SlideShare a Scribd company logo
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
DevSecOps Done
Right:
Strategies and Tools
Davide Benvegnu
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Who is me…
Davide Benvegnu
DevOps and Infra Lead, PlayStudios
2
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Who is me…
Davide Benvegnu
DevOps and Infra Lead, PlayStudios
3
Microsoft MVP
Allegedly Famous YouTuber
Landscape photographer
Former MMA fighter
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Applied Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Development
& Branching
Change
Management
Quality
Assurance
Processes
Infrastructure
Automation
SECURITY
Release
Engineering
Performance
Monitoring
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Bad – No Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Bad – Security as an afterthought
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Still Bad - Detached
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Good – Security everywhere, at any moment
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Shift Left
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Shift Left on Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Shift Left on Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
The earlier we remediate, the better
Development Build Test/QA Production Breach
Remediation
Costs
SDLC
Stages
Develop Build Test Deploy Breach
$80 $240
$960
$7,600
$ Millions
Sources: NIST, Polemon Institute
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Shift Left on Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Shift Left on Security
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security as Responsibility
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security for everyone
PO
Security
in Epics
PM
Security
in Features
DEV
Secure(d)
Development
TESTER
Security
Testing
OPS
Security
Monitoring
…
…
…
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security teams reinvented
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security for everyone
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security for everyone
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Just everyone
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
DevSecOps Practices
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security Work in the Backlog
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Security through the whole process
Sprint
• Security work taken into Sprint
Active
• Topic branch linked to item for traceability
Pull
Request
• PR changes must pass security scanning and policies
Merge
• Continuous Integration Build from Main
Pre-Prod
• Security and Vulnerability tests must pass 100%
Release
• Progressive deploy across stages with release gates
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Assume Breach
 Initially double-blind test
 Over time, eliminated blue team
vs.
Shifted left to prevent top risks
 Credential theft
 Secret leakage
 OSS vulnerabilities
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
DevSecOps for each pillar
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Definition of DevOps
DevOps is the union of
people, processes, and
products to enable
continuous delivery of
value to your end users.
“
”
Donovan Brown
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
People
• Education
• Security first mindset
• Assumed breach
• Protect Credentials
Processes
• Secure Development Lifecycle
• Threat Modeling
• Security Assessments
• Red-Blue Team Exercises (War Games)
• Code Reviews
• Limited Production Access
• Immutable Infrastructure
• Progressive Exposure
Products (Technologies, Tools)
• Release automation
• Infrastructure/Config as Code
• Static Code Analysis /
Static Application Security Testing (SAST)
• Dynamic Application Security Testing (DAST)
• Credential Scanning
• Secrets Management
• Known Vulnerabilities
DevSecOps for the three DevOps Pillars
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
About Tools
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
How to Select Tools
• Developer-friendly
• Fast yet reliable
• Local
• CI
• CD
• Minimal false positive rate
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
How and What
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Integrated
Cloud Provider
IDE & VCS
Examples:
GitHub Advanced Security
• Secret Scanning
• Code Scanning
• Dependency Scanning
• SARIF Support
GitLab Application Security
• Same as GHAS
• IaC Scanning
VSCode Extensions
…
Examples:
Azure Security Center
Azure Monitor
AWS Cloud Security
AWS Cloudwatch
GCP Security Command Center
GCP Chronicle Security Ops.
…
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Integrated or Integratable
Cloud Provider
IDE & VCS 3rd-party
Examples:
GitHub Advanced Security
• Secret Scanning
• Code Scanning
• Dependency Scanning
• SARIF Support
GitLab Application Security
• Same as GHAS
• IaC Scanning
VSCode Extensions
…
Examples:
Azure Security Center
Azure Monitor
AWS Cloud Security
AWS Cloudwatch
GCP Security Command Center
GCP Chronicle Security Ops.
…
Examples:
Well…
As long as we can have a
Single Pane of Glass solution
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Keep Your Secrets… Secret!
Use an KMS, HSM
• Secrets, Keys, Certificates
Prefer Native Ones
• Unless you’re going MultiCloud
• or hybrid
• or regulations
Live Applications
CI/CD
Live Systems
• TDE, SSL Certs, Encryption at Rest, …
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Container Image Scan
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Prevent K8S Misconfigurations From Reaching
Production
Manual code review is time-consuming and
error-prone
Automate:
• Schema Validation
• Best Practices Validation
• Policy Enforcement
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
Summary
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
• Security is not just for security people
• Security everywhere, at every time
• Apply DevSecOps to People, Processes, and Products
• Choose tools that people would want to use
• It is just DevOps… make it so
Recap
Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
youtube.com/CoderDave
@DavideBenvegnu
github.com/n3wt0n
linkedin.com/in/davidebenvegnu
davide.ph
📷

More Related Content

Similar to DevSecOps Done Right - Strategies and Tools.pptx

Link-link MATERI Training_ Dasar-Dasar AMDAL
Link-link MATERI Training_ Dasar-Dasar AMDALLink-link MATERI Training_ Dasar-Dasar AMDAL
Link-link MATERI Training_ Dasar-Dasar AMDAL
Kanaidi ken
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
Yuval Ararat
 
Geek Sync | Successfully Migrating Existing Databases to Azure SQL Database
Geek Sync | Successfully Migrating Existing Databases to Azure SQL DatabaseGeek Sync | Successfully Migrating Existing Databases to Azure SQL Database
Geek Sync | Successfully Migrating Existing Databases to Azure SQL Database
IDERA Software
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost TradeInsight
 
Geek Sync | Database People and DevOps: The Fundamentals
Geek Sync | Database People and DevOps: The FundamentalsGeek Sync | Database People and DevOps: The Fundamentals
Geek Sync | Database People and DevOps: The Fundamentals
IDERA Software
 
Content Marketing and the Digital Dinosaurs
Content Marketing and the Digital DinosaursContent Marketing and the Digital Dinosaurs
Content Marketing and the Digital Dinosaurs
Frances Deighton
 
Securing Africa - 2009-2010
Securing Africa - 2009-2010Securing Africa - 2009-2010
Securing Africa - 2009-2010
Costin Raiu
 
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi DouglenDevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
 
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
Kanaidi ken
 
Geek Sync | Azure Cloud & You: First Steps for the DBA
Geek Sync | Azure Cloud & You: First Steps for the DBAGeek Sync | Azure Cloud & You: First Steps for the DBA
Geek Sync | Azure Cloud & You: First Steps for the DBA
IDERA Software
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
Irina Kostina
 
AZ-104 training & certification - warner-AZ-104.pptx
AZ-104 training & certification - warner-AZ-104.pptxAZ-104 training & certification - warner-AZ-104.pptx
AZ-104 training & certification - warner-AZ-104.pptx
ssuserb9c1ef1
 
Keep Calm and Migrate: How to survive a digital content migration
Keep Calm and Migrate: How to survive a digital content migrationKeep Calm and Migrate: How to survive a digital content migration
Keep Calm and Migrate: How to survive a digital content migration
Florida State University
 
Winning Strategies for a Successful ERP Implementation
Winning Strategies for a Successful ERP ImplementationWinning Strategies for a Successful ERP Implementation
Winning Strategies for a Successful ERP Implementation
Jonathan Gross
 
Consultancy Techniques Overview
Consultancy Techniques OverviewConsultancy Techniques Overview
Consultancy Techniques Overview
petersynnott
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
Dr.Adel Ghannam
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly DavidoffDevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon
 
Five Enterprise Development Best Practices That EVERY Salesforce Org Can Use
Five Enterprise Development Best Practices That EVERY Salesforce Org Can UseFive Enterprise Development Best Practices That EVERY Salesforce Org Can Use
Five Enterprise Development Best Practices That EVERY Salesforce Org Can Use
Salesforce Developers
 
NodeJS - KNOWARTH
NodeJS - KNOWARTHNodeJS - KNOWARTH
NodeJS - KNOWARTH
KNOWARTH Technologies
 

Similar to DevSecOps Done Right - Strategies and Tools.pptx (20)

Link-link MATERI Training_ Dasar-Dasar AMDAL
Link-link MATERI Training_ Dasar-Dasar AMDALLink-link MATERI Training_ Dasar-Dasar AMDAL
Link-link MATERI Training_ Dasar-Dasar AMDAL
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
Geek Sync | Successfully Migrating Existing Databases to Azure SQL Database
Geek Sync | Successfully Migrating Existing Databases to Azure SQL DatabaseGeek Sync | Successfully Migrating Existing Databases to Azure SQL Database
Geek Sync | Successfully Migrating Existing Databases to Azure SQL Database
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Geek Sync | Database People and DevOps: The Fundamentals
Geek Sync | Database People and DevOps: The FundamentalsGeek Sync | Database People and DevOps: The Fundamentals
Geek Sync | Database People and DevOps: The Fundamentals
 
Content Marketing and the Digital Dinosaurs
Content Marketing and the Digital DinosaursContent Marketing and the Digital Dinosaurs
Content Marketing and the Digital Dinosaurs
 
Securing Africa - 2009-2010
Securing Africa - 2009-2010Securing Africa - 2009-2010
Securing Africa - 2009-2010
 
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi DouglenDevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
 
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
PELAKSANAAN + Link-Link MATERI Training_ "PERDAGANGAN INTERNASIONAL (EXPORT I...
 
Geek Sync | Azure Cloud & You: First Steps for the DBA
Geek Sync | Azure Cloud & You: First Steps for the DBAGeek Sync | Azure Cloud & You: First Steps for the DBA
Geek Sync | Azure Cloud & You: First Steps for the DBA
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
 
AZ-104 training & certification - warner-AZ-104.pptx
AZ-104 training & certification - warner-AZ-104.pptxAZ-104 training & certification - warner-AZ-104.pptx
AZ-104 training & certification - warner-AZ-104.pptx
 
Keep Calm and Migrate: How to survive a digital content migration
Keep Calm and Migrate: How to survive a digital content migrationKeep Calm and Migrate: How to survive a digital content migration
Keep Calm and Migrate: How to survive a digital content migration
 
Winning Strategies for a Successful ERP Implementation
Winning Strategies for a Successful ERP ImplementationWinning Strategies for a Successful ERP Implementation
Winning Strategies for a Successful ERP Implementation
 
Consultancy Techniques Overview
Consultancy Techniques OverviewConsultancy Techniques Overview
Consultancy Techniques Overview
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly DavidoffDevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
 
Five Enterprise Development Best Practices That EVERY Salesforce Org Can Use
Five Enterprise Development Best Practices That EVERY Salesforce Org Can UseFive Enterprise Development Best Practices That EVERY Salesforce Org Can Use
Five Enterprise Development Best Practices That EVERY Salesforce Org Can Use
 
NodeJS - KNOWARTH
NodeJS - KNOWARTHNodeJS - KNOWARTH
NodeJS - KNOWARTH
 

More from Davide Benvegnù

Secure Your Open Source Projects For Free
Secure Your Open Source Projects For FreeSecure Your Open Source Projects For Free
Secure Your Open Source Projects For Free
Davide Benvegnù
 
Microsoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and AzureMicrosoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and Azure
Davide Benvegnù
 
All Around Azure: DevOps with GitHub - Managing the Flow of Work
All Around Azure: DevOps with GitHub - Managing the Flow of WorkAll Around Azure: DevOps with GitHub - Managing the Flow of Work
All Around Azure: DevOps with GitHub - Managing the Flow of Work
Davide Benvegnù
 
CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
 CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions  CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
Davide Benvegnù
 
GitHub Actions: your free CI engine (and much more)
GitHub Actions: your free CI engine (and much more)GitHub Actions: your free CI engine (and much more)
GitHub Actions: your free CI engine (and much more)
Davide Benvegnù
 
Life of a Remote Developer - Productivity tips (MSBuild 2020)
Life of a Remote Developer - Productivity tips (MSBuild 2020)Life of a Remote Developer - Productivity tips (MSBuild 2020)
Life of a Remote Developer - Productivity tips (MSBuild 2020)
Davide Benvegnù
 
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Davide Benvegnù
 
Debugging and Interacting with Production Applications - MS Online Tech Forum
Debugging and Interacting with Production Applications - MS Online Tech ForumDebugging and Interacting with Production Applications - MS Online Tech Forum
Debugging and Interacting with Production Applications - MS Online Tech Forum
Davide Benvegnù
 
Architect your app modernization journey with containers on Microsoft Azure
Architect your app modernization journey with containers on Microsoft AzureArchitect your app modernization journey with containers on Microsoft Azure
Architect your app modernization journey with containers on Microsoft Azure
Davide Benvegnù
 
Build 2019 HK - Deep Dive notable announcements
Build 2019 HK - Deep Dive notable announcementsBuild 2019 HK - Deep Dive notable announcements
Build 2019 HK - Deep Dive notable announcements
Davide Benvegnù
 
How I choose which services to use in Azure
How I choose which services to use in AzureHow I choose which services to use in Azure
How I choose which services to use in Azure
Davide Benvegnù
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key Vault
Davide Benvegnù
 
Microservices with Azure Service Fabric
Microservices with Azure Service FabricMicroservices with Azure Service Fabric
Microservices with Azure Service Fabric
Davide Benvegnù
 
Develop a Serverless Integration Platform for the Enterprise
Develop a Serverless Integration Platform for the EnterpriseDevelop a Serverless Integration Platform for the Enterprise
Develop a Serverless Integration Platform for the Enterprise
Davide Benvegnù
 
.NET microservices with Azure Service Fabric
.NET microservices with Azure Service Fabric.NET microservices with Azure Service Fabric
.NET microservices with Azure Service Fabric
Davide Benvegnù
 
SharePoint Disaster Recovery in Microsoft Azure
SharePoint Disaster Recovery in Microsoft AzureSharePoint Disaster Recovery in Microsoft Azure
SharePoint Disaster Recovery in Microsoft Azure
Davide Benvegnù
 
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
Davide Benvegnù
 
VS2017PI - Le novità di visual studio team services
VS2017PI - Le novità di visual studio team servicesVS2017PI - Le novità di visual studio team services
VS2017PI - Le novità di visual studio team services
Davide Benvegnù
 
Accelerate Your Bot Development with DevOps
Accelerate Your Bot Development with DevOpsAccelerate Your Bot Development with DevOps
Accelerate Your Bot Development with DevOps
Davide Benvegnù
 
Microsoft <3 Open Source
Microsoft <3 Open SourceMicrosoft <3 Open Source
Microsoft <3 Open Source
Davide Benvegnù
 

More from Davide Benvegnù (20)

Secure Your Open Source Projects For Free
Secure Your Open Source Projects For FreeSecure Your Open Source Projects For Free
Secure Your Open Source Projects For Free
 
Microsoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and AzureMicrosoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and Azure
 
All Around Azure: DevOps with GitHub - Managing the Flow of Work
All Around Azure: DevOps with GitHub - Managing the Flow of WorkAll Around Azure: DevOps with GitHub - Managing the Flow of Work
All Around Azure: DevOps with GitHub - Managing the Flow of Work
 
CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
 CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions  CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
CI CD per .Net 5? Facile con Azure Pipelines e GitHub Actions
 
GitHub Actions: your free CI engine (and much more)
GitHub Actions: your free CI engine (and much more)GitHub Actions: your free CI engine (and much more)
GitHub Actions: your free CI engine (and much more)
 
Life of a Remote Developer - Productivity tips (MSBuild 2020)
Life of a Remote Developer - Productivity tips (MSBuild 2020)Life of a Remote Developer - Productivity tips (MSBuild 2020)
Life of a Remote Developer - Productivity tips (MSBuild 2020)
 
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
 
Debugging and Interacting with Production Applications - MS Online Tech Forum
Debugging and Interacting with Production Applications - MS Online Tech ForumDebugging and Interacting with Production Applications - MS Online Tech Forum
Debugging and Interacting with Production Applications - MS Online Tech Forum
 
Architect your app modernization journey with containers on Microsoft Azure
Architect your app modernization journey with containers on Microsoft AzureArchitect your app modernization journey with containers on Microsoft Azure
Architect your app modernization journey with containers on Microsoft Azure
 
Build 2019 HK - Deep Dive notable announcements
Build 2019 HK - Deep Dive notable announcementsBuild 2019 HK - Deep Dive notable announcements
Build 2019 HK - Deep Dive notable announcements
 
How I choose which services to use in Azure
How I choose which services to use in AzureHow I choose which services to use in Azure
How I choose which services to use in Azure
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key Vault
 
Microservices with Azure Service Fabric
Microservices with Azure Service FabricMicroservices with Azure Service Fabric
Microservices with Azure Service Fabric
 
Develop a Serverless Integration Platform for the Enterprise
Develop a Serverless Integration Platform for the EnterpriseDevelop a Serverless Integration Platform for the Enterprise
Develop a Serverless Integration Platform for the Enterprise
 
.NET microservices with Azure Service Fabric
.NET microservices with Azure Service Fabric.NET microservices with Azure Service Fabric
.NET microservices with Azure Service Fabric
 
SharePoint Disaster Recovery in Microsoft Azure
SharePoint Disaster Recovery in Microsoft AzureSharePoint Disaster Recovery in Microsoft Azure
SharePoint Disaster Recovery in Microsoft Azure
 
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
Microsoft TechSummit - Deploy your Solution to IaaS and PaaS with VSTS and Az...
 
VS2017PI - Le novità di visual studio team services
VS2017PI - Le novità di visual studio team servicesVS2017PI - Le novità di visual studio team services
VS2017PI - Le novità di visual studio team services
 
Accelerate Your Bot Development with DevOps
Accelerate Your Bot Development with DevOpsAccelerate Your Bot Development with DevOps
Accelerate Your Bot Development with DevOps
 
Microsoft <3 Open Source
Microsoft <3 Open SourceMicrosoft <3 Open Source
Microsoft <3 Open Source
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

DevSecOps Done Right - Strategies and Tools.pptx

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level DevSecOps Done Right: Strategies and Tools Davide Benvegnu
  • 2. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Who is me… Davide Benvegnu DevOps and Infra Lead, PlayStudios 2
  • 3. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Who is me… Davide Benvegnu DevOps and Infra Lead, PlayStudios 3 Microsoft MVP Allegedly Famous YouTuber Landscape photographer Former MMA fighter
  • 4. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Applied Security
  • 5. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Development & Branching Change Management Quality Assurance Processes Infrastructure Automation SECURITY Release Engineering Performance Monitoring
  • 6. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Bad – No Security
  • 7. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Bad – Security as an afterthought
  • 8. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Still Bad - Detached
  • 9. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Good – Security everywhere, at any moment
  • 10. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Shift Left
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Shift Left on Security
  • 12. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Shift Left on Security
  • 13. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level The earlier we remediate, the better Development Build Test/QA Production Breach Remediation Costs SDLC Stages Develop Build Test Deploy Breach $80 $240 $960 $7,600 $ Millions Sources: NIST, Polemon Institute
  • 14. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Shift Left on Security
  • 15. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Shift Left on Security
  • 16. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security as Responsibility
  • 17. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security for everyone PO Security in Epics PM Security in Features DEV Secure(d) Development TESTER Security Testing OPS Security Monitoring … … …
  • 18. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security teams reinvented
  • 19. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security for everyone
  • 20. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security for everyone
  • 21. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Just everyone
  • 22. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level DevSecOps Practices
  • 23. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security Work in the Backlog
  • 24. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Security through the whole process Sprint • Security work taken into Sprint Active • Topic branch linked to item for traceability Pull Request • PR changes must pass security scanning and policies Merge • Continuous Integration Build from Main Pre-Prod • Security and Vulnerability tests must pass 100% Release • Progressive deploy across stages with release gates
  • 25. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Assume Breach  Initially double-blind test  Over time, eliminated blue team vs. Shifted left to prevent top risks  Credential theft  Secret leakage  OSS vulnerabilities
  • 26. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level DevSecOps for each pillar
  • 27. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Definition of DevOps DevOps is the union of people, processes, and products to enable continuous delivery of value to your end users. “ ” Donovan Brown
  • 28. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level People • Education • Security first mindset • Assumed breach • Protect Credentials Processes • Secure Development Lifecycle • Threat Modeling • Security Assessments • Red-Blue Team Exercises (War Games) • Code Reviews • Limited Production Access • Immutable Infrastructure • Progressive Exposure Products (Technologies, Tools) • Release automation • Infrastructure/Config as Code • Static Code Analysis / Static Application Security Testing (SAST) • Dynamic Application Security Testing (DAST) • Credential Scanning • Secrets Management • Known Vulnerabilities DevSecOps for the three DevOps Pillars
  • 29. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level About Tools
  • 30. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level How to Select Tools • Developer-friendly • Fast yet reliable • Local • CI • CD • Minimal false positive rate
  • 31. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level How and What
  • 32. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Integrated Cloud Provider IDE & VCS Examples: GitHub Advanced Security • Secret Scanning • Code Scanning • Dependency Scanning • SARIF Support GitLab Application Security • Same as GHAS • IaC Scanning VSCode Extensions … Examples: Azure Security Center Azure Monitor AWS Cloud Security AWS Cloudwatch GCP Security Command Center GCP Chronicle Security Ops. …
  • 33. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Integrated or Integratable Cloud Provider IDE & VCS 3rd-party Examples: GitHub Advanced Security • Secret Scanning • Code Scanning • Dependency Scanning • SARIF Support GitLab Application Security • Same as GHAS • IaC Scanning VSCode Extensions … Examples: Azure Security Center Azure Monitor AWS Cloud Security AWS Cloudwatch GCP Security Command Center GCP Chronicle Security Ops. … Examples: Well… As long as we can have a Single Pane of Glass solution
  • 34. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Keep Your Secrets… Secret! Use an KMS, HSM • Secrets, Keys, Certificates Prefer Native Ones • Unless you’re going MultiCloud • or hybrid • or regulations Live Applications CI/CD Live Systems • TDE, SSL Certs, Encryption at Rest, …
  • 35. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Container Image Scan
  • 36. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Prevent K8S Misconfigurations From Reaching Production Manual code review is time-consuming and error-prone Automate: • Schema Validation • Best Practices Validation • Policy Enforcement
  • 37. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Summary
  • 38. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level • Security is not just for security people • Security everywhere, at every time • Apply DevSecOps to People, Processes, and Products • Choose tools that people would want to use • It is just DevOps… make it so Recap
  • 39. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level youtube.com/CoderDave @DavideBenvegnu github.com/n3wt0n linkedin.com/in/davidebenvegnu davide.ph 📷