SlideShare a Scribd company logo
1 of 24
Download to read offline
1
DevSecOps at the
Technology Transformation Service (TTS)
@ the General Services Administration
(GSA)
John Jediny
Technology Transformation Service (TTS)
Powered By Technology Transformation Services 2
Challen
ge.gov
USWDS Bug
Bounty
Cloud.
gov
FedRAMP Login.
gov
Data.
gov
Search.
gov
USA.
gov
Digital.
gov
10x Federalist
Presidential
Innovation
Fellows
18F Centers of
Excellence
https://digital.gov/services/directory/
https://join.tts.gsa.gov/
Who we are
Powered By Technology Transformation Services
ACCELERATORS ARTIFICIAL
INTELLIGENCE
CLOUD &
INFRASTRUCTURE
DATA &
ANALYTICS
EXPERIENCE IDENTITY
Modern
organizations
that can build,
buy and
manage smart
scalable
tech
Leveraging
analytics and
machine
learning
to develop
deeper
insights
and automate
processes
Converged
infrastructure
that scales
and
reduce cost
securely
Applying
modern
data-driven
decision-maki
ng practices
Seamless
interactions
and
experiences
regardless of
channel
Shared
solutions for
increasing
trust
and avoiding
fraud
Who we are: How We Support Agency Partners
Powered By Technology Transformation Services
Software Authorizations
Who are we: Authority to Operate (ATOs)
Powered By Technology Transformation Services 5
● Have a single person (with a backup) in
charge of shepherding new
software/product requests
● Work with Vendors through FEDRAMP
tailored as a liaison
● Make the process more transparent
and efficient
● Make a list of available software that
can be used and licenses that can be
leveraged
● Ensure all TTS requests go through the
same process to allow staff to
understand where a product is at in the
process and when they can use it
Problems Actions
● Current software request process is
cumbersome and convoluted
● Tech Portfolio is sometimes left out of
communications around software and
is unable to check the status
● Purchase card holder is left out of the
loop on whether the product is
approved for purchase
● Wasted time for many involved
Who are we: Software Concierge
Powered By Technology Transformation Services
● Out of sync with GSA policies,
practices and procedures
● Incomplete picture of cyber posture at
an organizational level
● TTS gets a lot of vulnerability reports
for systems that aren’t ours
● Other agencies interested in
leveraging our Bug Bounty program
● Between Custom Developed Software
and Software as a Service, there are 36
ATOs that need managing from TTS
● Lack of visibility into the “ingredients”
that are in our software
6
● Serve as centralized point of contact to GSA
IT Security
● Standing up tooling to get a better picture
of cybersecurity at the portfolio level
● Informed Vulnerability Disclosure Binding
Operational Directive to ensure it’s easy to
report to agencies
● Considered offering Bug Bounty beyond TTS
● Lead DevSecOps Guild meetings, putting
action to identified problems
● Provide Subject Matter Expertise on
Software Integrity to TTS, GSA, and rest
Federal Gov
● Lead GSA-wide Software
Assurance-focused Supply Chain Risk
Management (SCRM) Working Group
Problems Actions
Who are we: Software-as-a-Service
Powered By Technology Transformation Services 7
● Auditing environment
○ Identification of unused
resources
● Single sign-on (IAM, etc.)
● Continuous monitoring/alerting
○ Re-using GRACE components
● Establish standards for better
cross-team management
○ Role-based management of
AWS
● Engagement with program teams to
better understand how centralized
solutions fit and extend their
existing workflows
Problems Actions
● Infrastructure managed ad-hoc by
program teams
● Disparity in how alerting is
implemented across program teams
● TTS has limited ability for oversight
at an organizational level
● Different processes create differing
levels of coverage and specificity
Who are we: Infrastructure Management
Powered By Technology Transformation Services
● Doubling down on cloud.gov
○ Expand cloud.gov’s service offerings
○ Focus infrastructure investments
from programs into TTS-wide
standardized services, such as
Kubernetes-as-a-Service
● Developing TTS-wide infrastructure
goals/roadmap through interviews with TTS
System Owners
● Standardization of AWS, Azure, and Google
Cloud management through code and
automation
○ Re-using GRACE components
● Unified account management,
synchronizing with GSA Active Directory
● Better secrets management
● Sharing technical components and their
compliance information (“Common Control
Platform”)
8
● TTS systems’ infrastructure varies
greatly
● Cloud.gov isn’t compatible with some
architectures, leading to greater
responsibility for programs to manage
their infrastructure
● Each program is configuring tools and
writing their SSPs independently,
duplicating effort
○ Larger issue: Inconsistent access
control and knowledge sharing
Problem Actions
Who are we: Infrastructure Improvement
Powered By Technology Transformation Services 9
● Minimize heavily siloed talent:
people work on a single system
● Lots of difference in architectures
and reinvention of wheels
● Teams have to make due with the
staff (skills) they have
○ May be missing critical skill
sets
● Improving knowledge
management for engineering
organizational structures
● Ensuring institutional knowledge
with heavy turn over
● Planning on interviews, surveys,
and/or Q&A sessions around
Solutions to better understand the
pain points and appetite for
change
● Working towards proposing a
different structure for engineering
Problem Actions
Who are we: Shared Engineering
https://hackerone.com/tts
Who are we: Bug Bounty Program Management
11
https://tech.gsa.gov/guides/dev_sec_ops_guide/
Mission:
● Support the DevOps cultural transformation within GSA.
● “Assess the Gap” of hosting options between those systems manually provisioned
to those already cloud native systems w/ self-service deployment.
● Move security left and increase developers awareness of security “make the right
way the easy way”.
● “Don’t Repeat YOurselves” (DRY) by providing pre-hardened and reusable
Operating Systems and Common Components.
● Reduce the overall time of any GSA system’s “Authority to Operate”.
● “Plug the Gap” around the lack of hosting for systems “ready” for fully automated
systems using Infrastructure as Code, Configuration Management, and CI/CD.
DevSecOps Working Group at GSA
Cloud Native
Manual Provisioning /
Ticket Based Networking
DevSecOps
Infrastructure as Code
& Configuration
Management
Automation
2
GSA IT Leadership (CIO/CTO/CISO)
❏ GSA IT Standards Pilot status for
testing new tools
❏ Authority to Operate (ATO) for Pilot
DevSecOps Sandbox
❏ Contract and In-house FTE support
❏ Organizational and Political
endorsement
GSA IT (IDI)
❏ Standardized Operating System
Repository
❏ Component Hardening
❏ Reusable Infrastructure as Code and
Configuration Management
❏ Centralized Pipeline Management
❏ User Onboarding & Account
Management
DevSecOps Roles and Responsibilities
GSA IT (SecOps)
❏ Hardening Guides
❏ Nessus/Twitlock Scanning
GSA IT (CTO Office)
❏ Platform Governance
❏ Financial Management
Technology Transformation Service (TTS)
❏ Engineering Support
All
❏ Collaboration
❏ Metrics
2
Steps towards implementing DevSecOps...
2
Step: Provide Software for Local Development
2
Step 1: Use *-as-a-Service(s)
https://marketplace.fedramp.gov
https://digital.gov/services/directory/
2
Step: Make Self-Servicing easy
https://github.com/openservicebrokerapi/servicebroker/
https://github.com/cloudfoundry-incubator/cloud-service-broker/blob/master/docs/brokerpak-intro.md
https://github.com/cloudfoundry-incubator/csb-brokerpak-aws
Application → Terraform → Cloud Service Provider → Database etc
Application ← Terraform ← Cloud Service Provider ← Database etc
2
Step: Shared OS Hardening
Provide Ansible Roles for Hardening Operating System to existing
GSA Benchmarks:
https://github.com/GSA/security-benchmarks
Standard Hardened Images
● Ubuntu
● Red Hat
● CentOS
● Windows
Step: Create Reusable Security Components
https://github.com/gsa?q=odp
● SAML/Oauth Proxy server
● Encryption and Networking
○ VPN
○ SSL Cert (Lets Encrypt)
○ Storage at-Rest
● Host Intrusion Detection
● Logging Parsers/Aggregators
● Monitoring/Metrics (CPU/Network/Storage/Disk Monitoring)
● Search Indexing
● Visualization
● File Integrity
● Alerting
so they can...
Active
Scans
Passive
Scans
BDD &
ATDD
Testing
Compliance &
Configuration
Testing
Step: Focus on Continuous Integration, then Deployment
CI/CD
2
Step: GitOps not Change Management Boards
2
Step: Avoid Pets (Mutable Deployments)
STEP 1 - Test
Applications
are built and
tested
STEP 2
Stage Deploy
Jenkins executes
Ansible scripts on
each Dev/Staging
server to deploy
app via SSH
us-east-1c
Private
Subnet
EC2
us-east-1b
Private
Subnet
EC2
inventory file
STEP 3
Validation Testing
Automated and
manual validation,
integration,
acceptance testing
STEP 4
Prod Deploy
Jenkins executes
Ansible scripts on
each Production
server to deploy
app via SSH
us-east-1c
Private
Subnet
EC2
us-east-1b
Private
Subnet
EC2
inventory file
Step: Employ Cattle (Immutable Deployments)
Production/Staging Environment
Dev Environment
STEP 4 - Backup
Backup last 5 AMI(s) for
Rollback
Provision Production
(Auto-Scaling AMIs)
STEP 3 - Deploy
Deployment Platform
Test Deploy
STEP 2 - Provision
Applications on top
of Hardened Image
STEP 1 - Test
Applications
are built and
tested
Build
5x 5x 5x 5x 5x
2
Step: Work Towards Compliance-as-Code
https://pages.nist.gov/OSCAL/
https://saf.mitre.org/#/
Demo / Questions?
https://tech.gsa.gov/guides/dev_sec_ops_guide/
https://github.com/18F/tts-tech-portfolio

More Related Content

What's hot

DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines Abdul_Mujeeb
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azurekloia
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introductionStefan Streichsbier
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
DevSecOps for you Full Stack
DevSecOps for you Full StackDevSecOps for you Full Stack
DevSecOps for you Full StackRon Nixon
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelinesVandana Verma
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...Mohamed Nizzad
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingAarno Aukia
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 
DevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityDevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityFranklin Mosley
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an IntroductionPrashanth B. P.
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftAmazon Web Services
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference ArchitecturesSonatype
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 

What's hot (20)

DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introduction
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
DevSecOps for you Full Stack
DevSecOps for you Full StackDevSecOps for you Full Stack
DevSecOps for you Full Stack
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelines
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
DevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityDevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving Security
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 

Similar to DevSecOps at the GSA

PMI Thailand: DevOps / Roles of Project Manager (20-May-2020)
PMI Thailand:   DevOps / Roles of Project Manager (20-May-2020)PMI Thailand:   DevOps / Roles of Project Manager (20-May-2020)
PMI Thailand: DevOps / Roles of Project Manager (20-May-2020)Gonzague PATINIER
 
Medical Information Technology and Acquistion
Medical Information Technology and AcquistionMedical Information Technology and Acquistion
Medical Information Technology and AcquistionFrank Meissner
 
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31TechSoup
 
Gluon Consulting - Specialized Software Development for Finance
Gluon Consulting - Specialized Software Development for FinanceGluon Consulting - Specialized Software Development for Finance
Gluon Consulting - Specialized Software Development for FinanceDennis Cabarroguis
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingBJIT Ltd
 
Microservices as an evolutionary architecture: lessons learned
Microservices as an evolutionary architecture: lessons learnedMicroservices as an evolutionary architecture: lessons learned
Microservices as an evolutionary architecture: lessons learnedLuram Archanjo
 
On the road to Engineering excellence
On the road to Engineering excellenceOn the road to Engineering excellence
On the road to Engineering excellenceAlexander Mrynskyi
 
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...WSO2
 
Culture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxCulture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxmushrunayasmin
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigDataAnitha Bade
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 
Keynote - Anil Patel - Bank on Openess
Keynote - Anil Patel - Bank on OpenessKeynote - Anil Patel - Bank on Openess
Keynote - Anil Patel - Bank on OpenessSparkrock
 
Lotus Notes Application Migration
Lotus Notes Application  MigrationLotus Notes Application  Migration
Lotus Notes Application MigrationMaarga Systems
 
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...Gene Kim
 
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...Adam D'Angelo
 
EasySOA business case and real world use case 20130220
EasySOA business case and real world use case 20130220EasySOA business case and real world use case 20130220
EasySOA business case and real world use case 20130220Marc Dutoo
 

Similar to DevSecOps at the GSA (20)

PMI Thailand: DevOps / Roles of Project Manager (20-May-2020)
PMI Thailand:   DevOps / Roles of Project Manager (20-May-2020)PMI Thailand:   DevOps / Roles of Project Manager (20-May-2020)
PMI Thailand: DevOps / Roles of Project Manager (20-May-2020)
 
Medical Information Technology and Acquistion
Medical Information Technology and AcquistionMedical Information Technology and Acquistion
Medical Information Technology and Acquistion
 
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
Gluon Consulting - Specialized Software Development for Finance
Gluon Consulting - Specialized Software Development for FinanceGluon Consulting - Specialized Software Development for Finance
Gluon Consulting - Specialized Software Development for Finance
 
My skills matrix
My skills matrixMy skills matrix
My skills matrix
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcing
 
Microservices as an evolutionary architecture: lessons learned
Microservices as an evolutionary architecture: lessons learnedMicroservices as an evolutionary architecture: lessons learned
Microservices as an evolutionary architecture: lessons learned
 
On the road to Engineering excellence
On the road to Engineering excellenceOn the road to Engineering excellence
On the road to Engineering excellence
 
Mapping Manager
Mapping ManagerMapping Manager
Mapping Manager
 
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...
[WSO2Con USA 2018] Winning Strategy For Enterprise Integration to Empower Dig...
 
Culture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxCulture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptx
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigData
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
Keynote - Anil Patel - Bank on Openess
Keynote - Anil Patel - Bank on OpenessKeynote - Anil Patel - Bank on Openess
Keynote - Anil Patel - Bank on Openess
 
Lotus Notes Application Migration
Lotus Notes Application  MigrationLotus Notes Application  Migration
Lotus Notes Application Migration
 
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...
DOES15 - Scott Prugh & Erica Morrison - Conway & Taylor Meet the Strangler (v...
 
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
 
EasySOA business case and real world use case 20130220
EasySOA business case and real world use case 20130220EasySOA business case and real world use case 20130220
EasySOA business case and real world use case 20130220
 

Recently uploaded

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 

Recently uploaded (20)

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 

DevSecOps at the GSA

  • 1. 1 DevSecOps at the Technology Transformation Service (TTS) @ the General Services Administration (GSA) John Jediny Technology Transformation Service (TTS)
  • 2. Powered By Technology Transformation Services 2 Challen ge.gov USWDS Bug Bounty Cloud. gov FedRAMP Login. gov Data. gov Search. gov USA. gov Digital. gov 10x Federalist Presidential Innovation Fellows 18F Centers of Excellence https://digital.gov/services/directory/ https://join.tts.gsa.gov/ Who we are
  • 3. Powered By Technology Transformation Services ACCELERATORS ARTIFICIAL INTELLIGENCE CLOUD & INFRASTRUCTURE DATA & ANALYTICS EXPERIENCE IDENTITY Modern organizations that can build, buy and manage smart scalable tech Leveraging analytics and machine learning to develop deeper insights and automate processes Converged infrastructure that scales and reduce cost securely Applying modern data-driven decision-maki ng practices Seamless interactions and experiences regardless of channel Shared solutions for increasing trust and avoiding fraud Who we are: How We Support Agency Partners
  • 4. Powered By Technology Transformation Services Software Authorizations Who are we: Authority to Operate (ATOs)
  • 5. Powered By Technology Transformation Services 5 ● Have a single person (with a backup) in charge of shepherding new software/product requests ● Work with Vendors through FEDRAMP tailored as a liaison ● Make the process more transparent and efficient ● Make a list of available software that can be used and licenses that can be leveraged ● Ensure all TTS requests go through the same process to allow staff to understand where a product is at in the process and when they can use it Problems Actions ● Current software request process is cumbersome and convoluted ● Tech Portfolio is sometimes left out of communications around software and is unable to check the status ● Purchase card holder is left out of the loop on whether the product is approved for purchase ● Wasted time for many involved Who are we: Software Concierge
  • 6. Powered By Technology Transformation Services ● Out of sync with GSA policies, practices and procedures ● Incomplete picture of cyber posture at an organizational level ● TTS gets a lot of vulnerability reports for systems that aren’t ours ● Other agencies interested in leveraging our Bug Bounty program ● Between Custom Developed Software and Software as a Service, there are 36 ATOs that need managing from TTS ● Lack of visibility into the “ingredients” that are in our software 6 ● Serve as centralized point of contact to GSA IT Security ● Standing up tooling to get a better picture of cybersecurity at the portfolio level ● Informed Vulnerability Disclosure Binding Operational Directive to ensure it’s easy to report to agencies ● Considered offering Bug Bounty beyond TTS ● Lead DevSecOps Guild meetings, putting action to identified problems ● Provide Subject Matter Expertise on Software Integrity to TTS, GSA, and rest Federal Gov ● Lead GSA-wide Software Assurance-focused Supply Chain Risk Management (SCRM) Working Group Problems Actions Who are we: Software-as-a-Service
  • 7. Powered By Technology Transformation Services 7 ● Auditing environment ○ Identification of unused resources ● Single sign-on (IAM, etc.) ● Continuous monitoring/alerting ○ Re-using GRACE components ● Establish standards for better cross-team management ○ Role-based management of AWS ● Engagement with program teams to better understand how centralized solutions fit and extend their existing workflows Problems Actions ● Infrastructure managed ad-hoc by program teams ● Disparity in how alerting is implemented across program teams ● TTS has limited ability for oversight at an organizational level ● Different processes create differing levels of coverage and specificity Who are we: Infrastructure Management
  • 8. Powered By Technology Transformation Services ● Doubling down on cloud.gov ○ Expand cloud.gov’s service offerings ○ Focus infrastructure investments from programs into TTS-wide standardized services, such as Kubernetes-as-a-Service ● Developing TTS-wide infrastructure goals/roadmap through interviews with TTS System Owners ● Standardization of AWS, Azure, and Google Cloud management through code and automation ○ Re-using GRACE components ● Unified account management, synchronizing with GSA Active Directory ● Better secrets management ● Sharing technical components and their compliance information (“Common Control Platform”) 8 ● TTS systems’ infrastructure varies greatly ● Cloud.gov isn’t compatible with some architectures, leading to greater responsibility for programs to manage their infrastructure ● Each program is configuring tools and writing their SSPs independently, duplicating effort ○ Larger issue: Inconsistent access control and knowledge sharing Problem Actions Who are we: Infrastructure Improvement
  • 9. Powered By Technology Transformation Services 9 ● Minimize heavily siloed talent: people work on a single system ● Lots of difference in architectures and reinvention of wheels ● Teams have to make due with the staff (skills) they have ○ May be missing critical skill sets ● Improving knowledge management for engineering organizational structures ● Ensuring institutional knowledge with heavy turn over ● Planning on interviews, surveys, and/or Q&A sessions around Solutions to better understand the pain points and appetite for change ● Working towards proposing a different structure for engineering Problem Actions Who are we: Shared Engineering
  • 10. https://hackerone.com/tts Who are we: Bug Bounty Program Management
  • 11. 11 https://tech.gsa.gov/guides/dev_sec_ops_guide/ Mission: ● Support the DevOps cultural transformation within GSA. ● “Assess the Gap” of hosting options between those systems manually provisioned to those already cloud native systems w/ self-service deployment. ● Move security left and increase developers awareness of security “make the right way the easy way”. ● “Don’t Repeat YOurselves” (DRY) by providing pre-hardened and reusable Operating Systems and Common Components. ● Reduce the overall time of any GSA system’s “Authority to Operate”. ● “Plug the Gap” around the lack of hosting for systems “ready” for fully automated systems using Infrastructure as Code, Configuration Management, and CI/CD. DevSecOps Working Group at GSA Cloud Native Manual Provisioning / Ticket Based Networking DevSecOps Infrastructure as Code & Configuration Management Automation
  • 12. 2 GSA IT Leadership (CIO/CTO/CISO) ❏ GSA IT Standards Pilot status for testing new tools ❏ Authority to Operate (ATO) for Pilot DevSecOps Sandbox ❏ Contract and In-house FTE support ❏ Organizational and Political endorsement GSA IT (IDI) ❏ Standardized Operating System Repository ❏ Component Hardening ❏ Reusable Infrastructure as Code and Configuration Management ❏ Centralized Pipeline Management ❏ User Onboarding & Account Management DevSecOps Roles and Responsibilities GSA IT (SecOps) ❏ Hardening Guides ❏ Nessus/Twitlock Scanning GSA IT (CTO Office) ❏ Platform Governance ❏ Financial Management Technology Transformation Service (TTS) ❏ Engineering Support All ❏ Collaboration ❏ Metrics
  • 14. 2 Step: Provide Software for Local Development
  • 15. 2 Step 1: Use *-as-a-Service(s) https://marketplace.fedramp.gov https://digital.gov/services/directory/
  • 16. 2 Step: Make Self-Servicing easy https://github.com/openservicebrokerapi/servicebroker/ https://github.com/cloudfoundry-incubator/cloud-service-broker/blob/master/docs/brokerpak-intro.md https://github.com/cloudfoundry-incubator/csb-brokerpak-aws Application → Terraform → Cloud Service Provider → Database etc Application ← Terraform ← Cloud Service Provider ← Database etc
  • 17. 2 Step: Shared OS Hardening Provide Ansible Roles for Hardening Operating System to existing GSA Benchmarks: https://github.com/GSA/security-benchmarks Standard Hardened Images ● Ubuntu ● Red Hat ● CentOS ● Windows
  • 18. Step: Create Reusable Security Components https://github.com/gsa?q=odp ● SAML/Oauth Proxy server ● Encryption and Networking ○ VPN ○ SSL Cert (Lets Encrypt) ○ Storage at-Rest ● Host Intrusion Detection ● Logging Parsers/Aggregators ● Monitoring/Metrics (CPU/Network/Storage/Disk Monitoring) ● Search Indexing ● Visualization ● File Integrity ● Alerting
  • 19. so they can... Active Scans Passive Scans BDD & ATDD Testing Compliance & Configuration Testing Step: Focus on Continuous Integration, then Deployment CI/CD
  • 20. 2 Step: GitOps not Change Management Boards
  • 21. 2 Step: Avoid Pets (Mutable Deployments) STEP 1 - Test Applications are built and tested STEP 2 Stage Deploy Jenkins executes Ansible scripts on each Dev/Staging server to deploy app via SSH us-east-1c Private Subnet EC2 us-east-1b Private Subnet EC2 inventory file STEP 3 Validation Testing Automated and manual validation, integration, acceptance testing STEP 4 Prod Deploy Jenkins executes Ansible scripts on each Production server to deploy app via SSH us-east-1c Private Subnet EC2 us-east-1b Private Subnet EC2 inventory file
  • 22. Step: Employ Cattle (Immutable Deployments) Production/Staging Environment Dev Environment STEP 4 - Backup Backup last 5 AMI(s) for Rollback Provision Production (Auto-Scaling AMIs) STEP 3 - Deploy Deployment Platform Test Deploy STEP 2 - Provision Applications on top of Hardened Image STEP 1 - Test Applications are built and tested Build 5x 5x 5x 5x 5x
  • 23. 2 Step: Work Towards Compliance-as-Code https://pages.nist.gov/OSCAL/ https://saf.mitre.org/#/