SlideShare a Scribd company logo
1 of 5
Download to read offline
IAC Evolutions
Historically, in the software development life cycle (SDLC), once code was written, it had
to be manually deployed to physical servers. As you can imagine, this process was both time
consuming and fraught with complications. Oftentimes, a single script was used to establish
dependency libraries, setup load balancers and complete other necessary tasks. Also
preparing the server to host the code was a daunting task. As a result, only a few people
would be capable of understanding all the moving parts and be able to make changes, launch
updates and problem solve. A server could be down for hours while a single operations
engineer tried to sort through all the different variables to find the source of the problem.
The SDLC Waterfall Approach
Beginning in the 1990s, software development experts tried to improve the SDLC process by
relying on a waterfall approach. With this strategy, developers, QA engineers and system
administrators each had a specific role to play in the development process. If a problem
arose with the code, the admin would have to assign the task to the developers. The fix
would then have to be tested by the QA team before finally being sent back to the system
admin for deployment.
At that time, the Software Development Life cycle (SDLC) was focused on the application
layer code. Preparing the servers and deploying the applications to the server was another
skill. This added another separate area of expertise that also had the potential to introduce
bottlenecks.
In theory, this approach provided logical steps for troubleshooting. However, development
doesn’t occur in a linear pattern and it didn’t take long for new releases to throw significant
wrenches in the process. In addition, it was all too easy for different teams to blame
problems on each other, further complicating communication and collaboration. Now add
security concerns to the mix and you have a truly inefficient and static software
development approach.
By the early 2000s, companies had developed a more agile approach to software
development. They recognized the importance of employees with cross functionalities and
collaboration among teams. However, it still wasn’t a perfect system and it was easy for
projects to be delayed if communication fell apart. Clearly, there was still significant room
for improvement.
Cloud Computing
The introduction of cloud computing with the emergence of Amazon Web Services and the
beta version of the Google App Engine significantly changed the software development life
cycle. Cloud computing allowed users to experience on demand tools and resources that
didn’t have to be actively managed or stored on site. Virtualization also paved the way for
further automation. Suddenly, more users were able to take full advantage of technologies
without having to rely on an expert or become one themselves. This new level of
accessibility allowed for collaboration and innovation.
When cloud providers became more mature and provided API access to their backend
services, companies also started releasing infrastructure as code tools. These helped to
further support virtual machines and app services and move away from physical hardware
that would have to be manually configured and maintained. This not only helped business
cut costs, but also accelerated the software development life cycle while also working to
eliminate errors and identify security vulnerabilities.
At the same time, it became clear that microservices were necessary in order to effectively
organize software development. Essentially, this means that an application and its services
are split into smaller components that can then be deployed independently. Instead of
bundling services, microservices provide a more agile approach that can better handle many
different moving parts. This new mode of organization and deployment also required a full
stack team approach where the task boundaries are more fluid and team members can
contribute along the entire SDLC pipeline. A full stack team is able to work to avoid clogs
in the pipeline that can result when different people are solely responsible for specific tasks.
Eventually, the idea of DevOps emerged as a new way to significantly accelerate efficiency
while also prioritizing security. In this new model, Software Development Life Cycle (SDLC)
is not just about the application layer. With the advancement of cloud provider companies,
infrastructure is part of the SDLC as part of one unified pipeline; both the infrastructure
and application can be deployed to the cloud.
Collaboration is at the heart of DevOps. Instead of having each team tightly bound within a
certain role, everyone is involved in all aspects of the DevOps process. System admins have
the ability to write scripts, QA engineers can move beyond simply testing and so forth. This
fosters better understanding among teams while increasing productivity.
DevOps also allows enterprises to move security to the forefront. It is no longer simply
tacked onto the end of the process after loopholes have already been created and written
into the software. Integrating security into DevOps also helps support the CI/CD pipeline.
Enterprises don’t have to deal with the same bottlenecks that previously slowed innovation.
Static Code Analysis
Static code analysis is another key aspect that has contributed to the security of the DevOps
model. In the past, developers would have to design and run a program before they could
manually go through the debugging process. With static code analysis, code can be
automatically checked against a set of rules during the creation process. This significantly
accelerates the debugging process and catches problems early on when they are easier and
less expensive to fix. Static code analysis is also able to provide a more in-depth look at the
code and accurately pinpoint problems.
In addition, static code analysis allows security to “shift to the left.” Essentially, this means
that security and compliance issues are addressed as early in the development process as
possible. This translates into a better and more agile approach to security that is capable
of identifying emerging threats, making automatic fixes and sending alerts when suspicious
activity is detected.
Static code analysis for the application layer is here to stay and there are lots of vendors
providing automated tools to conduct static code analysis on application layer codes. But
since Infrastructure and Application are being deployed to the target cloud environment
with one pipeline, it is crucial to have the static code analysis for the IaC pipeline as well.
This ensures the infrastructure, which is being deployed to the cloud, will be secure and
provide early feedback to the infrastructure developer concerning any potential security
problems.
While static code analysis on IaC has proven to be an effective tool, it is still a new concept
to many companies. Most businesses still rely on the Pull Request (PR) approval process to
catch a security misconfiguration. However, this is prone to the errors and the unsecure
infrastructure could be deployed to the cloud, which makes a huge risk for companies who
are after zero touch deployments.
Prancer cloud validation framework is a pre-deployment validation engine that can conduct
static code analysis on your IaC. It can easily be integrated to your current pipeline and
toolset. Prancer supports native Azure ARM templates, Amazon AWS CloudFormation
templates and Google Deployment templates. Prancer also supports Terraform for all major
cloud providers for static code analysis.
IaC development teams leverage the power of git to contribute to the code. Usually the
process is to create a feature branch out of the master branch, make the changes, check
the code and raise the Pull Request. Prancer validation framework can be integrated to any
CI tool to evaluate the code at this stage and make sure it is compliant. All the predefined
policies are available in a centralized git repository. With just a few clicks you can make
sure the malicious code does not find its way into your environment. You don’t need to have
an active credential to the target environment to conduct the static code analysis on your
IaC templates. For example, consider a scenario where an IaC developer is writing code for
the production environment and they want to get early feedback on the code before starting
the CI process. They can utilize the power of prancer validation framework to make sure
the IaC is secure and solid before starting the deployment process.
As you can see, IaC has gone through tremendous changes in just the past few decades.
Virtualization and automation are making the SDLC more agile and accessible to all parties
involved while also making security a part of the development process and not just an
afterthought. This has allowed companies to innovate at an unprecedented pace and makes
the future of IaC and SDLC look brighter than ever.
To learn more about IaC, cloud computing and security and compliance, contact the experts
at prancer.

More Related Content

What's hot

What's hot (20)

Microsoft DevOps Solution - DevOps
Microsoft DevOps Solution - DevOps  Microsoft DevOps Solution - DevOps
Microsoft DevOps Solution - DevOps
 
The State of DevOps Tools: A Primer
The State of DevOps Tools: A PrimerThe State of DevOps Tools: A Primer
The State of DevOps Tools: A Primer
 
Tailoring your SDLC for DevOps, Agile and more
Tailoring your SDLC for DevOps, Agile and moreTailoring your SDLC for DevOps, Agile and more
Tailoring your SDLC for DevOps, Agile and more
 
5 principles-securing-devops-veracode-whitepaper
5 principles-securing-devops-veracode-whitepaper5 principles-securing-devops-veracode-whitepaper
5 principles-securing-devops-veracode-whitepaper
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
How to plug the data gap in DevOps
How to plug the data gap in DevOpsHow to plug the data gap in DevOps
How to plug the data gap in DevOps
 
Q!Digitz
Q!Digitz Q!Digitz
Q!Digitz
 
DevOps, A path to Enterprises to Adopt [Decoding DevOps Conference - InfoSep...
DevOps, A path to Enterprises to Adopt  [Decoding DevOps Conference - InfoSep...DevOps, A path to Enterprises to Adopt  [Decoding DevOps Conference - InfoSep...
DevOps, A path to Enterprises to Adopt [Decoding DevOps Conference - InfoSep...
 
DevOps evolution architecting the modern software factory - cloud expo east 2017
DevOps evolution architecting the modern software factory - cloud expo east 2017DevOps evolution architecting the modern software factory - cloud expo east 2017
DevOps evolution architecting the modern software factory - cloud expo east 2017
 
Breaking DevOps Illusion
Breaking DevOps IllusionBreaking DevOps Illusion
Breaking DevOps Illusion
 
Dev ops tutorial for beginners what is devops & devops tools
Dev ops tutorial for beginners what is devops & devops toolsDev ops tutorial for beginners what is devops & devops tools
Dev ops tutorial for beginners what is devops & devops tools
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Scaling Enterprise DevOps with CloudBees
Scaling Enterprise DevOps with CloudBeesScaling Enterprise DevOps with CloudBees
Scaling Enterprise DevOps with CloudBees
 
The best way to design secure software products
The best way to design secure software productsThe best way to design secure software products
The best way to design secure software products
 
Driving Service Ownership with Distributed Tracing
Driving Service Ownership with Distributed TracingDriving Service Ownership with Distributed Tracing
Driving Service Ownership with Distributed Tracing
 
DevOps 2021 Research
DevOps 2021 ResearchDevOps 2021 Research
DevOps 2021 Research
 
DevOps explained
DevOps explainedDevOps explained
DevOps explained
 
Painless DevSecOps: Building Security Into Your DevOps Pipeline
Painless DevSecOps: Building Security Into Your DevOps PipelinePainless DevSecOps: Building Security Into Your DevOps Pipeline
Painless DevSecOps: Building Security Into Your DevOps Pipeline
 
How Online Retailer Resident Scaled DevOps with AWS and CloudShell Colony
How Online Retailer Resident Scaled DevOps with AWS and CloudShell ColonyHow Online Retailer Resident Scaled DevOps with AWS and CloudShell Colony
How Online Retailer Resident Scaled DevOps with AWS and CloudShell Colony
 
Infrastructure less development with Azure Service Fabric
Infrastructure less development with Azure Service FabricInfrastructure less development with Azure Service Fabric
Infrastructure less development with Azure Service Fabric
 

Similar to Iac evolutions

Sensu monitoring as code what it is and why you need it
Sensu   monitoring as code  what it is and why you need itSensu   monitoring as code  what it is and why you need it
Sensu monitoring as code what it is and why you need it
mraaaaa
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docx
Sun Technologies
 

Similar to Iac evolutions (20)

Security Validation as Code.pdf
Security Validation as Code.pdfSecurity Validation as Code.pdf
Security Validation as Code.pdf
 
Testing infrastructure as code
Testing infrastructure as codeTesting infrastructure as code
Testing infrastructure as code
 
Sensu monitoring as code what it is and why you need it
Sensu   monitoring as code  what it is and why you need itSensu   monitoring as code  what it is and why you need it
Sensu monitoring as code what it is and why you need it
 
2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your Business2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your Business
 
Top DevOps Trends in 2023 and Beyond
Top DevOps Trends in 2023 and BeyondTop DevOps Trends in 2023 and Beyond
Top DevOps Trends in 2023 and Beyond
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
 
DevOps Automation: Boosting Efficiency and Productivity
DevOps Automation: Boosting Efficiency and ProductivityDevOps Automation: Boosting Efficiency and Productivity
DevOps Automation: Boosting Efficiency and Productivity
 
Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
DevOps
DevOps DevOps
DevOps
 
How DevOps Development Companies Streamline Operations.pdf
How DevOps Development Companies Streamline Operations.pdfHow DevOps Development Companies Streamline Operations.pdf
How DevOps Development Companies Streamline Operations.pdf
 
DevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docxDevSecOps - offpage blog final draft - 03.docx
DevSecOps - offpage blog final draft - 03.docx
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
 
Automation Testing Best Practices.pdf
Automation Testing Best Practices.pdfAutomation Testing Best Practices.pdf
Automation Testing Best Practices.pdf
 
understanding devops security - DevSecOps
understanding devops security - DevSecOpsunderstanding devops security - DevSecOps
understanding devops security - DevSecOps
 
What Are The Top 5 Trending Technologies In DevOps?.pdf
What Are The Top 5 Trending Technologies In DevOps?.pdfWhat Are The Top 5 Trending Technologies In DevOps?.pdf
What Are The Top 5 Trending Technologies In DevOps?.pdf
 
DevOps: Age Of CI/CD
DevOps: Age Of CI/CDDevOps: Age Of CI/CD
DevOps: Age Of CI/CD
 
Future Of DevOps Trends 2023
Future Of DevOps Trends 2023Future Of DevOps Trends 2023
Future Of DevOps Trends 2023
 
Devops Explained & Best Practices
Devops Explained & Best PracticesDevops Explained & Best Practices
Devops Explained & Best Practices
 

More from Prancer Io

More from Prancer Io (20)

Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...
Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...
Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...
 
Prancer Enterprise announces today the release of the Zero Trust Security Val...
Prancer Enterprise announces today the release of the Zero Trust Security Val...Prancer Enterprise announces today the release of the Zero Trust Security Val...
Prancer Enterprise announces today the release of the Zero Trust Security Val...
 
Prancer for Offensive Security Testing
Prancer for Offensive Security TestingPrancer for Offensive Security Testing
Prancer for Offensive Security Testing
 
Why do Next-generation snapshot scanning security solutions raise security co...
Why do Next-generation snapshot scanning security solutions raise security co...Why do Next-generation snapshot scanning security solutions raise security co...
Why do Next-generation snapshot scanning security solutions raise security co...
 
Announcing the launch of Red and Blue Cyber Security Show
Announcing the launch of Red and Blue Cyber Security ShowAnnouncing the launch of Red and Blue Cyber Security Show
Announcing the launch of Red and Blue Cyber Security Show
 
9 tips for assessing your modern cloud security toolsets.pdf
9 tips for assessing your modern cloud security toolsets.pdf9 tips for assessing your modern cloud security toolsets.pdf
9 tips for assessing your modern cloud security toolsets.pdf
 
Infrastructure as Code
Infrastructure as CodeInfrastructure as Code
Infrastructure as Code
 
IAC Compliance.pdf
IAC Compliance.pdfIAC Compliance.pdf
IAC Compliance.pdf
 
IaC Security and Continuous Compliance
IaC Security and Continuous ComplianceIaC Security and Continuous Compliance
IaC Security and Continuous Compliance
 
IaC Security and Continuous Compliance
IaC Security and Continuous ComplianceIaC Security and Continuous Compliance
IaC Security and Continuous Compliance
 
Security Validation as Code
Security Validation as CodeSecurity Validation as Code
Security Validation as Code
 
Automated Pentesting vs Dynamic Application Security Testing
Automated Pentesting vs Dynamic Application Security TestingAutomated Pentesting vs Dynamic Application Security Testing
Automated Pentesting vs Dynamic Application Security Testing
 
Security Validation
Security ValidationSecurity Validation
Security Validation
 
Cloud Security Validation at Scale
Cloud Security Validation at ScaleCloud Security Validation at Scale
Cloud Security Validation at Scale
 
Prancer web interface for the ease of use
Prancer web interface for the ease of usePrancer web interface for the ease of use
Prancer web interface for the ease of use
 
What are the configuration files in the prancer framework
What are the configuration files in the prancer frameworkWhat are the configuration files in the prancer framework
What are the configuration files in the prancer framework
 
Automated pentesting vs dynamic application security testing (dast) (2)
Automated pentesting vs dynamic application security testing (dast) (2)Automated pentesting vs dynamic application security testing (dast) (2)
Automated pentesting vs dynamic application security testing (dast) (2)
 
Is iac scanning scalable in the git ops era
Is iac scanning scalable in the git ops eraIs iac scanning scalable in the git ops era
Is iac scanning scalable in the git ops era
 
Prancer web interface for the ease of use
Prancer web interface for the ease of usePrancer web interface for the ease of use
Prancer web interface for the ease of use
 
Challenges with manual vulnerability assessments and manual penetration testing
Challenges with manual vulnerability assessments and manual penetration testingChallenges with manual vulnerability assessments and manual penetration testing
Challenges with manual vulnerability assessments and manual penetration testing
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Recently uploaded (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 

Iac evolutions

  • 1. IAC Evolutions Historically, in the software development life cycle (SDLC), once code was written, it had to be manually deployed to physical servers. As you can imagine, this process was both time consuming and fraught with complications. Oftentimes, a single script was used to establish dependency libraries, setup load balancers and complete other necessary tasks. Also preparing the server to host the code was a daunting task. As a result, only a few people would be capable of understanding all the moving parts and be able to make changes, launch updates and problem solve. A server could be down for hours while a single operations engineer tried to sort through all the different variables to find the source of the problem. The SDLC Waterfall Approach Beginning in the 1990s, software development experts tried to improve the SDLC process by relying on a waterfall approach. With this strategy, developers, QA engineers and system administrators each had a specific role to play in the development process. If a problem arose with the code, the admin would have to assign the task to the developers. The fix would then have to be tested by the QA team before finally being sent back to the system admin for deployment. At that time, the Software Development Life cycle (SDLC) was focused on the application layer code. Preparing the servers and deploying the applications to the server was another skill. This added another separate area of expertise that also had the potential to introduce bottlenecks. In theory, this approach provided logical steps for troubleshooting. However, development doesn’t occur in a linear pattern and it didn’t take long for new releases to throw significant wrenches in the process. In addition, it was all too easy for different teams to blame problems on each other, further complicating communication and collaboration. Now add
  • 2. security concerns to the mix and you have a truly inefficient and static software development approach. By the early 2000s, companies had developed a more agile approach to software development. They recognized the importance of employees with cross functionalities and collaboration among teams. However, it still wasn’t a perfect system and it was easy for projects to be delayed if communication fell apart. Clearly, there was still significant room for improvement. Cloud Computing The introduction of cloud computing with the emergence of Amazon Web Services and the beta version of the Google App Engine significantly changed the software development life cycle. Cloud computing allowed users to experience on demand tools and resources that didn’t have to be actively managed or stored on site. Virtualization also paved the way for further automation. Suddenly, more users were able to take full advantage of technologies without having to rely on an expert or become one themselves. This new level of accessibility allowed for collaboration and innovation. When cloud providers became more mature and provided API access to their backend services, companies also started releasing infrastructure as code tools. These helped to further support virtual machines and app services and move away from physical hardware that would have to be manually configured and maintained. This not only helped business cut costs, but also accelerated the software development life cycle while also working to eliminate errors and identify security vulnerabilities. At the same time, it became clear that microservices were necessary in order to effectively organize software development. Essentially, this means that an application and its services are split into smaller components that can then be deployed independently. Instead of bundling services, microservices provide a more agile approach that can better handle many different moving parts. This new mode of organization and deployment also required a full stack team approach where the task boundaries are more fluid and team members can
  • 3. contribute along the entire SDLC pipeline. A full stack team is able to work to avoid clogs in the pipeline that can result when different people are solely responsible for specific tasks. Eventually, the idea of DevOps emerged as a new way to significantly accelerate efficiency while also prioritizing security. In this new model, Software Development Life Cycle (SDLC) is not just about the application layer. With the advancement of cloud provider companies, infrastructure is part of the SDLC as part of one unified pipeline; both the infrastructure and application can be deployed to the cloud. Collaboration is at the heart of DevOps. Instead of having each team tightly bound within a certain role, everyone is involved in all aspects of the DevOps process. System admins have the ability to write scripts, QA engineers can move beyond simply testing and so forth. This fosters better understanding among teams while increasing productivity. DevOps also allows enterprises to move security to the forefront. It is no longer simply tacked onto the end of the process after loopholes have already been created and written into the software. Integrating security into DevOps also helps support the CI/CD pipeline. Enterprises don’t have to deal with the same bottlenecks that previously slowed innovation. Static Code Analysis Static code analysis is another key aspect that has contributed to the security of the DevOps model. In the past, developers would have to design and run a program before they could manually go through the debugging process. With static code analysis, code can be automatically checked against a set of rules during the creation process. This significantly accelerates the debugging process and catches problems early on when they are easier and less expensive to fix. Static code analysis is also able to provide a more in-depth look at the code and accurately pinpoint problems.
  • 4. In addition, static code analysis allows security to “shift to the left.” Essentially, this means that security and compliance issues are addressed as early in the development process as possible. This translates into a better and more agile approach to security that is capable of identifying emerging threats, making automatic fixes and sending alerts when suspicious activity is detected. Static code analysis for the application layer is here to stay and there are lots of vendors providing automated tools to conduct static code analysis on application layer codes. But since Infrastructure and Application are being deployed to the target cloud environment with one pipeline, it is crucial to have the static code analysis for the IaC pipeline as well. This ensures the infrastructure, which is being deployed to the cloud, will be secure and provide early feedback to the infrastructure developer concerning any potential security problems. While static code analysis on IaC has proven to be an effective tool, it is still a new concept to many companies. Most businesses still rely on the Pull Request (PR) approval process to catch a security misconfiguration. However, this is prone to the errors and the unsecure infrastructure could be deployed to the cloud, which makes a huge risk for companies who are after zero touch deployments. Prancer cloud validation framework is a pre-deployment validation engine that can conduct static code analysis on your IaC. It can easily be integrated to your current pipeline and toolset. Prancer supports native Azure ARM templates, Amazon AWS CloudFormation templates and Google Deployment templates. Prancer also supports Terraform for all major cloud providers for static code analysis. IaC development teams leverage the power of git to contribute to the code. Usually the process is to create a feature branch out of the master branch, make the changes, check the code and raise the Pull Request. Prancer validation framework can be integrated to any CI tool to evaluate the code at this stage and make sure it is compliant. All the predefined policies are available in a centralized git repository. With just a few clicks you can make sure the malicious code does not find its way into your environment. You don’t need to have an active credential to the target environment to conduct the static code analysis on your
  • 5. IaC templates. For example, consider a scenario where an IaC developer is writing code for the production environment and they want to get early feedback on the code before starting the CI process. They can utilize the power of prancer validation framework to make sure the IaC is secure and solid before starting the deployment process. As you can see, IaC has gone through tremendous changes in just the past few decades. Virtualization and automation are making the SDLC more agile and accessible to all parties involved while also making security a part of the development process and not just an afterthought. This has allowed companies to innovate at an unprecedented pace and makes the future of IaC and SDLC look brighter than ever. To learn more about IaC, cloud computing and security and compliance, contact the experts at prancer.