SlideShare a Scribd company logo
1 of 6
Download to read offline
Why Implement DevSecOps with AWS?
According to Gartner, AWS dominates the global IaaS market, with over 38%
percent market share. One of the reasons is that AWS helps companies deploy
software more quickly and efficiently and smoothly scale workloads on demand.
For instance, AWS DevOps services adoption enables companies to build CI/CD
pipelines and automate code delivery and deployment, helping mitigate software
downtime during updates. Some can go even further by implementing DevSecOps
practices and thus significantly improve software security.
This article covers the concept of DevSecOps and highlights how companies can
set it up in AWS.
Why adopt DevSecOps?
Like traditional DevOps, the DevSecOps culture implies a close collaboration
between development and IT operations teams to streamline software deployment.
However, DevSecOps suggests implementing security controls early in the
development stage and using testing mechanisms at every step of code creation.
Therefore, the concept can be considered an evolution from traditional DevOps,
which primarily focuses on improving release speed and frequency. In practice,
implementing DevSecOps can provide companies with the following business
benefits:
1. More secure code
With DevSecOps, developers identify errors and vulnerabilities in the code quicker
and earlier, eliminating them as soon as they appear. This can significantly
improve the security of the final product.
2. Improved cyber security awareness
DevSecOps assumes that each team member (including development, operations,
and security specialists) is responsible for the solution’s security. This makes team
members more familiar with the best security practices and helps identify potential
threats in the code faster.
3. Advanced automation and standardization
At the heart of DevSecOps are repeatable and automated processes (such as tests
and monitoring) that help ensure the security of the developed solution. Also, the
standardization makes it easier to continuously scale the use of DevSecOps
practices.
How to enable DevSecOps with AWS?
Establish a DevSecOps pipeline
The principles of continuous integration and deployment (CI/CD) are fundamental
to DevOps, and DevSecOps is no different here. To ensure the effective use of
DevSecOps practices, companies must integrate the ones for each stage of their
AWS CI/CD pipelines, and here is how it can look in practice.
1. Plan
The official OWASP guidelines suggest implementing such techniques as threat
modelling, or identifying all potential security risks to a product, early on. As a
result, teams can compile a complete list of threats and address them in advance
with proper security measures.
In addition, this information allows teams to create comprehensive plans defining
when and how security testing should be performed throughout the project. Teams
can use relevant solutions from the AWS Marketplace, such as IriusRisk, to
integrate threat modeling into their SDLC. IriusRisk automates the building of
threat models and helps address vulnerabilities throughout development.
2. Code
To ensure security during the coding phase, teams can adhere to defensive
programming principles within the DevSecOps pipeline. In a nutshell, this concept
involves the early detection and isolation of errors in the code, thereby ensuring
predictable and stable software operation in the future.
To realize this concept, developers can implement tools such as formatters and
linters, like AWS CloudFormation Linter to check AWS CloudFormation
templates, highlight suspicious bugs or errors, and eliminate them timely.
3. Build
The build phase begins after developers create the code and submit it for version
control. In this step, DevSecOps focuses on analyzing the source code and its
dependencies against the most common vulnerabilities, which helps detect and
prevent them.
At this stage, one of the most essential DevSecOps practices is SAST (static
software application testing). Applicable to all programming languages, this
technique allows testing specialists to identify mathematical and syntax errors in
the code without executing it.
One of the advantages of SAST is the ability to be smoothly integrated into the
existing development process. For example, developers can use Amazon
CodeGuru’s interface to integrate CodeGuru Reviewer (an automated code
analysis service) with a build automation solution, such as Jenkins or TeamCity.
4. Test
The next step is to test the artifact (an object in the application) consisting of the
compiled source code deployed to the test environment. Here, such DevSecOps
techniques as DAST (dynamic application security testing) can come in handy.
Using DAST, testers simulate malicious attacks and try to find software
vulnerabilities. This way, DevSecOps teams can understand how the product will
perform in a real-world environment.
Today, the AWS Marketplace offers more than 30 DAST tools. For example, IT
teams can use InsightAppSec, StackHawk, or Fortify on Demand, all providing
such features as CI/CD automation and integration with the CI/CD build solutions.
5. Deploy
After deploying a build artifact to production, teams must verify and update TLS
and DRM certificates while resolving configuration discrepancies between staging
and production environments. Here, an IT team can use tools such as AWS Config,
as it helps evaluate resource configuration for vulnerabilities and non-compliance.
Due to integration across AWS services, teams also can use a unified AWS
Security Hub interface to perform this task.
6. Maintain and monitor
After the product has been released and stabilized, teams need to set up automated
monitoring to continuously identify threats and data leaks. One of the ways to do
this is by implementing RASP (run-time application security protection), a
technique that ensures software security during its operation through real-time
analysis of code, user behavior, and traffic. Teams can implement RASP using
AWS Security Hub and third-party software from the AWS Marketplace, such as
Imperva, Falco, or Contrast Security.
Implementing role-based access control (RBAC)
Although DevSecOps implies advanced automation, the role of the human factor
remains significant. After all, all development team members are deeply involved
in the process of software development and deployment, which creates cyber
security risks associated with human error.
Companies can implement models such as RBAC into their DevSecOps
infrastructure to address this issue. In short, RBAC allows limiting the access of
users (in this case, IT specialists) to data by assigning roles, each related to
different network permissions and privileges.
In practice, companies can implement RBAC using the built-in AWS Identity and
Access Management. This service manages roles and permissions and determines
which team members can access AWS resources and services.
Enhancing data encryption
Finally, we should mention data encryption, one of the critical elements of a
DevSecOps strategy. Although AWS automatically encrypts data (objects,
buckets) on the server side, companies can additionally implement client-side
encryption to ensure advanced security when transferring data from its source to
AWS storage.
The easiest way to manage encryption is to use built-in AWS tools such as AWS
Key Management Service. This tool allows for managing keys centrally and, being
integrated with other AWS services (such as AWS Encryption SDK), can streamline
data encryption at all stages of the CI/CD pipeline.
Final thoughts
Despite all the benefits, implementing DevSecOps is challenging and requires
advanced technical skills from IT teams. For example, to implement the DAST
technique, a company needs specialists with experience in penetration testing.
To overcome this challenge, a company can integrate role-specific training into its
SDLC to ensure that developers, testers, and other team members have the
necessary skills to perform their duties while ensuring software security. Involving
third-party AWS DevSecOps experts and augmenting an in-house IT team with
external talent is also a useful option.

More Related Content

Similar to Why Implement DevSecOps with AWS? | The Enterprise World

understanding devops security - DevSecOps
understanding devops security - DevSecOpsunderstanding devops security - DevSecOps
understanding devops security - DevSecOpsAnshulkichara3
 
AWS devops content 1(2023).docx
AWS devops content 1(2023).docxAWS devops content 1(2023).docx
AWS devops content 1(2023).docxMUDDUKRISHNA14
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsAmazon Web Services
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxSun Technologies
 
Iac evolutions
Iac evolutionsIac evolutions
Iac evolutionsPrancer Io
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaMohammed A. Imran
 
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxDoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxTomGrand4
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdfTechugo
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfTechugo
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.Techugo
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.Techugo
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessMohammed A. Imran
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDev Software
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfEnov8
 
DevOps Implementation Roadmap
DevOps Implementation RoadmapDevOps Implementation Roadmap
DevOps Implementation RoadmapSofiaCarter4
 

Similar to Why Implement DevSecOps with AWS? | The Enterprise World (20)

understanding devops security - DevSecOps
understanding devops security - DevSecOpsunderstanding devops security - DevSecOps
understanding devops security - DevSecOps
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
 
AWS devops
AWS devopsAWS devops
AWS devops
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
 
AWS devops content 1(2023).docx
AWS devops content 1(2023).docxAWS devops content 1(2023).docx
AWS devops content 1(2023).docx
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOps
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docx
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
Iac evolutions
Iac evolutionsIac evolutions
Iac evolutions
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
 
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxDoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdf
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdf
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLC
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
 
DevOps Implementation Roadmap
DevOps Implementation RoadmapDevOps Implementation Roadmap
DevOps Implementation Roadmap
 

More from TEWMAGAZINE

Engaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfEngaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfTEWMAGAZINE
 
Engaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfEngaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfTEWMAGAZINE
 
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...TEWMAGAZINE
 
The Art of Organizing in Management_ Strategies for Success.pdf
The Art of Organizing in Management_ Strategies for Success.pdfThe Art of Organizing in Management_ Strategies for Success.pdf
The Art of Organizing in Management_ Strategies for Success.pdfTEWMAGAZINE
 
Exploring Medicare Supplement Plans.pdf
Exploring Medicare Supplement  Plans.pdfExploring Medicare Supplement  Plans.pdf
Exploring Medicare Supplement Plans.pdfTEWMAGAZINE
 
Case Study the enterprise world magazine &.pdf
Case Study the enterprise world magazine  &.pdfCase Study the enterprise world magazine  &.pdf
Case Study the enterprise world magazine &.pdfTEWMAGAZINE
 
Navigating Healthcare IT Staff Augmentation | The Enterprise World
Navigating Healthcare IT Staff Augmentation | The Enterprise WorldNavigating Healthcare IT Staff Augmentation | The Enterprise World
Navigating Healthcare IT Staff Augmentation | The Enterprise WorldTEWMAGAZINE
 
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...TEWMAGAZINE
 
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldAir Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldTEWMAGAZINE
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldTEWMAGAZINE
 
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...TEWMAGAZINE
 
The Future of Social Media Marketing: Trends to Watch | The Enterprise World
The Future of Social Media Marketing: Trends to Watch | The Enterprise WorldThe Future of Social Media Marketing: Trends to Watch | The Enterprise World
The Future of Social Media Marketing: Trends to Watch | The Enterprise WorldTEWMAGAZINE
 
First Major Offshore Wind Project Energizes New York | The Enterprise World
First Major Offshore Wind Project Energizes New York | The Enterprise WorldFirst Major Offshore Wind Project Energizes New York | The Enterprise World
First Major Offshore Wind Project Energizes New York | The Enterprise WorldTEWMAGAZINE
 
Team Collaboration Tools That Outshine the Rest | The Enterprise World
Team Collaboration Tools That Outshine the Rest | The Enterprise WorldTeam Collaboration Tools That Outshine the Rest | The Enterprise World
Team Collaboration Tools That Outshine the Rest | The Enterprise WorldTEWMAGAZINE
 
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise World
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise WorldOleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise World
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise WorldTEWMAGAZINE
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldTEWMAGAZINE
 
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...TEWMAGAZINE
 
Designing Effective Systems at Organizational Structure | The Enterprise World
Designing Effective Systems at Organizational Structure | The Enterprise WorldDesigning Effective Systems at Organizational Structure | The Enterprise World
Designing Effective Systems at Organizational Structure | The Enterprise WorldTEWMAGAZINE
 
Embracing Transformational Leadership | The Enterprise World
Embracing Transformational Leadership | The Enterprise WorldEmbracing Transformational Leadership | The Enterprise World
Embracing Transformational Leadership | The Enterprise WorldTEWMAGAZINE
 
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise World
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise WorldSalzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise World
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise WorldTEWMAGAZINE
 

More from TEWMAGAZINE (20)

Engaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfEngaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdf
 
Engaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdfEngaging with Activist Investors_ Best Practices for Companies.pdf
Engaging with Activist Investors_ Best Practices for Companies.pdf
 
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...
Branding Essentials_ How Custom Post-It Notes Can Elevate Your Marketing Stra...
 
The Art of Organizing in Management_ Strategies for Success.pdf
The Art of Organizing in Management_ Strategies for Success.pdfThe Art of Organizing in Management_ Strategies for Success.pdf
The Art of Organizing in Management_ Strategies for Success.pdf
 
Exploring Medicare Supplement Plans.pdf
Exploring Medicare Supplement  Plans.pdfExploring Medicare Supplement  Plans.pdf
Exploring Medicare Supplement Plans.pdf
 
Case Study the enterprise world magazine &.pdf
Case Study the enterprise world magazine  &.pdfCase Study the enterprise world magazine  &.pdf
Case Study the enterprise world magazine &.pdf
 
Navigating Healthcare IT Staff Augmentation | The Enterprise World
Navigating Healthcare IT Staff Augmentation | The Enterprise WorldNavigating Healthcare IT Staff Augmentation | The Enterprise World
Navigating Healthcare IT Staff Augmentation | The Enterprise World
 
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...
NASA's Europa Clipper Mission: Quest for Extraterrestrial Life | The Enterpri...
 
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldAir Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise World
 
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...
Psychic Abilities: 5 Practical Tips to Overcome Skepticism | The Enterprise W...
 
The Future of Social Media Marketing: Trends to Watch | The Enterprise World
The Future of Social Media Marketing: Trends to Watch | The Enterprise WorldThe Future of Social Media Marketing: Trends to Watch | The Enterprise World
The Future of Social Media Marketing: Trends to Watch | The Enterprise World
 
First Major Offshore Wind Project Energizes New York | The Enterprise World
First Major Offshore Wind Project Energizes New York | The Enterprise WorldFirst Major Offshore Wind Project Energizes New York | The Enterprise World
First Major Offshore Wind Project Energizes New York | The Enterprise World
 
Team Collaboration Tools That Outshine the Rest | The Enterprise World
Team Collaboration Tools That Outshine the Rest | The Enterprise WorldTeam Collaboration Tools That Outshine the Rest | The Enterprise World
Team Collaboration Tools That Outshine the Rest | The Enterprise World
 
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise World
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise WorldOleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise World
Oleg Jelesko: Career of the Founder of Da Vinci Capital | The Enterprise World
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
 
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...
Titan's Underground Ocean May Lack Necessary Ingredients for Life | The Enter...
 
Designing Effective Systems at Organizational Structure | The Enterprise World
Designing Effective Systems at Organizational Structure | The Enterprise WorldDesigning Effective Systems at Organizational Structure | The Enterprise World
Designing Effective Systems at Organizational Structure | The Enterprise World
 
Embracing Transformational Leadership | The Enterprise World
Embracing Transformational Leadership | The Enterprise WorldEmbracing Transformational Leadership | The Enterprise World
Embracing Transformational Leadership | The Enterprise World
 
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise World
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise WorldSalzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise World
Salzburg: Where Baroque Splendor Meets Modern Charm | The Enterprise World
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Why Implement DevSecOps with AWS? | The Enterprise World

  • 1. Why Implement DevSecOps with AWS? According to Gartner, AWS dominates the global IaaS market, with over 38% percent market share. One of the reasons is that AWS helps companies deploy software more quickly and efficiently and smoothly scale workloads on demand. For instance, AWS DevOps services adoption enables companies to build CI/CD pipelines and automate code delivery and deployment, helping mitigate software downtime during updates. Some can go even further by implementing DevSecOps practices and thus significantly improve software security. This article covers the concept of DevSecOps and highlights how companies can set it up in AWS. Why adopt DevSecOps? Like traditional DevOps, the DevSecOps culture implies a close collaboration between development and IT operations teams to streamline software deployment. However, DevSecOps suggests implementing security controls early in the development stage and using testing mechanisms at every step of code creation.
  • 2. Therefore, the concept can be considered an evolution from traditional DevOps, which primarily focuses on improving release speed and frequency. In practice, implementing DevSecOps can provide companies with the following business benefits: 1. More secure code With DevSecOps, developers identify errors and vulnerabilities in the code quicker and earlier, eliminating them as soon as they appear. This can significantly improve the security of the final product. 2. Improved cyber security awareness DevSecOps assumes that each team member (including development, operations, and security specialists) is responsible for the solution’s security. This makes team members more familiar with the best security practices and helps identify potential threats in the code faster. 3. Advanced automation and standardization At the heart of DevSecOps are repeatable and automated processes (such as tests and monitoring) that help ensure the security of the developed solution. Also, the standardization makes it easier to continuously scale the use of DevSecOps practices.
  • 3. How to enable DevSecOps with AWS? Establish a DevSecOps pipeline The principles of continuous integration and deployment (CI/CD) are fundamental to DevOps, and DevSecOps is no different here. To ensure the effective use of DevSecOps practices, companies must integrate the ones for each stage of their AWS CI/CD pipelines, and here is how it can look in practice. 1. Plan The official OWASP guidelines suggest implementing such techniques as threat modelling, or identifying all potential security risks to a product, early on. As a result, teams can compile a complete list of threats and address them in advance with proper security measures. In addition, this information allows teams to create comprehensive plans defining when and how security testing should be performed throughout the project. Teams can use relevant solutions from the AWS Marketplace, such as IriusRisk, to integrate threat modeling into their SDLC. IriusRisk automates the building of threat models and helps address vulnerabilities throughout development. 2. Code To ensure security during the coding phase, teams can adhere to defensive programming principles within the DevSecOps pipeline. In a nutshell, this concept
  • 4. involves the early detection and isolation of errors in the code, thereby ensuring predictable and stable software operation in the future. To realize this concept, developers can implement tools such as formatters and linters, like AWS CloudFormation Linter to check AWS CloudFormation templates, highlight suspicious bugs or errors, and eliminate them timely. 3. Build The build phase begins after developers create the code and submit it for version control. In this step, DevSecOps focuses on analyzing the source code and its dependencies against the most common vulnerabilities, which helps detect and prevent them. At this stage, one of the most essential DevSecOps practices is SAST (static software application testing). Applicable to all programming languages, this technique allows testing specialists to identify mathematical and syntax errors in the code without executing it. One of the advantages of SAST is the ability to be smoothly integrated into the existing development process. For example, developers can use Amazon CodeGuru’s interface to integrate CodeGuru Reviewer (an automated code analysis service) with a build automation solution, such as Jenkins or TeamCity. 4. Test The next step is to test the artifact (an object in the application) consisting of the compiled source code deployed to the test environment. Here, such DevSecOps techniques as DAST (dynamic application security testing) can come in handy. Using DAST, testers simulate malicious attacks and try to find software vulnerabilities. This way, DevSecOps teams can understand how the product will perform in a real-world environment. Today, the AWS Marketplace offers more than 30 DAST tools. For example, IT teams can use InsightAppSec, StackHawk, or Fortify on Demand, all providing such features as CI/CD automation and integration with the CI/CD build solutions. 5. Deploy After deploying a build artifact to production, teams must verify and update TLS and DRM certificates while resolving configuration discrepancies between staging and production environments. Here, an IT team can use tools such as AWS Config, as it helps evaluate resource configuration for vulnerabilities and non-compliance.
  • 5. Due to integration across AWS services, teams also can use a unified AWS Security Hub interface to perform this task. 6. Maintain and monitor After the product has been released and stabilized, teams need to set up automated monitoring to continuously identify threats and data leaks. One of the ways to do this is by implementing RASP (run-time application security protection), a technique that ensures software security during its operation through real-time analysis of code, user behavior, and traffic. Teams can implement RASP using AWS Security Hub and third-party software from the AWS Marketplace, such as Imperva, Falco, or Contrast Security. Implementing role-based access control (RBAC) Although DevSecOps implies advanced automation, the role of the human factor remains significant. After all, all development team members are deeply involved in the process of software development and deployment, which creates cyber security risks associated with human error. Companies can implement models such as RBAC into their DevSecOps infrastructure to address this issue. In short, RBAC allows limiting the access of users (in this case, IT specialists) to data by assigning roles, each related to different network permissions and privileges.
  • 6. In practice, companies can implement RBAC using the built-in AWS Identity and Access Management. This service manages roles and permissions and determines which team members can access AWS resources and services. Enhancing data encryption Finally, we should mention data encryption, one of the critical elements of a DevSecOps strategy. Although AWS automatically encrypts data (objects, buckets) on the server side, companies can additionally implement client-side encryption to ensure advanced security when transferring data from its source to AWS storage. The easiest way to manage encryption is to use built-in AWS tools such as AWS Key Management Service. This tool allows for managing keys centrally and, being integrated with other AWS services (such as AWS Encryption SDK), can streamline data encryption at all stages of the CI/CD pipeline. Final thoughts Despite all the benefits, implementing DevSecOps is challenging and requires advanced technical skills from IT teams. For example, to implement the DAST technique, a company needs specialists with experience in penetration testing. To overcome this challenge, a company can integrate role-specific training into its SDLC to ensure that developers, testers, and other team members have the necessary skills to perform their duties while ensuring software security. Involving third-party AWS DevSecOps experts and augmenting an in-house IT team with external talent is also a useful option.