SlideShare a Scribd company logo
DevSecOps
BSides Nairobi
Talk:
Adding the Sec in
DevOps
Speakers | Date; 17th September 2022
Joylynn Kirui
Ellan Wambugu
1
Securing software development 2
What do we mean by Devops
DevOps Definition
(Development +
Operations)
DevOps is the union of people,
processes, and technology to
deliver continuous value to
users.
Securing software development 3
Current DevOps Setup
Securing software development 4
Threat landscape is changing
Breach
Vulnerable developer secrets
Vulnerable supply chain
Electronic Arts
Breach
Vulnerable Applications
Vulnerable ID Verification
Securing software development 5
What do we mean
by DevSecOps?
Application
PLAN DEVELOP
OPERATE DELIVER
DevOps Definition
(Development + Operations)
DevOps is the union of people,
processes, and technology to
deliver continuous value to
users.
DevSecOps Definition
(Development + Security + Operations)
DevSecOps is an evolution in the way
development organizations approach
security by introducing a security-first
mindset culture, and automating
security into every phase of the
software development lifecycle from
design to delivery.
Securing software development 6
The benefits of DevSecOps
MORE SECURE CODE, SHIPPED AT THE SAME SPEED
Reduce
remediation time
by shifting
security left
Integrate with
and secure your
existing
toolchains
Quickly identify new
threat vectors
Securing software development 7
Barriers to DevSecOps adoption
WHY IS DEVSECOPS HARDER TO ADOPT THAN DEVOPS
Organization and
team gaps
Skill and
knowledge gaps
Solutions aren't
built for
developers
Securing software development 8
Importance of
shifting security left
80
%
reduction in security
incidents by extending
security to development²
60x
Security cost to fix a security
defect in production versus in
development1
62
%
of enterprises do not
integrate security in the
development phase³
1https://www.gartner.com/doc/reprints?id=1-265CMWW4&ct=210527&st=sb
2https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/
³Sources: McKinsey Developer Velocity, Microsoft Enterprise DevOps Report, GitHub Octoverse Report 2020
Securing software development 9
Three themes for successfully
securing the developer workflow
EMBEDDED SECURITY IN THE DEVELOPER WORKFLOW
Developer –
First Tooling
Native and
built-in
security
capabilities
Automation
Securing software development 10
How security fits in the development lifecycle
EMBEDDED SECURITY IN THE DEVELOPER WORKFLOW
PRE-COMMIT
• Threat modeling
• IDE security plug-in
• Pre-commit hooks
• Secure coding
standards
• Peer review
OPERATE &
MONITOR
• Continuous
monitoring
• Threat intelligence
• Blameless post-
mortems
COMMIT (CI)
• Static code analysis
• Security unit tests
• Dependency
management
• Credential scanning
DEPLOY (CD)
• Infra as code (IaC)
• Dynamic security scanning
• Cloud configuration
checks
• Security acceptance tests
Securing software development 11
Secure the DevOps Pipelines
SECURE THE DEVELOPMENT ENVIRONMENT - INFRASTRUCTURE
BE ABLE TO PRODUCE VERIFIABLE AND REPRODUCIBLE BUILDS
Compilers
Sign properly with
validated signatures
Builds
Produce verifiable
build manifests—
describing sources,
cryptographic
hashes of
binaries/artifacts and
full build parameters
Build Machines &
Infrastructure
Make highly restricted
with least privileged
access applied and with
ephemeral build agents
DevOps Services
Build and release infra
use isolated managed
identities and sensitive
tenant profiles for
isolation
Compilers &
User Processes
Execute in isolation
or locked down
environments
Software on
Build Machines
Sign properly with
validated signatures
PREVENT THESE TYPES OF ATTACKS:
• Compromised compilers and build machines
• Compromised dependencies
Securing software development 12
Harden Pipeline Access
SECURE THE DEVELOPMENT ENVIRONMENT – ACCESS MANAGEMENT
ENSURE CODE-TO-CLOUD PIPELINE IS SECURE
Create organization
device policies – AAD
+ Device policies - to
secure development
machines
Make sure all
operations adhere
to least privileged
principles
Regularly scan for
identity access
management to ensure
least-privileged access
management policies
Use multi-factor
authentication and dual
key/JIT approval for
privileged operations and
human-induced pushes
Enable endpoint
protection for
all workstations
and allow only
registered devices
Inject identity
early into the
automation pipeline
PREVENT THESE TYPES OF ATTACKS:
• Compromised credentials
• Malicious insiders
Thank You

More Related Content

Similar to AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui

Top 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutTop 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know About
Dev Software
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
DevSecOps Best Practices-Safeguarding Your Digital Landscape
DevSecOps Best Practices-Safeguarding Your Digital LandscapeDevSecOps Best Practices-Safeguarding Your Digital Landscape
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
Caleb Jenkins
 
Introduction to DevOps in Cloud Computing.pptx
Introduction to DevOps in Cloud Computing.pptxIntroduction to DevOps in Cloud Computing.pptx
Introduction to DevOps in Cloud Computing.pptx
LAKSHMIS553566
 
Using Docker EE in a CI/CD Workflow
Using Docker EE in a CI/CD WorkflowUsing Docker EE in a CI/CD Workflow
Using Docker EE in a CI/CD Workflow
Ashnikbiz
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
Xavor Corporation - Redefining Health Technology
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev ops
Abdul Rahim
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
MobibizIndia1
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
Xavor Corporation - Redefining Health Technology
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Securing Applications
Securing ApplicationsSecuring Applications
Securing Applications
Mark Harrison
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
James Wickett
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Using Modern Tools and Technologies to Improve Your Software Architecture
Using Modern Tools and Technologies to Improve Your Software ArchitectureUsing Modern Tools and Technologies to Improve Your Software Architecture
Using Modern Tools and Technologies to Improve Your Software Architecture
Eran Stiller
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
Amazon Web Services
 
DockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, SaferDockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, Safer
Docker, Inc.
 
DevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD ProfessionalsDevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD Professionals
Tonex
 
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Enov8
 

Similar to AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui (20)

Top 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutTop 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know About
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 
DevSecOps Best Practices-Safeguarding Your Digital Landscape
DevSecOps Best Practices-Safeguarding Your Digital LandscapeDevSecOps Best Practices-Safeguarding Your Digital Landscape
DevSecOps Best Practices-Safeguarding Your Digital Landscape
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
 
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
 
Introduction to DevOps in Cloud Computing.pptx
Introduction to DevOps in Cloud Computing.pptxIntroduction to DevOps in Cloud Computing.pptx
Introduction to DevOps in Cloud Computing.pptx
 
Using Docker EE in a CI/CD Workflow
Using Docker EE in a CI/CD WorkflowUsing Docker EE in a CI/CD Workflow
Using Docker EE in a CI/CD Workflow
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev ops
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Securing Applications
Securing ApplicationsSecuring Applications
Securing Applications
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Using Modern Tools and Technologies to Improve Your Software Architecture
Using Modern Tools and Technologies to Improve Your Software ArchitectureUsing Modern Tools and Technologies to Improve Your Software Architecture
Using Modern Tools and Technologies to Improve Your Software Architecture
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
DockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, SaferDockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, Safer
 
DevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD ProfessionalsDevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD Professionals
 
Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?Why DevSecOps Is Necessary For Your SDLC Pipeline?
Why DevSecOps Is Necessary For Your SDLC Pipeline?
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 

AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui

  • 1. DevSecOps BSides Nairobi Talk: Adding the Sec in DevOps Speakers | Date; 17th September 2022 Joylynn Kirui Ellan Wambugu 1
  • 2. Securing software development 2 What do we mean by Devops DevOps Definition (Development + Operations) DevOps is the union of people, processes, and technology to deliver continuous value to users.
  • 3. Securing software development 3 Current DevOps Setup
  • 4. Securing software development 4 Threat landscape is changing Breach Vulnerable developer secrets Vulnerable supply chain Electronic Arts Breach Vulnerable Applications Vulnerable ID Verification
  • 5. Securing software development 5 What do we mean by DevSecOps? Application PLAN DEVELOP OPERATE DELIVER DevOps Definition (Development + Operations) DevOps is the union of people, processes, and technology to deliver continuous value to users. DevSecOps Definition (Development + Security + Operations) DevSecOps is an evolution in the way development organizations approach security by introducing a security-first mindset culture, and automating security into every phase of the software development lifecycle from design to delivery.
  • 6. Securing software development 6 The benefits of DevSecOps MORE SECURE CODE, SHIPPED AT THE SAME SPEED Reduce remediation time by shifting security left Integrate with and secure your existing toolchains Quickly identify new threat vectors
  • 7. Securing software development 7 Barriers to DevSecOps adoption WHY IS DEVSECOPS HARDER TO ADOPT THAN DEVOPS Organization and team gaps Skill and knowledge gaps Solutions aren't built for developers
  • 8. Securing software development 8 Importance of shifting security left 80 % reduction in security incidents by extending security to development² 60x Security cost to fix a security defect in production versus in development1 62 % of enterprises do not integrate security in the development phase³ 1https://www.gartner.com/doc/reprints?id=1-265CMWW4&ct=210527&st=sb 2https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/ ³Sources: McKinsey Developer Velocity, Microsoft Enterprise DevOps Report, GitHub Octoverse Report 2020
  • 9. Securing software development 9 Three themes for successfully securing the developer workflow EMBEDDED SECURITY IN THE DEVELOPER WORKFLOW Developer – First Tooling Native and built-in security capabilities Automation
  • 10. Securing software development 10 How security fits in the development lifecycle EMBEDDED SECURITY IN THE DEVELOPER WORKFLOW PRE-COMMIT • Threat modeling • IDE security plug-in • Pre-commit hooks • Secure coding standards • Peer review OPERATE & MONITOR • Continuous monitoring • Threat intelligence • Blameless post- mortems COMMIT (CI) • Static code analysis • Security unit tests • Dependency management • Credential scanning DEPLOY (CD) • Infra as code (IaC) • Dynamic security scanning • Cloud configuration checks • Security acceptance tests
  • 11. Securing software development 11 Secure the DevOps Pipelines SECURE THE DEVELOPMENT ENVIRONMENT - INFRASTRUCTURE BE ABLE TO PRODUCE VERIFIABLE AND REPRODUCIBLE BUILDS Compilers Sign properly with validated signatures Builds Produce verifiable build manifests— describing sources, cryptographic hashes of binaries/artifacts and full build parameters Build Machines & Infrastructure Make highly restricted with least privileged access applied and with ephemeral build agents DevOps Services Build and release infra use isolated managed identities and sensitive tenant profiles for isolation Compilers & User Processes Execute in isolation or locked down environments Software on Build Machines Sign properly with validated signatures PREVENT THESE TYPES OF ATTACKS: • Compromised compilers and build machines • Compromised dependencies
  • 12. Securing software development 12 Harden Pipeline Access SECURE THE DEVELOPMENT ENVIRONMENT – ACCESS MANAGEMENT ENSURE CODE-TO-CLOUD PIPELINE IS SECURE Create organization device policies – AAD + Device policies - to secure development machines Make sure all operations adhere to least privileged principles Regularly scan for identity access management to ensure least-privileged access management policies Use multi-factor authentication and dual key/JIT approval for privileged operations and human-induced pushes Enable endpoint protection for all workstations and allow only registered devices Inject identity early into the automation pipeline PREVENT THESE TYPES OF ATTACKS: • Compromised credentials • Malicious insiders

Editor's Notes

  1. Today, we’re going to talk about devsecops and the difference between devops and devsecops in terms of adding security to software rollouts and infrastructure.As Tech permeates most if not all aspects of society it becomes important for the people building software as ourselves to take into account the security aspect of it all.The world now has a really large threat landscape offered to malicious actors.
  2. Ellan - Devops as a culture has quickly risen to be a go to methodology for companies who want to stay ahead where the connection between devs and IT ops is paramount for an organization from building a product to roll out and support. Problem with DevOps ---
  3. Ellan - Use this picture to show the complexity of devops leading to security issues Problem with DevOps Set flow to introduce DevSecOps
  4. Ellan - With this threat landscape changing, we’ve already seen two examples of modern attack vectors; CodeCov and Electronic Arts.   In CodeCov’s case, an attacker targeted their developer workflow and software supply chain. The attacker was able to not only gain access to their Google Cloud Storage account but also to upload a new image into thousands of builds that scanned their software supply chain, extracting even more secrets and widening the breach.   Another example is EA which recently had source code from one of their games stolen due to stolen cookies that contained Slack login information. They didn’t have the secret or identity protections needed and these vulnerabilities became an easy target.  There’s also a recent supply chain security example known as the log4j vulnerability, which has impacted more than 35k+ different java artifacts. The vulnerability, which comes from a popular logging tool in the biggest Java library – the Maven Central Repository - allows an attacker to perform remote code execution by exploiting the insecure JNDI lookups feature exposed by the logging library log4j. This exploitable feature was enabled by default in many versions of the library, allowing this attack to spread to many affected parties all at once.   But, this is not just an issue for enterprises… -///Running modern applications on the cloud—which are exposed as APIs, designed as microservices, packaged with containers, and deployed with Kubernetes—introduces new dimensions of risk. Microservices open many perimeters (for many services), have a flexible flow and are constantly/rapidly deployed, which make it even more challenging to address security issues associated with them.as tech pwe see that the threat landscape has increased tremendously ,a while ago only a few devices were at risk.Tech incorporation to our cars,houses even Industrial control centers ,malicious actors now are able to cause massive damage as witnessed in e.g //EA ,CodeCovs cars example **Choose 2 after session
  5. Joylynn - You may be familiar with how DevOps practices and collaboration between developer and operations teams led to faster software delivery. DevOps combines people, processes, and technology to deliver continuous value to users.   DevSecOps is the evolution of DevOps where the company takes on a security-first mindset — putting security into every phase of the development lifecycle, from design to delivery.   When implemented successfully, companies gain both the speed of DevOps development practices and the holistic security and peace of mind that comes with DevSecOps. even with DevOps, the aspect of security remained unresolved. While you could improve the speed of deployment without compromising the reliability of the software using DevOps, the software development ended up either being slowed down due to security practices (which are implemented toward the end of the delivery pipeline) or having vulnerabilities that often leak into the production environment. DevOps could help patch these vulnerabilities quickly, but the ideal solution would have been to make the code secure without compromising the speed of delivery.
  6. Joylynn - However, organizations that adopt DevSecOps unlock the ability to ship code at the same speed, securely.   Specifically, DevSecOps helps organizations:  Shift their security left to occur at more critical points throughout the development lifecycle, aiding to lower vulnerability remediation time. It also helps organizations to form a seamless workflow by integrating into existing toolchains. More so, this aids organizations to continually identify new threat vectors.
  7. Joylynn - DevSecOps presents barriers and inefficiencies for developers that we don't find with DevOps.   These include: Organization and team gaps: Some organizations have security-specific teams who own all of security. This siloes DevOps and SecOps teams and leads to a fragmented security culture. Skill and knowledge gaps: When DevOps and Developer teams don’t see security as part of their responsibly, the skill base stays solely within the SecOps team. Third, solutions are not being built for developers, leading to issues like false positives .   False positives are high because the tools live with security teams rather than developers. Since security teams are more likely to scan repositories than developers, they may only run them once a quarter, causing them to be higher than the rate would be if these tools lived with developers.     Another issue is that we also see misaligned expectations. In DevOps, having a 30% failure rate on Unit Tests is considered very bad. However, in security, having a 30% failure rate is actually good. While you are always dealing with a trade-off between false positives and false negatives, security prefers no false negatives and more false positives. However, a developer doesn't want any false positives and doesn't care as much about false negatives.
  8. Joylynn - To safeguard the developer cloud against these new threat types, the answer is to shift security left and leverage cloud-native security.   Shifting left helps enterprises find and remediate vulnerabilities earlier and across their development lifecycle. Enterprises that extend security to development reduce security incidents by 80%. And it’s not just a reduction in events, there is also a financial component. It costs 60 times more to fix a security defect in production than in development.   Blending security and development together within the development workflow remains a challenge for many enterprises. While more enterprises are starting their transforms, there are 62% of enterprises that have yet to integrate security into the development phase.   Now, how do we start shifting security left and moving to cloud-native environments?  
  9. Joylynn - To successfully implement DevSecOps, there are three themes that need to be considered: The first is making sure to provide developer-first tooling that empowers developers to be more cognizant of the security impacts of the code they’ve created. The second is to remove any friction for developers, by providing data and built-in automated security capabilities natively-integrated into their workflow. The third is to apply automation to all of these different checks and within the developers’ workflows on their day-to-day. So instead of coming up with a huge list of vulnerabilities that need to be fixed, developers are constantly being guided in the right direction through continuous security feedback. Now, let's talk about how we can realize these themes within the developer workflow: 
  10. Each stage of the development lifecycle has unique security components, that when used together help prevent threats at all critical junctions. For pre-commit: It’s important to start with a focus on threat modeling and understanding the threat landscape, to grasp the overall risk of what you are looking to bring to execution in code. Employ a range of IDEs, security, plugins, and pre-commit hooks to make sure that the code you’re generating adheres to the security standards. This step also helps ensure there are no vulnerabilities created unintentionally. Don’t forget to hold peer reviews to align different teams about the security risks and code that they recently introduced into the code-base. When it comes to the commit stage: It’s time to start taking on more extensive security methods to review the code, including static code analysis. Security unit tests may involve running scanners or performing manual tests on running code. In this stage, remember to review dependency management and the overall dependency tree for inherited vulnerabilities. After this is complete, you can check for credentials that may have been inadvertently introduced into the code-base. This is called credential scanning but may also be known as secret scanning or token scanning. In the deploy stage: We look at the overall health of the code-base and, in addition to the items checked in the commit stage (which can be repeated in the deploy stage), we also look at the infrastructure-as-code (IAC) segments, which are necessary for identifying abstracted layers of infrastructure. In Deploy, you also need to examine the high-level security risks, cloud configuration checks, and security acceptance tests to make sure everything is in line with the expectations and organizational security goals. Once code is being deployed: Now it’s a matter of operating and monitoring through continuous monitoring and additional threat intelligence, which not only helps visualize results; it also covers the overall dependency vulnerabilities that may be inherited over time. Make sure to hold additional post-mortems, so your teams take away lessons learned, and to continue iterating as you move through the development lifecycle. Run Static and Dynamic Tests: Another aspect of securing the developer workflow is through assessing our own created code. One of the ways to check our code is with Static and Dynamic analysis. It’s best to use a combination of these techniques to make sure that the findings are prioritized in the right way. Let’s look at the techniques: Static analysis: Examines the code-base and finds potential vulnerabilities that may be present in the code being created. Dynamic analysis: Reviews running code and runs simulated attacks on the code-base itself. Both techniques use automation, so inspect automated security reviews in different stages of the code as you move through the milestones of a project. Running one of these methods will provide a good view of the security levels of the project before deployment. But running multiple techniques throughout the life cycle yields the best results as it provides full visibility of the code and potential effects. If followed correctly, these practices will help your business defend and remediate common technical application security attacks. sast in 1.Code use codesonar 2.building use tainted data analysis in build to detect code injection Check for Hard-Coded Secrets: Secret scanning is another component that needs to be secured within the developer workflow. Specifically, secret scanning looks at secrets (also known as “credentials” or “tokens”) that can be hard-coded into the code.   While this process can be lengthy if done manually, you can easily enable automation to help you: Prevent secrets leaving development machines with push protection While detecting previously leaked secrets by scanning full git history And you can even resolve issues faster with automated resolution (e.g., revoking found credentials)   Secret scanning helps any organization fend off attacks like: Privilege escalation by internal actors due to leaked credentials in private repos And infrastructure compromise due to leaked credentials in public repos //tools such as Microsoft threat modelling tools,git-secrets,goSDL,pytm,Threagle
  11. Ellan - DevOps Pipelines are another important consideration when securing the development environment. To ensure your organization is producing verifiable and reproducible builds you’ll need to adjust security at every point from compilers to build machines. Let’s take a look at each step in more detail:   Compilers Confirm that each compiler signs properly with validated signatures. Builds Produce verifiable build manifests—describing sources, cryptographic hashes of binaries/artifacts and full build parameters. Build Machines and Infrastructure Make these highly restricted with least privileged access applied and with ephemeral build agents. DevOps Services  Build and release infrastructure uses isolated managed identities and sensitive tenant profiles for isolation. Compilers and User Processes Execute in isolation or locked down environments. Software on Build Machines Sign properly with validated signatures.   Practices like these secure your organization from threats like: Compromised compilers and build machines (Electronic Extreme – video game company, is an example of this type of breach) Compromised dependencies (An example is the Copay application attack)   -- Notes:    Compromised compilers (more examples from the first attack type) Link 1 : https://faun.pub/zombie-infestation-software-developer-tools-the-ms-visual-studio-attack-7fc8cd257eb9 Link 2 : https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain/ Compromised build machines (more examples from the first attack type) Link 1 : https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/ Compromised dependencies (more examples from the second attack type) Malicious dependency – event-stream attack: https://blog.npmjs.org/post/180565383195/details-about-the-event-stream-incident
  12. Joylynn - In order to ensure the code-to-cloud pipeline is secure, organizations need to do the following: Create AAD and device polices that will secure development machines. For example, if a device gets lost, wipe the device. Ensure all operations adhere to least-privileged principles. A privileged operation means granting more privileged access, adding a user, changing build / deployment steps, etc. Run regular Identity Access Management scans that enforce least privileged access policies Use multi-factor authentication and dual key/IT approval for privileged operations and human-induced pushes, like CI/CD. Dual key addresses credential loss and malicious insiders, which is critical to use. Enable endpoint protection: Imagine if a developer’s laptop was affected by ransomware… To protect these endpoints, deploy an endpoint protection platform, including next-generation antivirus (NGAV) to protect against unknown and zero-day malware, behavioral analysis to identify anomalous activity on an endpoint, and vulnerability scanning. And lastly, inject identity early in the automation pipeline: Injecting identity as early as possible into automation pipelines is a key step to minimizing the exposure of sensitive accounts and credentials. This way, your DevOps team can remove static credentials from code, replacing them with just-in-time credentials that help to reduce the threat surface and enterprise-wide risk.   Fortifying identity controls like this helps protect against attacks like: Compromised credentials (2018 eslint incident is a good example of this type of attack) Malicious insiders    --     Leaked credential example: Malicious maintainer - ESLint-Scope attack: https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes // https://francescodeliva.medium.com/devsecops-with-github-f8b9d07702c3
  13. Thank you for this opportunity to share with you how DevSecOps can accelerate and transform your business.