SlideShare a Scribd company logo
1 of 24
Preventing Devoops
with DevSecOps
Kieran Jacobsen
Technical Lead – Infrastructure & Security
2016 was a big year…
/ Copyright ©2017 by Readify Limited 2
2017 is getting of to a bad start…
3
Before DevOps
DevOps
But Where Is Security?
DevSecOps
 Clear Communication Pathways
 Streamlined Communication
 Security As Code
 Training
 Integrate Security into DevOps cycle
Communication Pathways
Development Operations
Security
Streamlined Communication
NO:
 Excel checklists
 Word document reports and policy documents
 Email attachments
Streamlined Communication
YES:
 Backlogs/boards
Streamlined Communication
YES:
 Backlogs/boards
 Support ticketing
Streamlined Communication
YES:
 Backlogs/boards
 Support ticketing
 Markup and Git
Security As Code
 Application Source Code
 Azure ARM and AWS Cloud Formation
 Server Configuration – Chef, Puppet, DSC
ARM Templates
PowerShell DSC
Training
 We can’t be experts in Dev, Sec and Ops
 We need cross pollination of skills
 Starts at day 0
Integrating Security
Plan
 Integrate security into sprint planning and reviews
 Consider security user stories early
Code
 Training!
 Test driven development
 Use of the correct tools
 Pull Requests
Build
 Static code analysis
 Dynamic code analysis
Test
 Develop security test cases
 Fuzzing
 Load testing
Release & Deploy
 Automated scanning upon deployment
Operate & Monitor
 Monitor logs
 Rescan for vulnerabilities
 Have a structured patch process
 Track dependencies
Thank You

More Related Content

What's hot

Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOpsCloudPassage
 
Infrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpsInfrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpskieranjacobsen
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big pictureDevSecOpsSg
 
DevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security SuccessDevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security SuccessPuma Security, LLC
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpskieranjacobsen
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021Archana Joshi
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Guy Podjarny
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an IntroductionPrashanth B. P.
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security AutomationJason Chan
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsAlert Logic
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudAmazon Web Services
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh ShregillAgileNetwork
 
DevOps and Application Security
DevOps and Application SecurityDevOps and Application Security
DevOps and Application SecurityShahee Mirza
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Mohammed A. Imran
 
PIACERE - DevSecOps Automated
PIACERE - DevSecOps AutomatedPIACERE - DevSecOps Automated
PIACERE - DevSecOps AutomatedPIACERE
 

What's hot (20)

DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
 
Infrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpsInfrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOps
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security SuccessDevSecOps: Key Controls to Modern Security Success
DevSecOps: Key Controls to Modern Security Success
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOps
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOps
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
 
DevOps and Application Security
DevOps and Application SecurityDevOps and Application Security
DevOps and Application Security
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
PIACERE - DevSecOps Automated
PIACERE - DevSecOps AutomatedPIACERE - DevSecOps Automated
PIACERE - DevSecOps Automated
 

Viewers also liked

Evolving your automation with hybrid workers
Evolving your automation with hybrid workersEvolving your automation with hybrid workers
Evolving your automation with hybrid workerskieranjacobsen
 
Resolución rectoral nº 001 2017
Resolución rectoral nº 001 2017Resolución rectoral nº 001 2017
Resolución rectoral nº 001 2017deiberrector
 
Lineamientos estratégicos para la comunicación global efectiva de mi marca
Lineamientos estratégicos para la comunicación global efectiva de mi marcaLineamientos estratégicos para la comunicación global efectiva de mi marca
Lineamientos estratégicos para la comunicación global efectiva de mi marcaAlbelidys
 
Tokyo mou deficiency codes (june 2014)
Tokyo mou deficiency codes (june 2014)Tokyo mou deficiency codes (june 2014)
Tokyo mou deficiency codes (june 2014)GOLDENDRAGON511
 
Problema gestion del capital humano y evaluacion del desempeño laboral
Problema gestion del capital humano y evaluacion del desempeño laboralProblema gestion del capital humano y evaluacion del desempeño laboral
Problema gestion del capital humano y evaluacion del desempeño laboralalixindriago2013
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
3Com 10000563
3Com 100005633Com 10000563
3Com 10000563savomir
 
Evaluación del estado de nutrición
Evaluación del estado de nutriciónEvaluación del estado de nutrición
Evaluación del estado de nutriciónFatimaBriseidaCG
 
Azure automation invades your data centre
Azure automation invades your data centreAzure automation invades your data centre
Azure automation invades your data centrekieranjacobsen
 
Profesionalizar la enseñanza universitaria
Profesionalizar la enseñanza universitariaProfesionalizar la enseñanza universitaria
Profesionalizar la enseñanza universitariaRebeca Marquez
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWSAmazon Web Services
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
 

Viewers also liked (20)

Evolving your automation with hybrid workers
Evolving your automation with hybrid workersEvolving your automation with hybrid workers
Evolving your automation with hybrid workers
 
Resolución rectoral nº 001 2017
Resolución rectoral nº 001 2017Resolución rectoral nº 001 2017
Resolución rectoral nº 001 2017
 
Lineamientos estratégicos para la comunicación global efectiva de mi marca
Lineamientos estratégicos para la comunicación global efectiva de mi marcaLineamientos estratégicos para la comunicación global efectiva de mi marca
Lineamientos estratégicos para la comunicación global efectiva de mi marca
 
7 filtros
7 filtros7 filtros
7 filtros
 
Tokyo mou deficiency codes (june 2014)
Tokyo mou deficiency codes (june 2014)Tokyo mou deficiency codes (june 2014)
Tokyo mou deficiency codes (june 2014)
 
Full+toefl grammar
Full+toefl grammarFull+toefl grammar
Full+toefl grammar
 
Problemas 3 fff
Problemas 3 fffProblemas 3 fff
Problemas 3 fff
 
Problema gestion del capital humano y evaluacion del desempeño laboral
Problema gestion del capital humano y evaluacion del desempeño laboralProblema gestion del capital humano y evaluacion del desempeño laboral
Problema gestion del capital humano y evaluacion del desempeño laboral
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
3Com 10000563
3Com 100005633Com 10000563
3Com 10000563
 
Evaluación del estado de nutrición
Evaluación del estado de nutriciónEvaluación del estado de nutrición
Evaluación del estado de nutrición
 
Azure automation invades your data centre
Azure automation invades your data centreAzure automation invades your data centre
Azure automation invades your data centre
 
Profesionalizar la enseñanza universitaria
Profesionalizar la enseñanza universitariaProfesionalizar la enseñanza universitaria
Profesionalizar la enseñanza universitaria
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 

Similar to DevSecOps - CrikeyCon 2017

Continuous Security / DevSecOps- Why How and What
Continuous Security /  DevSecOps- Why How and WhatContinuous Security /  DevSecOps- Why How and What
Continuous Security / DevSecOps- Why How and WhatMarc Hornbeek
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation JourneyDevOps Indonesia
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDev Software
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
 
understanding devops security - DevSecOps
understanding devops security - DevSecOpsunderstanding devops security - DevSecOps
understanding devops security - DevSecOpsAnshulkichara3
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxSun Technologies
 
Lean_Security.pptx
Lean_Security.pptxLean_Security.pptx
Lean_Security.pptxClase21
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}Ajeet Singh
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineCloudZenix LLC
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfTechugo
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.Techugo
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdfTechugo
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxDev Software
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.Techugo
 
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?Enov8
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessMohammed A. Imran
 

Similar to DevSecOps - CrikeyCon 2017 (20)

Continuous Security / DevSecOps- Why How and What
Continuous Security /  DevSecOps- Why How and WhatContinuous Security /  DevSecOps- Why How and What
Continuous Security / DevSecOps- Why How and What
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLC
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
 
understanding devops security - DevSecOps
understanding devops security - DevSecOpsunderstanding devops security - DevSecOps
understanding devops security - DevSecOps
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docx
 
Lean_Security.pptx
Lean_Security.pptxLean_Security.pptx
Lean_Security.pptx
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
 
DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD Pipeline
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdf
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdf
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.
 
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 

More from kieranjacobsen

The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019kieranjacobsen
 
CrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security TalkCrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security Talkkieranjacobsen
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talkkieranjacobsen
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talkkieranjacobsen
 
Secure Azure Deployment Patterns
Secure Azure Deployment PatternsSecure Azure Deployment Patterns
Secure Azure Deployment Patternskieranjacobsen
 
Ransomware 0, Admins 1
Ransomware 0, Admins 1Ransomware 0, Admins 1
Ransomware 0, Admins 1kieranjacobsen
 
DecSecOps in 10 minutes
DecSecOps in 10 minutesDecSecOps in 10 minutes
DecSecOps in 10 minuteskieranjacobsen
 
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data CentreGlobal Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centrekieranjacobsen
 
Exploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellExploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellkieranjacobsen
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Duckykieranjacobsen
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Enabling Enterprise Mobility
Enabling Enterprise MobilityEnabling Enterprise Mobility
Enabling Enterprise Mobilitykieranjacobsen
 
Advanced PowerShell Automation
Advanced PowerShell AutomationAdvanced PowerShell Automation
Advanced PowerShell Automationkieranjacobsen
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Serviceskieranjacobsen
 
DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’tskieranjacobsen
 

More from kieranjacobsen (17)

The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
 
CrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security TalkCrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security Talk
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
 
Secure Azure Deployment Patterns
Secure Azure Deployment PatternsSecure Azure Deployment Patterns
Secure Azure Deployment Patterns
 
Ransomware 0, Admins 1
Ransomware 0, Admins 1Ransomware 0, Admins 1
Ransomware 0, Admins 1
 
Ransomware 0 admins 1
Ransomware 0 admins 1Ransomware 0 admins 1
Ransomware 0 admins 1
 
DecSecOps in 10 minutes
DecSecOps in 10 minutesDecSecOps in 10 minutes
DecSecOps in 10 minutes
 
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data CentreGlobal Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
 
Exploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellExploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShell
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Enabling Enterprise Mobility
Enabling Enterprise MobilityEnabling Enterprise Mobility
Enabling Enterprise Mobility
 
Advanced PowerShell Automation
Advanced PowerShell AutomationAdvanced PowerShell Automation
Advanced PowerShell Automation
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’ts
 

Recently uploaded

%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 

Recently uploaded (20)

%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 

DevSecOps - CrikeyCon 2017

Editor's Notes

  1. Good morning everybody, my name is Kieran Jacobsen, I am the Technical Lead for Infrastructure and Security within Readify’s Managed Services team. My focus within Readify is the management and maintenance of Readify’s internal systems and infrastructure. That might seem simple, but ensuring that our infrastructure and systems are available for 220 incredible talented individuals actually takes a lot of work. I also work as a connector between our developers, customers operations and security teams, and recently Telstra’s operations and security teams. I have seen what works, and what doesn’t work.
  2. By all accounts, 2016 was a massive year for information security. We saw a significant number of breach disclosures, breaking records in terms of the number and size of the breaches. We saw a number of older breaches appear for the first time, like those impacting LinkedIn, Myspace and Yahoo. We saw the mirai bot net appear, hit Brian Krebs with a record breaking denial of service attack, then target DynDNS and knocking off Spotify, twitter, GitHub PayPal and more. We also saw a number of breaches where database backups made public, including one impacting the Australian Red Cross.
  3. Yet 2017, politics aside, seems to be gearing up to be even worse. Attackers have laid waste to poorly secured Hadoop, MongoDB, ElasticSearch and CouchDB instances; deleting data and leaving ransom notes. We also saw a suspected DDOS take down Lloyds bank for 2 days. Recently, we saw an employee delete the wrong folder of files, taking down GitLab for several days and finally a 13 year old worm made a reappearance. That’s right, SQL Slammer is back! If this is what happened January, I can’t wait to see how things heat up further.
  4. Here we see a representation of development and operations before the introduction of DevOps. Development would catapult new builds at operations, and they would return with a volley of bugs and issues. Our applications were unstable, deployments were a complex mess and overall our organisations suffered.
  5. Along came DevOps, with a promise that we would get two waring factions to act as one, and fight a common enemy, users. DevOps has largely been a success, applications have become more stable, we now have a faster release cycle, with fixes deployed to production often at an hourly basis. Development and Operations is now moving at a speed to which the rest of the business was wanting. Gartner predicted that 2016 was the year DevOps goes mainstream, with 25% of the businesses using DevOps by 2017. HP Enterprise, my old employer went so firmly as to say that within 5 years DevOps will be the norm when it comes to software development.
  6. Somehow, in the race to embrace the benefits of DevOps, organisations didn’t include their own security teams. And Whilst we like to think of DevOps as encouraging security, the result has been the wild west. We have insecurely deployed servers, databases and applications. Organisations have forgotten things like backups, and disaster recovery. It really does feel like the dotcom boom, everyone is happy, but the word is crumbing. If 2016 is the year that DevOps goes mainstream, then 2017 will surely be the year that attacks against DevOps becomes the norm.
  7. So how do we achieve DevSecOps. We need to start by creating clear and precise communication pathways with streamlined communication. We need to consider security as code, and invest in training. I am going to finish by looking at how we can include security within the DevOps cycle.
  8. This quote from Jess Dodson, a local MVP sums up some of the challenges we are facing within IT right now and in the relationship between the three groups. We’re all in customer service, our users are our customers, we need to understand them and their needs to do our job well. This is so true, but we often forget that these three groups are also customers of each other, and we need to treat those relationships between these three just like any other customer service role. When I get back to Melbourne, I am looking at putting this up and framing it.
  9. So here we have the three groups. As expected, we have development and operations. <click> Now In DevOps, we recognise that these two need to work together to achieve beneficial outcomes. The organisation as a whole, expects development to keep creating new things, new software builds etc; to do this, they need ops to provide internet access, workstations, test machines and much more. Converse, the business expects stability from operations which results in ops needing dev to high quality code, and stable applications for them to install. Dev is a customer of operations, but conversely, Operations is a customer of development. <click> So where does security fit in? Well security need development to write high quality code, and security is a factor of quality. Security also need operations to do things like patching, vulnerability remediation and replacing old pieces of infrastructure. Security is a customer of development, and operations. <click> Now for the bit that most people miss, development and operations are customers of security. Security needs to realise that for the other two teams to succeed, they need guidance, assistance and support. So, how do we support this? The first step is by communicating more effectively with each other.
  10. One thing that has always shocked me is the difference in hiring numbers with an average organisation. Before I reveal the actual ration, I want everyone to briefly consider what the ration between developer hires, operational and security hires is. To help you, how many developers and operations staff are hired for a single security professional? That's right, organisations hire 100 developers and 10 ops team members for each security person. Developers need to be aware that the operations team is not just there to support development. It is an extremely common misconception, particularly in development, but also in other parts of an enterprise, that operations sits and waits for requests. The 10 in operations that we see here, are often supporting the rest of the organisation as well, and supporting the business can often be exceptionally time consuming. If you add process like change management, and then all of the other things you need to do, like training etc, your operations staff are stretched quite thin. The same goes for Security. DevOps can help this, however its critical to realise that in most organisations, even with a DevOps focus, operations is a time consuming process. A few years back, I worked in an organisation of roughly 1500, 150 of which were IT. This included developers, operations, and security, as one of operations, hypothetically speaking, I not only need to support 10 developers and ensure they have everything that need, but I also have another 140 non technical staff to support as well. And this rounds out our discussion of expectations. When I hear the statement “Ops a hopeless, it takes them a week to provision a single virtual machine”, you need to consider the work it takes to build a virtual machine! It often requires miles of paper work, coordination with a variety of teams and then I need approval from management and different teams. I often only get one slot per week for approval as well, so if you missed that one, you could be forced to wait a week. I have to do all of that, whilst supporting 9 other developers and 140 other staff members. Now who is being unreasonable? ** talk about communication via tickets and setting expectations **
  11. In most organisations, security processes often heavily rely on excel checklists, word documents and email attachments. This was fine 10 years ago, but it isn’t appropriate now. Excel was designed for financial information and numerical data, not checklists. Recently I had to work through over 12 000 security questions all in macro enabled excel files. I hope you can see the issues with this as I did. I have one made one decision this year, and that is, I will not respond to any more security reviews on macro enabled spreadsheets. Word documents are heavily relied on for reports and policy documents. People don’t have time to read a 500 page security report, and word isn’t great for policies, as its hard to maintain a version history. We can’t easily tell what has changed between one version and the next, am I compliant with security policy 1.1.16? Guess I need to read all 150 pages to find out what changed from 1.1.15 so I can tell. Email attachments inhibit collaboration, they are great for broadcasting information, but not great for a team working on a report together. You also need to be aware that not everyone runs their mail servers like you might, do you want to send sensitive information to that partner via email? So how should we communicate to facilitate better teams and improve productivity?
  12. Work backlogs and boards have done wonders for agile and devops, and we extend upon this for DevSecOps. They encourage collaboration and ownership. Teams work together to determine priorities, and there is a clear progression of activities. Security teams don’t produce reports in word or PDF, instead they create tasks in a backlog. This allows for clear prioritisation, and ownership.
  13. Don’t underestimate the effectiveness of support and helpdesk tools like Zendesk here. They are great at managing an alert stream, maintain change history, encourage teams to work better and more efficiently. Automated responses can save time, and including developers and security, not just ops, allows for issues to flow smoothinly from team to team. <example>
  14. The last communication tool, is actually a language and a tool. Documentation needs to be simple and easy, and that is why we often fall back to things like Word, Excel and OneNote. Personally, until recently I was a bit suspicious of using markup and git for documentation. Markup can be hard to work with, would be really be good for documentation? When we use Markup with Git, we gain a way of determining the changes from one version to the next, we can easily see who made a change and why, and with Git pull requests, we can have a workflow where changes are reviewed before they are pushed out to the rest of the team, or the rest of the business. For instance, say we find an issue with the security policy, as a sysadmin, I make the changes, and create a pull request for security to review. Security reviews the pull request and merges the changes. This is now available to the business. It is worth highlighting that there are plenty of ways to present this information in a friendly way to the rest of the business, we could push it up to a web page, or turn them into word or pdf files. This could be performed automatically at commit.
  15. So the next big takeaway is security as code. Or as I like to put it, here is all of the code that could impact your organisations security. So obviously we have application source code, but what about the other parts of your environment? If your developers are using Azure or AWS, they are probably using templates to deploy infrastructure. Care needs to be taken that these templates are created in a way that the infrastructure they deploy is secure. Does operations review these? What about security? Server configuration tools like Chef, Puppet and PowerShell DSC are all the rage, but I often see two major issues. Firstly the tools themselves are often not secured correctly, these tools often have vulnerabilities in their management interfaces, and at times accessed over HTTPS with weak credentials. Try to imagine getting a hacker out if your configuration tools are recreating their backdoored accounts. Just as importantly, are these tools deploying the most secure configuration possible to servers? These tools are great at pushing out security configurations like SSL hardening, application patches and secure service configuration.
  16. So Azure Resource Manager Templates, or ARM Templates for short. Allow us to deploy services within Azure in a repeatable manner. This includes things like storage, networks, addresses, virtual machines, web apps, SQL databases and much more. In this example, we see a configuration element relating to a Network Security Group, basically this is an ACL. I have taken this from the Azure Quick start templates. This NSG specified that the only traffic allowed to this system is RDP, port 3389. Unfortunately, they have allowed all the internet as a source address, so I guess someone will start brute forcing this box soon enough. Now I am not surprised by this one, from experience, this is actually better than the majority of templates I see. The majority of templates do not even apply network security groups, resulting in all services, from RDP to SSH to SMB to SQL left exposed to all in sundry. Do you know if your developers are deploying from examples like this?
  17. So let’s take a quick look at another example, this type its PowerShell DSC. This example is snipped of a much larger DSC configuration that all of our servers at Readify comply to. This will disable insecure ciphers being used for HTTPS connections. Imagine the effectiveness if you pushed this out to all of your web servers, or better yet, every server in your fleet? This is security as code. We are making our environment more secure using code.
  18. It is a fact of life, and a fact within our industry, that we cannot be experts in everything. We cannot be an expert at development, security and operations. I can’t be an expert in C# and Pen Testing and Deploying Exchange Servers. To succeed in DevSecOps, we need teams that have a cross pollination of skills, the developer who understands application vulnerability testing, the sysadmin who can program, the security engineer that understands web server configurations. With new skills comes new patterns in our thinking, and we come up with new ways to solve the problems we are presented with. Security awareness begins on the first day. When new hires start, not only should they receive the usual basic training on passwords and shoulder surfing, but they need specialist training. Developers should receive training on the quality expectations of the code that they are writing, the basics of secure coding and the most common exploit vectors. Senior developers should go on training courses covering secure coding practices and the common mistakes, not only does this give them ownership of security, but forces them to think through theses issues, which is critically important. Senior developers are the mentors for the junior developers, they are also the ones who perform the daily pull request reviews. Training isn’t a once off thing, it’s a multiple times per year thing. Training is not just a PowerPoint slide, nor is it the same video each year. Training needs to be reviewed regularly to ensure it covers the latest technology and the changes in the security landscape.
  19. At Readify, we identified that phishing was a critical risk to an organisation. Technology can only solve so much, there isn’t a silver bullet. So we opted to organise some training. We selected an external vendor that had a three step process. The first is a baseline, every use gets an email, the same email, throughout a month long period. After baseline comes training, and then once training is complete, there is a period of continual training. During this final phase, staff get one phishing email each month to test them and to help hone their skills. Before we look at the results, lets look at the break down of staff at Readify. <click> As you can see, the majority, around 80%, of our employees are technical, be it developers, database people, business intelligence, SharePoint, or infrastructure people like me. My expectation was that the majority of those who fell for the baseline email, would be non-technical, I know, I am biased. <click> As you can see, the results are a tad more interesting. Overall, we had 26% of our staff click on the baseline email, surprisingly, only a small fraction of those, 2 people, were non-technical. Since the training, our click rate is down to about 2% each month. Moral of the story, don’t always expect your non-technical staff to be the source of your security issues.
  20. So back we are to the infinite loop that is DevOps. So where should we integrate? The answer is, at every single step along the way. Security is something we need to consider at every step, we use to say security is as strong as the weakest link in the chain, well this loop here is your new chain, lets make sure everything is as strong as it can be. Automation is crucial here, we need to be able to integrate our security tools with the rest of the continuous build and release pipeline. If your tool needs to be manually triggered, or cannot feed its results back into a backlog, or into a support ticket system, it isn’t going to succeed.
  21. As we spoke about earlier, its crucial to involve security teams in the sprint planning and review process, I also believe that you need to consider any security stories or work items as early as you can in your project. Security stories can be complex, and you don’t want them to be rushed towards the end of a project.
  22. So training reappears. How do we write good code, well, we ensure of developers know how to write good code through proper training. Another thing that I think is crucial at this point is the use of test driven development. If we are writing unit tests for a specific module of code, why not include security tests. That way as the model is then written, we are already working to ensure that it is following security practices. Tooling is also very important here. There are a bunch of IDEs and plugins that will alert a user to bad practices, invest in these to help developers spot problems earlier on. Pull requests, and their associated code reviews are also critical. You should ensure that no one approves their own pull request, no matter the urgency, and you should ensure that whoever is performing the review has received adequate security training. If they are new to the review process, consider using a buddy who has a history of approving high quality code and providing good feedback. Pull Requests with obvious vulnerabilities do not get pushed into pre-production or production environments.
  23. During the build process we can look at using static and code analysis tools. The argument over which is better, is as old as the industry, and I am not going to enter it. What is worth noting is that these tools need to be correctly tunned, they often don’t take into account any other mitigations that we might have deployed within your environment. Care needs to be taken with the alerts that they generate. A build that fails its security checks isn’t of high enough quality to proceed further down the pipeline. Ensure that everyone is aware that the expectation is for high quality code to proceed to testing and onwards.
  24. Automated testing is so critical for a DevOps and a DevSecOps project. Testing is how we ensure that our code is up to scratch and its of quality that we would want to deploy it. When Testing, be it unit testing, or automated UI testing, or even formal manual user acceptance testing, include security test cases, that is cases that can be used to ensure the system is performing securely. A simple example of this might be that if a user was to enter SQL injection into a webform, that the form doesn’t output SQL errors. Fuzzing is another technical that is becoming popular, it’s the process of sending random inputs to software to spot security holes. A number of vendors are producing not only great fuzzing tools, but ones that allow for automated tests with integration into our build and release pipelines. Microsoft recently announced Project Springfield, a tool its been testing in house and with customers. Another bit of testing that can be automated, and is so often overlooked is load testing. I can’t believe its 2017, and people still don’t do load testing. Load Testing not only proves that the application infrastructure can handle the load, but it can also help us determine if it can handle more than what is expected, say in the event of an attack. Microsoft includes support for load testing in their VSTS platform. Once again, if the app fails in testing, it doesn’t proceed.
  25. When an application gets to the release and deployment stages, we might think there is nothing for us to do; this isn’t the case, at this point, we may have deployed an application into a development or pre-production environment prior to deployment on production. Why not perform an end-to-end vulnerability assessment, scan not just the application but the entire stack, from servers, to databases, to load balancers. This is potentially your first time seeing the application and its supporting elements in its entirety, make use of the opportunity.