SlideShare a Scribd company logo
1 of 30
Download to read offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
It’s in my backlog:
The truth behind DevSecOps
Randall Brooks, CISSP, CCSK
Engineering Fellow
Cyber Center of Excellence
Raytheon Company
F N D 2 1 7
Shawn Harris, CISSP-ISSAP, CCSP
Managing Principal Security Architect
Starbucks Coffee Company
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Disclaimer
This talk is purely the opinion of the speakers and does not
reflect the opinions of their employers.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
An additional note
We are not the Cloud Security
Alliance (CSA)
We are our companies’ representatives to
the CSA and serve on the DevSecOps and
Cloud Control Matrix working groups
We will discuss the CSA often in
this talk
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Expected knowledge
You’re going to learn what
DevSecOps really is, how to
seamlessly integrate cybersecurity,
and which AWS tools are needed to
do so!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
This talk in a nutshell
• The term DevSecOps has often been confused with “securing DevOps” or
“security Ops”—or using a secure development life cycle in agile
• If one is building security into their DevOps processes and even agile, when do
practices like threat modeling, static application security testing, and dynamic
application security testing occur?
• Sound architecture and implementation is key to providing a DevSecOps
capability with AWS
• A core concept is that cybersecurity requirements are foundational and cannot
be placed on a backlog indefinitely while the dev and the ops side of the
equation are worked actively
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• What is DevOps? DevSecOps?
• What is not DevSecOps? (in our humble opinion)
• How can one implement software assurance and security into DevOps?
• How can this be implemented in AWS?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevOps
• “DevOps is a set of software
development practices that
combines software development
(Dev) and information technology
operations (Ops) to shorten the
system’s development life cycle
while delivering features, fixes, and
updates frequently in close
alignment with business objectives.”
—Wikipedia
• Shared-responsibility model
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps
• DevSecOps is short for development, security, and operations. Its mantra is to
make everyone responsible and accountable for security with the objective of
implementing security decisions and actions at the same scale and speed as
development and operations decisions and actions.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Technical change or a cultural change?
• Leaning in over always saying no
• Data and security science over fear,
uncertainty, and doubt
• Open contribution and collaboration
over security-only requirements
• Consumable security services with
APIs over mandated security
controls and paperwork
• Business-driven security scores over
rubber-stamp security
• Red and blue team exploit testing
over relying on scans and
theoretical vulnerabilities
• 24-7 proactive security monitoring
over reacting after being informed
of an incident
• Shared threat intelligence over
keeping info to ourselves
• Compliance operations over
clipboards and checklists
—DevSecOps.org manifesto
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps life cycle
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
A DevSecOps workflow
• A developer writes source code and checks it into a source repository with
version control.
• Through automation, the code is tested via static application security testing.
Additionally, a peer review is conducted on the new code.
• If the code passes a defined bug bar, an environment is then created using an
infrastructure-as-code tool. This environment mirrors the operational
environment.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
A DevSecOps workflow (continued)
• The software is deployed to this test environment in which dynamic application
security testing is conducted. Through test automation, the software is
instrumented and fuzzed along with other functionality and vulnerability tests.
• If the application passes these tests, it is deployed to a production
environment.
• This new production environment is monitored continuously to identify any
active security threats to the system.
• The whole workflow starts again.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
!DevSecOps
• DevOps
• Agile
• Your application
security/software assurance
program
• Static code analysis
• Water[Scrum]fall
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
What if DevSecOps was:
• DevOps
• Agile
• Your application
security/software assurance
program
• Static code analysis
• Water[Scrum]fall
When are security practices done?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
First, one must have a secure development life cycle
(SDLC)
Microsoft SDL
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps is all about using training to influence cultural
change
• Include your site reliability engineering (SRE)/DevOps teams in SDLC
integrations planning (inclusion)
• Develop patterns for use
• Don’t rely on security professionals to do security planning alone
• Develop security as code
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Next, need to baby step and start “building security in”
• Embed static code analysis
• Add operational security
controls
• Automate
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Types of automation
• None (manual processes)
• Event driven (develop AWS
Lambda function based on
criteria)
• Full (playbooks developed for a
fully automated system)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Governance
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Six pillars of DevSecOps by the CSA
1. Collectively responsible (culture)
2. Collaborate and integrate (training, process integration)
3. Pragmatic implementation
4. Bridge compliance and development gap
5. Automate
6. Measure
Just finished peer review
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps with AWS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example AWS pipelinewith security
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
#whoami
Mr. Randall Brooks is an engineering fellow for Raytheon Company (NYSE: RTN).
He is the director of the Raytheon Cyber Center of Excellence. Mr. Brooks
represents the company within the U.S. International Committee for Information
Technology Standards Cyber Security 1 (CS1) and the Cloud Security Alliance
(CSA). He has more than 20 years of experience in cybersecurity with a recognized
expertise in software assurance (SwA) and secure development life cycles (SDLC).
In addition to holding eight patents, Mr. Brooks is a CCSK, CISSP, CSSLP, ISSEP,
ISSAP, and ISSMP. He graduated from Purdue University with a bachelor’s of
science from the School of Computer Science.
brooks@raytheon.com
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
#whoami
Mr. Shawn Harris has over 25 years of information security experience. He is
currently the managing principal security architect at Starbucks Coffee Company.
Mr. Harris previously assisted with the initial development of the Certified Cloud
Security Professional (CCSP) certification, served on the NIST Cloud Computing
Security working group, IETF JOSE working group, the Cloud Security Alliance
CCM, CAIQ, and the Enterprise Architecture working groups. He has contributed
material for ISC2 CISSP, ISSAP, and CCSP examinations. Mr. Harris is currently co-
chair of a Cloud Security Alliance working group leading efforts to develop the
Cloud Control Matrix 4.0.
shharris@starbucks.com
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Amazon Web Services
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...Amazon Web Services
 
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Amazon Web Services
 
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Amazon Web Services
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...Amazon Web Services
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 Amazon Web Services
 
Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...Amazon Web Services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 Amazon Web Services
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Amazon Web Services
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Amazon Web Services
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...Amazon Web Services
 
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Amazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Amazon Web Services
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Amazon Web Services
 
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019 Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019 Amazon Web Services
 
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Amazon Web Services
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...Amazon Web Services
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Amazon Web Services
 

What's hot (20)

Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
 
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
 
Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
 
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019 Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019
Amazon FreeRTOS security best practices - FND212 - AWS re:Inforce 2019
 
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
 

Similar to It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019

Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Amazon Web Services
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAmazon Web Services
 
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Amazon Web Services
 
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...FSV308-Culture Shift How to Move a Global Financial Services Organization to ...
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...Amazon Web Services
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...Amazon Web Services
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Amazon Web Services
 
Modernizing Software Development in the US Navy
Modernizing Software Development in the US NavyModernizing Software Development in the US Navy
Modernizing Software Development in the US NavyAmazon Web Services
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
 
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_Singapore
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_SingaporePractical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_Singapore
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_SingaporeAmazon Web Services
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftAmazon Web Services
 
Serverless and DevOps
Serverless and DevOpsServerless and DevOps
Serverless and DevOpsChris Munns
 
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Amazon Web Services
 
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...Amazon Web Services
 
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon WayAWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon WayAmazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 

Similar to It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 (20)

Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps Pipelines
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
 
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...FSV308-Culture Shift How to Move a Global Financial Services Organization to ...
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
Modernizing Software Development in the US Navy
Modernizing Software Development in the US NavyModernizing Software Development in the US Navy
Modernizing Software Development in the US Navy
 
Webinar-DevOps.pdf
Webinar-DevOps.pdfWebinar-DevOps.pdf
Webinar-DevOps.pdf
 
Moving to DevOps the Amazon Way
Moving to DevOps the Amazon WayMoving to DevOps the Amazon Way
Moving to DevOps the Amazon Way
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_Singapore
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_SingaporePractical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_Singapore
Practical DevSecOps - How to Continuosly Adapt to Threats_AWSPSSummit_Singapore
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
 
Serverless and DevOps
Serverless and DevOpsServerless and DevOps
Serverless and DevOps
 
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
 
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
 
CI/CD for Modern Applications
CI/CD for Modern ApplicationsCI/CD for Modern Applications
CI/CD for Modern Applications
 
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon WayAWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Manchester 2019 – Moving to DevOps the Amazon Way
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. It’s in my backlog: The truth behind DevSecOps Randall Brooks, CISSP, CCSK Engineering Fellow Cyber Center of Excellence Raytheon Company F N D 2 1 7 Shawn Harris, CISSP-ISSAP, CCSP Managing Principal Security Architect Starbucks Coffee Company
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Disclaimer This talk is purely the opinion of the speakers and does not reflect the opinions of their employers.
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. An additional note We are not the Cloud Security Alliance (CSA) We are our companies’ representatives to the CSA and serve on the DevSecOps and Cloud Control Matrix working groups We will discuss the CSA often in this talk
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Expected knowledge You’re going to learn what DevSecOps really is, how to seamlessly integrate cybersecurity, and which AWS tools are needed to do so!
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. This talk in a nutshell • The term DevSecOps has often been confused with “securing DevOps” or “security Ops”—or using a secure development life cycle in agile • If one is building security into their DevOps processes and even agile, when do practices like threat modeling, static application security testing, and dynamic application security testing occur? • Sound architecture and implementation is key to providing a DevSecOps capability with AWS • A core concept is that cybersecurity requirements are foundational and cannot be placed on a backlog indefinitely while the dev and the ops side of the equation are worked actively
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • What is DevOps? DevSecOps? • What is not DevSecOps? (in our humble opinion) • How can one implement software assurance and security into DevOps? • How can this be implemented in AWS?
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevOps • “DevOps is a set of software development practices that combines software development (Dev) and information technology operations (Ops) to shorten the system’s development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.” —Wikipedia • Shared-responsibility model
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps • DevSecOps is short for development, security, and operations. Its mantra is to make everyone responsible and accountable for security with the objective of implementing security decisions and actions at the same scale and speed as development and operations decisions and actions.
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Technical change or a cultural change? • Leaning in over always saying no • Data and security science over fear, uncertainty, and doubt • Open contribution and collaboration over security-only requirements • Consumable security services with APIs over mandated security controls and paperwork • Business-driven security scores over rubber-stamp security • Red and blue team exploit testing over relying on scans and theoretical vulnerabilities • 24-7 proactive security monitoring over reacting after being informed of an incident • Shared threat intelligence over keeping info to ourselves • Compliance operations over clipboards and checklists —DevSecOps.org manifesto
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps life cycle
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. A DevSecOps workflow • A developer writes source code and checks it into a source repository with version control. • Through automation, the code is tested via static application security testing. Additionally, a peer review is conducted on the new code. • If the code passes a defined bug bar, an environment is then created using an infrastructure-as-code tool. This environment mirrors the operational environment.
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. A DevSecOps workflow (continued) • The software is deployed to this test environment in which dynamic application security testing is conducted. Through test automation, the software is instrumented and fuzzed along with other functionality and vulnerability tests. • If the application passes these tests, it is deployed to a production environment. • This new production environment is monitored continuously to identify any active security threats to the system. • The whole workflow starts again.
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. !DevSecOps • DevOps • Agile • Your application security/software assurance program • Static code analysis • Water[Scrum]fall
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. What if DevSecOps was: • DevOps • Agile • Your application security/software assurance program • Static code analysis • Water[Scrum]fall When are security practices done?
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. First, one must have a secure development life cycle (SDLC) Microsoft SDL
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps is all about using training to influence cultural change • Include your site reliability engineering (SRE)/DevOps teams in SDLC integrations planning (inclusion) • Develop patterns for use • Don’t rely on security professionals to do security planning alone • Develop security as code
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Next, need to baby step and start “building security in” • Embed static code analysis • Add operational security controls • Automate
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Types of automation • None (manual processes) • Event driven (develop AWS Lambda function based on criteria) • Full (playbooks developed for a fully automated system)
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Governance
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Six pillars of DevSecOps by the CSA 1. Collectively responsible (culture) 2. Collaborate and integrate (training, process integration) 3. Pragmatic implementation 4. Bridge compliance and development gap 5. Automate 6. Measure Just finished peer review
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps with AWS
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Example AWS pipelinewith security
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. #whoami Mr. Randall Brooks is an engineering fellow for Raytheon Company (NYSE: RTN). He is the director of the Raytheon Cyber Center of Excellence. Mr. Brooks represents the company within the U.S. International Committee for Information Technology Standards Cyber Security 1 (CS1) and the Cloud Security Alliance (CSA). He has more than 20 years of experience in cybersecurity with a recognized expertise in software assurance (SwA) and secure development life cycles (SDLC). In addition to holding eight patents, Mr. Brooks is a CCSK, CISSP, CSSLP, ISSEP, ISSAP, and ISSMP. He graduated from Purdue University with a bachelor’s of science from the School of Computer Science. brooks@raytheon.com
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. #whoami Mr. Shawn Harris has over 25 years of information security experience. He is currently the managing principal security architect at Starbucks Coffee Company. Mr. Harris previously assisted with the initial development of the Certified Cloud Security Professional (CCSP) certification, served on the NIST Cloud Computing Security working group, IETF JOSE working group, the Cloud Security Alliance CCM, CAIQ, and the Enterprise Architecture working groups. He has contributed material for ISC2 CISSP, ISSAP, and CCSP examinations. Mr. Harris is currently co- chair of a Cloud Security Alliance working group leading efforts to develop the Cloud Control Matrix 4.0. shharris@starbucks.com
  • 30. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.