DevOps to DevSecOps
:
Enhancing Software
Security Throughout The
Development Lifecycle
ANOWAR
HOSSAIN
Lead Engineer & Solutions Architect
Brain Station 23
• AWS Certified Solutions Architect
• Lead Backend Developer
• DevOps/DevSecOps Enthusiast
• Buidling blocks with Python, Go &
Terraform for serverless and
microservice architecture
• Highly concerned about Scaling
and Security
2
Agenda
3
DevOps in Action
Challenges of DevOps
DevSecOps in Action
DevSecOps Methodology
DevSecOps Pipeline
DevOps
• A set of practices
• Integrating development and IT operations
• The goal of DevOps:
• Release Quickly
• Improving collaboration and
communication
• Delivering high-quality software faster
and efficiently.
4
DevOps in Action
5
What we missed?
6
Security Testing
7
When we do
the Security
Test?
8
We do
last minute
Security...
9
Impact?
10
• Back and forth
• Incomplete
• Rush
• Disrupt business
operations
• Limited scope
11
What other
Challenges?
• Inadequate access control
• Lack of security testing
• Lack of infrastructure-related security practices
• Insufficient security monitoring
• Third-party vulnerabilities
• Increased testing and remediation costs
• Delayed delivery
12
Challenges
of DevOps
DevSecOps in
Action
13
DevSecOps
• Development, security, and operations
• Integration of security into the SDLC
• Continuous delivery and deployment of
secure software
14
DevSecOps
Strive for "Secure by Default"
15
• Integrate Security via tools
• Create Security as Code culture
• Implement automated process Security
DevOps to
DevSecOps
• Integration of security tasks with DevOps
• Shifting Security to the "Left"
• Prioritizing Security from Design Phase
16
Benefits
Key benefits of DevSecOps:
• Faster delivery
• Improved security posture
• Reduced costs
• Increase traceability
• Compliance
17
Methodology
Tools we use mostly
• Secret Scanning & Management
• Static Analysis Security Testing(SAST)
• Dynamic Analysis Security Testing(DAST)
• Interactive Application Security Testing (IAST)
• Software Composition Analysis (SCA)
• Security in Infrastructure as Code
• Vulnerability Management
• Alert and Monitoring in Security
18
Secret Scanning
& Management
Integrate security into the development process
• Access Security Hardening
• Secret Management
• Adopting Role-Based Access Control
• Ensuring Private Cloud Security
• Container Security Scanning
Tools:
• GitHub Secrets
• AWS Secret Manager
• Azure key vault
• Hashicorp vault
19
SAST
20
Static analysis software testing
• White box testing using automated tools
• Reviewing code
• Need manual oversight
Tools:
• Sonarqube
• Gitlab SAST Tools
• Jit.io
DAST
21
• White box testing using automated tools
• Can send variety of requests to web application
• Do not require access to source code
• Interact with application and find vulnerabilities
Tools:
• Detectify
• Acunetix
• BurpSuite
• MetaSploit
Dynamic analysis software testing
IAST
22
• Real-time analysis of the threats in the build and
in runtime
• Also Helps the developer fix these issues while it
scans the source code when running.
• Tools:
• Bandit by Jit.io
• Invicti
Interactive analysis software testing
SCA
23
• Manage and secure open source and third-
party software components
• Assist organizations in understanding
• Dependency scanning
• Vulnerability scanning
• License compliance analysis
• Reporting
• Tools:
• Black Duck
• WhiteSource
Software Composition Analysis
Security in Infrastructure as Code(IAC)
24
IAC allows -
• To document and version of infra
• To perform audit on the infra
Tools:
• Terraform
• Ansible
• Chef
• Puppet
Vulnerability Management
25
• A central Dashboard is required to normalized
data
• Integrated to bug tracking system
• Tools:
• Grafana
• Detectify
• Defect Joho
Alert and monitoring
26
• Detect, Mitigation and Maintain Continuous
Security
• What and Where we need to improve
• Tools:
• Grafana
• Prometheus
• Kibana
Who will ensure
the security?
27
DevOps Pipeline
28
DevOps Pipeline
29
DevOps Pipeline
30
DevSecOps Pipeline
31
Q&A?
THANK
YOU
33
SOCIAL MEDIA
LINKS
34
• Website: anowar.dev
• Email: anowar.cst@gmail.com
• https://www.linkedin.com/in/anowarcst
• https://www.facebook.com/Anowar.cst

DevOps to DevSecOps: Enhancing Software Security Throughout The Development Lifecycle

  • 1.
    DevOps to DevSecOps : EnhancingSoftware Security Throughout The Development Lifecycle
  • 2.
    ANOWAR HOSSAIN Lead Engineer &Solutions Architect Brain Station 23 • AWS Certified Solutions Architect • Lead Backend Developer • DevOps/DevSecOps Enthusiast • Buidling blocks with Python, Go & Terraform for serverless and microservice architecture • Highly concerned about Scaling and Security 2
  • 3.
    Agenda 3 DevOps in Action Challengesof DevOps DevSecOps in Action DevSecOps Methodology DevSecOps Pipeline
  • 4.
    DevOps • A setof practices • Integrating development and IT operations • The goal of DevOps: • Release Quickly • Improving collaboration and communication • Delivering high-quality software faster and efficiently. 4
  • 5.
  • 6.
  • 7.
  • 8.
    When we do theSecurity Test? 8
  • 9.
  • 10.
    Impact? 10 • Back andforth • Incomplete • Rush • Disrupt business operations • Limited scope
  • 11.
  • 12.
    • Inadequate accesscontrol • Lack of security testing • Lack of infrastructure-related security practices • Insufficient security monitoring • Third-party vulnerabilities • Increased testing and remediation costs • Delayed delivery 12 Challenges of DevOps
  • 13.
  • 14.
    DevSecOps • Development, security,and operations • Integration of security into the SDLC • Continuous delivery and deployment of secure software 14
  • 15.
    DevSecOps Strive for "Secureby Default" 15 • Integrate Security via tools • Create Security as Code culture • Implement automated process Security
  • 16.
    DevOps to DevSecOps • Integrationof security tasks with DevOps • Shifting Security to the "Left" • Prioritizing Security from Design Phase 16
  • 17.
    Benefits Key benefits ofDevSecOps: • Faster delivery • Improved security posture • Reduced costs • Increase traceability • Compliance 17
  • 18.
    Methodology Tools we usemostly • Secret Scanning & Management • Static Analysis Security Testing(SAST) • Dynamic Analysis Security Testing(DAST) • Interactive Application Security Testing (IAST) • Software Composition Analysis (SCA) • Security in Infrastructure as Code • Vulnerability Management • Alert and Monitoring in Security 18
  • 19.
    Secret Scanning & Management Integratesecurity into the development process • Access Security Hardening • Secret Management • Adopting Role-Based Access Control • Ensuring Private Cloud Security • Container Security Scanning Tools: • GitHub Secrets • AWS Secret Manager • Azure key vault • Hashicorp vault 19
  • 20.
    SAST 20 Static analysis softwaretesting • White box testing using automated tools • Reviewing code • Need manual oversight Tools: • Sonarqube • Gitlab SAST Tools • Jit.io
  • 21.
    DAST 21 • White boxtesting using automated tools • Can send variety of requests to web application • Do not require access to source code • Interact with application and find vulnerabilities Tools: • Detectify • Acunetix • BurpSuite • MetaSploit Dynamic analysis software testing
  • 22.
    IAST 22 • Real-time analysisof the threats in the build and in runtime • Also Helps the developer fix these issues while it scans the source code when running. • Tools: • Bandit by Jit.io • Invicti Interactive analysis software testing
  • 23.
    SCA 23 • Manage andsecure open source and third- party software components • Assist organizations in understanding • Dependency scanning • Vulnerability scanning • License compliance analysis • Reporting • Tools: • Black Duck • WhiteSource Software Composition Analysis
  • 24.
    Security in Infrastructureas Code(IAC) 24 IAC allows - • To document and version of infra • To perform audit on the infra Tools: • Terraform • Ansible • Chef • Puppet
  • 25.
    Vulnerability Management 25 • Acentral Dashboard is required to normalized data • Integrated to bug tracking system • Tools: • Grafana • Detectify • Defect Joho
  • 26.
    Alert and monitoring 26 •Detect, Mitigation and Maintain Continuous Security • What and Where we need to improve • Tools: • Grafana • Prometheus • Kibana
  • 27.
    Who will ensure thesecurity? 27
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
    SOCIAL MEDIA LINKS 34 • Website:anowar.dev • Email: anowar.cst@gmail.com • https://www.linkedin.com/in/anowarcst • https://www.facebook.com/Anowar.cst