSecOps according to TeachEra
Source: Mohammad Imran, Linked in “Practical DevSecOps Course - Part 1”
Learn More
From Your
Peers
21 DevSecOps practitioners from leading enterprises to shared their experiences and best
practices. All 21 recordings are available for free at www.alldaydevops.com.
DevSecOps according to Coveros
Source: Alan Crouch, Coveros “Implementing the DevSecOps Process”
DevSecOps according to Aaron Weaver
Source: Stefan Streichsbier Linked in “DevSecOps - The big picture”
DevSecOps according to Dr. Ravi Rajamiyer
Source: Dr. Ravi Rajamiyer, DevOps Summit Journal “When “IoC” meets “SoC’”
DevSecOps according to ACROSEC
Source: Derek Weeks, Acrosec “Three important elements of Application Security: "Shift Left", "Security by Design" and "DevSecOps’”
DevSecOps according to Ranger4
Source: Helen Beal, Linked in “DevSecOps is it a Good Thing”
DevSecOps according to AWS
@IanMmmm
Source: Ian Massingham, @IanMmmm, Linked In “Securing Systems at Cloud Scale with DevSecOps”
DevSecOps according to AWS
Source: Priyanka Aash, Linked In “DevSecOps in Baby Steps”
DevSecOps according to Accenture
Source: ADDO’17, YouTube “DevOps in Secure Environments: Strategies for Success: Dominic Delmolino”
DevSecOps according to Shine Solutions
Source: Archi Gunasekara, Shine Solutions “The Emmergence of the three towers:DecSecOps”
DevSecOps according to Ellucian
Source: Mohammad Imran, Linked in “Practical DevSecOps Course - Part 1”
DevSecOps according to WhiteHat Security
Source: White Hat Security “Take Control Design a complete DevOps Program”
DevSecOps according to GSA
Source: Tech at GSA “Building DevSecOps Culture”
DevSecOps according to Sense of Security
Source: ADDO’17, Youtube “DevOps: A How-To for Agility with Security: Murray Goldschmidt”
We would love to add your DevSecOps
reference architecture to this deck.
How?
1. Send it to me (weeks@sonatype.com), with the
subject line: DevSecOps reference architecture.
2. Provide me link as to where people can find
more information about the architecture (e.g.,
your blog, a video, a SlideShare deck).
3. I’ll add it to this deck with full attribution to
you, and let you know that it’s been updated.
It’s that easy. We all learn with help
from the community. Thank you for your
contributions!
About the
Author
Derek Weeks
VP and DevOps Advocate, Sonatype
Derek is a huge advocate of applying proven supply chain management principles into DevOps
practices to improve efficiencies and sustain long-lasting competitive advantages. He currently
serves as vice president and DevOps advocate at Sonatype, creators of the Nexus repository
manager and the global leader in solutions for software supply chain automation. Derek is also
the co-founder of All Day DevOps -- an online community of 40,000 IT professionals, and the
lead researcher behind the annual State of the Software Supply Chain report for the DevOps
industry. In 2018, Derek was recognized by DevOps.com as the“Best DevOps Evangelist”for
his work in the community.
devsecops-reference-architectures-2018.pdf

More Related Content

Similar to devsecops-reference-architectures-2018.pdf

Similar to devsecops-reference-architectures-2018.pdf (20)

Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or less
 
The Role of DevSecOps and DevSecOps Tools in Modern Software Development
The Role of DevSecOps and DevSecOps Tools in Modern Software DevelopmentThe Role of DevSecOps and DevSecOps Tools in Modern Software Development
The Role of DevSecOps and DevSecOps Tools in Modern Software Development
 
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOpsDevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..
 
Enterprise Devsecops
Enterprise DevsecopsEnterprise Devsecops
Enterprise Devsecops
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
How not to fall into the DevSecOps trap
How not to fall into the DevSecOps trapHow not to fall into the DevSecOps trap
How not to fall into the DevSecOps trap
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
ICONIQ Analytics: The Modern Developer Technology Stack
ICONIQ Analytics: The Modern Developer Technology StackICONIQ Analytics: The Modern Developer Technology Stack
ICONIQ Analytics: The Modern Developer Technology Stack
 
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
 
Top 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutTop 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know About
 
StackEngine Problem Space Demo
StackEngine Problem Space DemoStackEngine Problem Space Demo
StackEngine Problem Space Demo
 
DevSecOps - Agile Get-Together 2022.pdf
DevSecOps - Agile Get-Together 2022.pdfDevSecOps - Agile Get-Together 2022.pdf
DevSecOps - Agile Get-Together 2022.pdf
 
DoD Enterprise DevSecOps Initiative by Mr. Nicolas Chaillan
DoD Enterprise DevSecOps Initiative by Mr. Nicolas ChaillanDoD Enterprise DevSecOps Initiative by Mr. Nicolas Chaillan
DoD Enterprise DevSecOps Initiative by Mr. Nicolas Chaillan
 
To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...To boldly go where no one has gone before: life after the DevSecOps transform...
To boldly go where no one has gone before: life after the DevSecOps transform...
 
What_is_DevOps.pptx
What_is_DevOps.pptxWhat_is_DevOps.pptx
What_is_DevOps.pptx
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdf
 
DevSecOps: The Future of Secure Software Development
DevSecOps: The Future of Secure Software DevelopmentDevSecOps: The Future of Secure Software Development
DevSecOps: The Future of Secure Software Development
 
Strengthening Application Security with DevSecOps.docx
Strengthening Application Security with DevSecOps.docxStrengthening Application Security with DevSecOps.docx
Strengthening Application Security with DevSecOps.docx
 
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

devsecops-reference-architectures-2018.pdf

  • 1. DevSecOps Reference Architectures Derek E. Weeks VP and DevOps Advocate Sonatype 2018
  • 2. About this collection 1. The reference architectures can be used to validate choices you have made or are planning to make. 2. They are curated from the community. You will notice a number of common elements that are used repeatedly. 3. Each image has a link to its original source in the speaker notes, enabling you to deep dive for more knowledge. If you would like to have your reference architecture added to this deck, please send it to weeks@sonatype.com.
  • 3. Integration Points and Degree of Automation DevSecOpsTooling Design Development (IDE) Repository Manager CI/CD Post-Deployment Open source governance Open source software analysis n/a Static Application Security Testing (SAST) n/a Dynamic Application Security Testing (DAST) n/a n/a n/a Interactive Application Security Testing (IAST) n/a n/a n/a Mobile Application Security Testing (MAST) n/a n/a Run-time Application Self Protection (RASP) n/a n/a n/a Container and Infrastructure Security n/a Source: Gartner, December 2017, Structuring Application Security Practices and Tools to Support DevOps and DevSecOps Degrees of DevSecOps Automation
  • 4. Common Elements of a DevSecOps Pipeline
  • 5. DevSecOps according to U.S. Dept of Defense/JIDO Source: ADDO ‘17 “Governance and Transparency in GovSec DevOps: Leonel Garciga”
  • 6. DevSecOps according to Magno Rodrigues Source: Stefan Streichsbier Linked in Slides “DevSecOps - The big picture”
  • 7. DevSecOps according to Carnegie Mellon’s SEI Source: Derek Weeks, DZone “From Water-Scrum-Fall to DevSecOps”
  • 8. DevSecOps according to Jim Bird Source: Jim Bird, O’Reilly “DevOpsSec: Securing Software through Continuous Delivery”
  • 9. DevSecOps according to Larry Maccherone Source: Larry Maccherone @Lmaccherone, Twitter “Annotated DevSecOps cycle”
  • 10. DevSecOps according to Steve Springett Source: Steve Springett, GitHub “Dependency-Track”
  • 11. DevSecOps according to TeachEra Source: Mohammad Imran, Linked in “Practical DevSecOps Course - Part 1”
  • 12. Learn More From Your Peers 21 DevSecOps practitioners from leading enterprises to shared their experiences and best practices. All 21 recordings are available for free at www.alldaydevops.com.
  • 13. DevSecOps according to Coveros Source: Alan Crouch, Coveros “Implementing the DevSecOps Process”
  • 14. DevSecOps according to Aaron Weaver Source: Stefan Streichsbier Linked in “DevSecOps - The big picture”
  • 15. DevSecOps according to Dr. Ravi Rajamiyer Source: Dr. Ravi Rajamiyer, DevOps Summit Journal “When “IoC” meets “SoC’”
  • 16. DevSecOps according to ACROSEC Source: Derek Weeks, Acrosec “Three important elements of Application Security: "Shift Left", "Security by Design" and "DevSecOps’”
  • 17. DevSecOps according to Ranger4 Source: Helen Beal, Linked in “DevSecOps is it a Good Thing”
  • 18. DevSecOps according to AWS @IanMmmm Source: Ian Massingham, @IanMmmm, Linked In “Securing Systems at Cloud Scale with DevSecOps”
  • 19. DevSecOps according to AWS Source: Priyanka Aash, Linked In “DevSecOps in Baby Steps”
  • 20. DevSecOps according to Accenture Source: ADDO’17, YouTube “DevOps in Secure Environments: Strategies for Success: Dominic Delmolino”
  • 21. DevSecOps according to Shine Solutions Source: Archi Gunasekara, Shine Solutions “The Emmergence of the three towers:DecSecOps”
  • 22. DevSecOps according to Ellucian Source: Mohammad Imran, Linked in “Practical DevSecOps Course - Part 1”
  • 23. DevSecOps according to WhiteHat Security Source: White Hat Security “Take Control Design a complete DevOps Program”
  • 24. DevSecOps according to GSA Source: Tech at GSA “Building DevSecOps Culture”
  • 25. DevSecOps according to Sense of Security Source: ADDO’17, Youtube “DevOps: A How-To for Agility with Security: Murray Goldschmidt”
  • 26. We would love to add your DevSecOps reference architecture to this deck. How? 1. Send it to me (weeks@sonatype.com), with the subject line: DevSecOps reference architecture. 2. Provide me link as to where people can find more information about the architecture (e.g., your blog, a video, a SlideShare deck). 3. I’ll add it to this deck with full attribution to you, and let you know that it’s been updated. It’s that easy. We all learn with help from the community. Thank you for your contributions!
  • 27. About the Author Derek Weeks VP and DevOps Advocate, Sonatype Derek is a huge advocate of applying proven supply chain management principles into DevOps practices to improve efficiencies and sustain long-lasting competitive advantages. He currently serves as vice president and DevOps advocate at Sonatype, creators of the Nexus repository manager and the global leader in solutions for software supply chain automation. Derek is also the co-founder of All Day DevOps -- an online community of 40,000 IT professionals, and the lead researcher behind the annual State of the Software Supply Chain report for the DevOps industry. In 2018, Derek was recognized by DevOps.com as the“Best DevOps Evangelist”for his work in the community.