SlideShare a Scribd company logo
Successful DevSecOps
evolution
through realistic expectations and
company-wide transparency
by Dawid Bałut
The challenge
To build a DevSecOps roadmap that focuses on
practicality and positive long-term influence at
your organisation
Practical cyber resilience
1 security engineer vs 5 cybercriminals
OR
100 security-savvy software engineers + 1 security
engineer vs 5 cybercriminals?
How to fail at DevSecOps
- believe in the power of one
- put processes and tools before humans
- plan in months instead of years
- underestimate the value of transparent communication
- distract yourself with the latest industry news
Closer you look, the less you see
99% of things TOP 1% of companies do, aren’t practical for
99% of other companies,
unless you follow their path - instead of trying to
replicate the state of their destination.
Secure SDLC by Microsoft (2002)
How to increase the chances of success
for the DevSecOps evolution
- enable capable ones to become willing and able
- deploy automation and processes to support humans
- keep the whole organisation in sync with the evolution
- follow a multi-year long strategic roadmap
- be flexible by executing in weeks-long sprints
My TOP essentials
1. Educate all technical stakeholders such as software engineers, QA testers, product owners and
engineering managers on secure software engineering.
The training should cover secure programming as well as create the awareness of corporate security
policies, procedures, processes and best practices. The goal is to provide employees with an access
to the “bigger picture” mindset, enabling them to easily connect the dots going forward.
Security training should be conducted at least yearly, preferably in a form of interactive workshops.
Employees should have access to comprehensive knowledge base e.g. in a form of a e-learning
platform that allows ad-hoc access to the specific modules so employees
can easily find the material that’s actually relevant to their situation
at a given moment.
My TOP essentials
2. Educate the business-oriented professionals on how important it is for them to support their tech
teams during their day to day work.
Management must be made aware and regularly reminded that in order to improve company’s
cyber resilience, it’s required of them to actually provide employees with necessary resources do get
their job done.
Sometimes the best support one can provide is to stop themselves from creating additional
problems.
My TOP essentials
3. Each and every member of the Security Team must be aligned with the vision, because if you want
to earn the trust of the whole organisation, you need to be integral and stable.
Security professionals shouldn’t be treated as an independent consultancy silo, but as a teammate
like any other.
The goal is to make every employee feel like the security pros are there for them and such
atmosphere is created by infosec willingly sharing their knowledge and contributing to the
engineering projects acting as a subject matter expert in their respective domain.
My TOP essentials
4. Deploy systems and tools to provide you a high level of insights into what’s going on at the
company. You want to know what changes are being made by engineers so you can react
appropriately, knowing that you can’t protect something if you don’t know it exists.
Once properly tuned and optimized you can delegate the tool’s ownership to relevant department
and delegate the issue’s remediation to the very person that introduced a malfunctioning change.
Avoid fixing all the things in the dark, because you want employees to be made aware and educated,
so they learn how they can do things better in the future.
My TOP essentials
5. Define minimum viable security requirements that must be met in each software / operations
related project.
You want to have a document or a system which allows engineers to easily comprehend the
compliance and infosec requirements expected against their contributions.
In an agile world, each back-and-forth with security team is a waste of time, which is why all
documentation should be prepared upfront and delivered to relevant stakeholders so they don’t have
the resistance to work on security, just because they didn’t know where to look for help.
Create quality gates that define which risk levels should automatically fail the build and not allow
software to be deployed in the external environment.
As a signal to the algorithm making this decision, use the input from
the automated systems for code scanning, dynamic application
security testing, config auditing as well as manual testing.
My TOP essentials
6. Incorporate one-time manual and automated threat modeling and design reviews.
Reviewing software design at earliest and final phase of SDLC enables you to provide contextual
guidelines for development teams. It’ll also prepare the security department for risks associated with
development of very specific software so that you are prepared for the incidents that are likely to
arise around the mission critical components.
You can get your security to the next level if you train product owners and systems architects how to
create threat models that allow them to perform risk analysis at lower cost without direct involvement
of a security team.
My TOP essentials
7. Define benchmarks which will be enforced by the automated systems of combined scanning tools.
If you’ve made people aware of the requirements and guided them for long enough, there comes a
point in which you should feel comfortable with deploying systems that execute the verification for
you.
Simple starting points
1. Learn about and understand the existing software development practices to optimize existing
processes first, and then move onto adding more things on top of it.
2. Educate everyone on the principles of the DevSecOps culture and perform the relevant training.
3. Incrementally implement new processes and automated systems supporting software engineers in
writing and maintaining secure code and secure infrastructure.
Q & A
happy to answer all the questions you
may have :)
- Dawid Bałut

More Related Content

What's hot

Appsec Agility: A Brief Tour
Appsec Agility: A Brief TourAppsec Agility: A Brief Tour
Appsec Agility: A Brief Tour
Robert Keefer
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
Cigital
 
Dev ops ppt
Dev ops pptDev ops ppt
Dev ops ppt
sterlingit
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
Cigital
 
Abdulla ali it career software development manager
Abdulla ali it career software development managerAbdulla ali it career software development manager
Abdulla ali it career software development managerDan Rieb
 
Webinar 3 ways to increase team collaboration bh-ad-fnl
Webinar   3 ways to increase team collaboration bh-ad-fnlWebinar   3 ways to increase team collaboration bh-ad-fnl
Webinar 3 ways to increase team collaboration bh-ad-fnl
Perforce
 
Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018
Claire Priester Papas
 
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
Adam D'Angelo
 
Introducing Puppet Remediate™
Introducing Puppet Remediate™Introducing Puppet Remediate™
Introducing Puppet Remediate™
Puppet
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
developeronrents
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
Cigital
 
Quality Software Development
Quality Software DevelopmentQuality Software Development
Quality Software Development
Srinivasan Hariharan
 
You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)
24/7 Software
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
truvantis
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
Cigital
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
Cigital
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
Sprintzeal
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
Sebastien Deleersnyder
 
Software development philosophies v1
Software development philosophies v1Software development philosophies v1
Software development philosophies v1
Praveen Nair
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
Sprintzeal
 

What's hot (20)

Appsec Agility: A Brief Tour
Appsec Agility: A Brief TourAppsec Agility: A Brief Tour
Appsec Agility: A Brief Tour
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Dev ops ppt
Dev ops pptDev ops ppt
Dev ops ppt
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Abdulla ali it career software development manager
Abdulla ali it career software development managerAbdulla ali it career software development manager
Abdulla ali it career software development manager
 
Webinar 3 ways to increase team collaboration bh-ad-fnl
Webinar   3 ways to increase team collaboration bh-ad-fnlWebinar   3 ways to increase team collaboration bh-ad-fnl
Webinar 3 ways to increase team collaboration bh-ad-fnl
 
Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018
 
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
OSEHRA Summit 2017: Legacy System Modernization Using Open Source Tools and A...
 
Introducing Puppet Remediate™
Introducing Puppet Remediate™Introducing Puppet Remediate™
Introducing Puppet Remediate™
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 
Quality Software Development
Quality Software DevelopmentQuality Software Development
Quality Software Development
 
You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Software development philosophies v1
Software development philosophies v1Software development philosophies v1
Software development philosophies v1
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 

Similar to Successful DevSecOps Organizations - by Dawid Balut

Software risk management
Software risk managementSoftware risk management
Software risk management
Jose Javier M
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
Enov8
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
Mighty Guides, Inc.
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
Checkmarx
 
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
JamesEddie2
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuiteDave R. Taylor
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
Enov8
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
IJNSA Journal
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
Naushad Rajani. - CISA, CISSP, CCSP, PMP, DCPP (Privacy)
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
Siemplify
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
RapidValue
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by Mc
EstelaJeffery653
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21Dhairya Joshi
 
I sense prowareness 7 star development methodology
I sense prowareness   7 star development methodologyI sense prowareness   7 star development methodology
I sense prowareness 7 star development methodologyISense Bv
 
Dsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation successDsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation successBootstrap Marketing
 

Similar to Successful DevSecOps Organizations - by Dawid Balut (20)

Software risk management
Software risk managementSoftware risk management
Software risk management
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuite
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Se
SeSe
Se
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by Mc
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21
 
I sense prowareness 7 star development methodology
I sense prowareness   7 star development methodologyI sense prowareness   7 star development methodology
I sense prowareness 7 star development methodology
 
Dsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation successDsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation success
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Successful DevSecOps Organizations - by Dawid Balut

  • 1. Successful DevSecOps evolution through realistic expectations and company-wide transparency by Dawid Bałut
  • 2. The challenge To build a DevSecOps roadmap that focuses on practicality and positive long-term influence at your organisation
  • 3. Practical cyber resilience 1 security engineer vs 5 cybercriminals OR 100 security-savvy software engineers + 1 security engineer vs 5 cybercriminals?
  • 4. How to fail at DevSecOps - believe in the power of one - put processes and tools before humans - plan in months instead of years - underestimate the value of transparent communication - distract yourself with the latest industry news
  • 5. Closer you look, the less you see 99% of things TOP 1% of companies do, aren’t practical for 99% of other companies, unless you follow their path - instead of trying to replicate the state of their destination.
  • 6. Secure SDLC by Microsoft (2002)
  • 7. How to increase the chances of success for the DevSecOps evolution - enable capable ones to become willing and able - deploy automation and processes to support humans - keep the whole organisation in sync with the evolution - follow a multi-year long strategic roadmap - be flexible by executing in weeks-long sprints
  • 8. My TOP essentials 1. Educate all technical stakeholders such as software engineers, QA testers, product owners and engineering managers on secure software engineering. The training should cover secure programming as well as create the awareness of corporate security policies, procedures, processes and best practices. The goal is to provide employees with an access to the “bigger picture” mindset, enabling them to easily connect the dots going forward. Security training should be conducted at least yearly, preferably in a form of interactive workshops. Employees should have access to comprehensive knowledge base e.g. in a form of a e-learning platform that allows ad-hoc access to the specific modules so employees can easily find the material that’s actually relevant to their situation at a given moment.
  • 9. My TOP essentials 2. Educate the business-oriented professionals on how important it is for them to support their tech teams during their day to day work. Management must be made aware and regularly reminded that in order to improve company’s cyber resilience, it’s required of them to actually provide employees with necessary resources do get their job done. Sometimes the best support one can provide is to stop themselves from creating additional problems.
  • 10. My TOP essentials 3. Each and every member of the Security Team must be aligned with the vision, because if you want to earn the trust of the whole organisation, you need to be integral and stable. Security professionals shouldn’t be treated as an independent consultancy silo, but as a teammate like any other. The goal is to make every employee feel like the security pros are there for them and such atmosphere is created by infosec willingly sharing their knowledge and contributing to the engineering projects acting as a subject matter expert in their respective domain.
  • 11. My TOP essentials 4. Deploy systems and tools to provide you a high level of insights into what’s going on at the company. You want to know what changes are being made by engineers so you can react appropriately, knowing that you can’t protect something if you don’t know it exists. Once properly tuned and optimized you can delegate the tool’s ownership to relevant department and delegate the issue’s remediation to the very person that introduced a malfunctioning change. Avoid fixing all the things in the dark, because you want employees to be made aware and educated, so they learn how they can do things better in the future.
  • 12. My TOP essentials 5. Define minimum viable security requirements that must be met in each software / operations related project. You want to have a document or a system which allows engineers to easily comprehend the compliance and infosec requirements expected against their contributions. In an agile world, each back-and-forth with security team is a waste of time, which is why all documentation should be prepared upfront and delivered to relevant stakeholders so they don’t have the resistance to work on security, just because they didn’t know where to look for help. Create quality gates that define which risk levels should automatically fail the build and not allow software to be deployed in the external environment. As a signal to the algorithm making this decision, use the input from the automated systems for code scanning, dynamic application security testing, config auditing as well as manual testing.
  • 13. My TOP essentials 6. Incorporate one-time manual and automated threat modeling and design reviews. Reviewing software design at earliest and final phase of SDLC enables you to provide contextual guidelines for development teams. It’ll also prepare the security department for risks associated with development of very specific software so that you are prepared for the incidents that are likely to arise around the mission critical components. You can get your security to the next level if you train product owners and systems architects how to create threat models that allow them to perform risk analysis at lower cost without direct involvement of a security team.
  • 14. My TOP essentials 7. Define benchmarks which will be enforced by the automated systems of combined scanning tools. If you’ve made people aware of the requirements and guided them for long enough, there comes a point in which you should feel comfortable with deploying systems that execute the verification for you.
  • 15. Simple starting points 1. Learn about and understand the existing software development practices to optimize existing processes first, and then move onto adding more things on top of it. 2. Educate everyone on the principles of the DevSecOps culture and perform the relevant training. 3. Incrementally implement new processes and automated systems supporting software engineers in writing and maintaining secure code and secure infrastructure.
  • 16. Q & A happy to answer all the questions you may have :) - Dawid Bałut