DevSecOps at Cimpress
Ian Amit
Chief Security Officer
Cimpress Security
Engineering Operations
Program
Management
Challenges
• Worldwide operations
• Decentralized (14 business units, and counting ;-) )
• Varying technology stacks (from latest and greatest, to factory IT/OT
running legacy software)
• Rapid deployment cycles
• Major cloudification (AWS, Azure and GCP)
Our approach - the road to DevSecOps
Threat Modeling
Threats
Assets
Prioritization/
Execution
Controls
Assertions
Response
Tests
Threat Modeling
• STRIDE? DREAD?
• MITRE ATT&CK Framework [1]
• CAPEC [2]
https://attack.mitre.org/wiki/Main_Page
https://capec.mitre.org/
What are you
protecting?
What’s the value
of it?
Who/what are you
protecting it from?
Threats
Assets
Controls
Assertions
Tests
DevSecOps
Controls
Assertions
Tests
• Create assertions based on threat model
• What is supposed to happen? What’s not supposed to happen?…
• Assure test case coverage in dev.
• Add external validation through scanners. SAST/DAST.
• Integrate controls over assertions/tests.
But forget all of that
Think about the developer first
This is how developers
want/need to see us security people
Minus the suit of course.
Everyone knows we wear hoodies ;-)
The Sec in DevSecOps
• Every additional interaction needed from dev is a speed bump
• Every additional interface is a traffic light
• Every new language/term is a “calculating new route”…
Expected Deliverables
Unit Test Coverage Automated tool scans
Implies existence of unit testing that
address the threat model scenarios
Implies fixes to the code where applicable
and coverage for the “hygiene” elements
of the threat model
Rinse, Repeat…
Threat Modeling
Prioritization/
Execution
Response

Devsecops at Cimpress