SlideShare a Scribd company logo
© 2016 VERACODE INC. 1© 2016 VERACODE INC.
The Human Side
of DevSecOps
© 2016 VERACODE INC. 2
• @tojarrett
• Over 20 years in software
development and
management
• At Veracode since 2008
• Grammy award winner
• Bacon number of 3
About Tim Jarrett
This talk assumes automation.
© 2016 VERACODE INC. 4
DevOps: transformation or tragedy?
h/t @petecheslock, DevOpsDays Austin
© 2016 VERACODE INC. 6
Culture clash revisited
Credit: Gene Kim, IT Revolution
© 2016 VERACODE INC. 8
Why desiloing Security is hard
Source
• Cory Scott, LinkedIn Director Information Security, Information Security Talent
Pool Research, BlackHat CISO Summit 2015.
© 2016 VERACODE INC. 9
Consider the theory
© 2016 VERACODE INC. 10
Consider the theory
Development
work products Security
Release
velocity starved
© 2016 VERACODE INC. 11
Theory of constraints for security in software
development
Identify
Exploit
SubordinateElevate
Repeat
Remove low value work
from security team, shift
upstream where
possible
Minimize changes
requiring security
review
?
Enter Security Champions!Security Champions to the rescue
Pick the
right people
Start strong
Empower,
within limits
© 2016 VERACODE INC. 14
How to pick the right people
• Just developers
• Brand new
• (Too) Junior
• Already in a scrum role
© 2016 VERACODE INC. 15
Start strong
• Start with formal training in
security fundamentals
• Reinforce with eLearning
• Use CTFs and other opportunities
to learn in the wild
• Set guidelines for common
activities
© 2016 VERACODE INC. 16
Empower, within limits
• Security grooming within guidelines
• Security review guidelines
• Know when, and how, to escalate
© 2016 VERACODE INC. 18
Measuring and managing
• Baseline security maturity
• Code review certifications
• Individual and team goals
© 2016 VERACODE INC. 19
Security champions:
the conscience of development.
IMPROVE
5 steps to
achieving
secure DevOps
© 2016 VERACODE INC. 22© 2016 VERACODE INC.
Questions?
Ask in the webinar or
tweet to @tojarrett

More Related Content

What's hot

2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
Sonatype
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
Matthew David
 
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
Miles Blatstein
 
CI/CD Best Practices for Your DevOps Journey
CI/CD Best  Practices for Your DevOps JourneyCI/CD Best  Practices for Your DevOps Journey
CI/CD Best Practices for Your DevOps Journey
DevOps.com
 
cdSummit Austin - Jez Humble: CD Architecture
cdSummit Austin - Jez Humble: CD ArchitecturecdSummit Austin - Jez Humble: CD Architecture
cdSummit Austin - Jez Humble: CD Architecture
Miles Blatstein
 
DevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than TechnologyDevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than Technology
CA Technologies
 
Starting and Scaling DevOps
Starting and Scaling DevOpsStarting and Scaling DevOps
Starting and Scaling DevOps
Jules Pierre-Louis
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ Schleen
SeniorStoryteller
 
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
XebiaLabs
 
Cloud bees and forester open source is not enough
Cloud bees and forester open source is not enough  Cloud bees and forester open source is not enough
Cloud bees and forester open source is not enough
Jules Pierre-Louis
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
WhiteSource
 
Continuous Delivery and DevOps at Rabobank
Continuous Delivery and DevOps at RabobankContinuous Delivery and DevOps at Rabobank
Continuous Delivery and DevOps at Rabobank
XebiaLabs
 
DevOps 2016 summit
DevOps 2016 summitDevOps 2016 summit
DevOps 2016 summit
Chihyang Li
 
The New Age of Enterprise DevOps
The New Age of Enterprise DevOpsThe New Age of Enterprise DevOps
The New Age of Enterprise DevOps
XebiaLabs
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017
Giulio Vian
 
DevOps: What, who, why and how?
DevOps: What, who, why and how?DevOps: What, who, why and how?
DevOps: What, who, why and how?
Red Gate Software
 
DevOps Explained
DevOps ExplainedDevOps Explained
DevOps Explained
Richard Seroter
 

What's hot (20)

2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
 
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
 
CI/CD Best Practices for Your DevOps Journey
CI/CD Best  Practices for Your DevOps JourneyCI/CD Best  Practices for Your DevOps Journey
CI/CD Best Practices for Your DevOps Journey
 
cdSummit Austin - Jez Humble: CD Architecture
cdSummit Austin - Jez Humble: CD ArchitecturecdSummit Austin - Jez Humble: CD Architecture
cdSummit Austin - Jez Humble: CD Architecture
 
DevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than TechnologyDevOps: A Culture Transformation, More than Technology
DevOps: A Culture Transformation, More than Technology
 
Starting and Scaling DevOps
Starting and Scaling DevOpsStarting and Scaling DevOps
Starting and Scaling DevOps
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ Schleen
 
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
 
Cloud bees and forester open source is not enough
Cloud bees and forester open source is not enough  Cloud bees and forester open source is not enough
Cloud bees and forester open source is not enough
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
Continuous Delivery and DevOps at Rabobank
Continuous Delivery and DevOps at RabobankContinuous Delivery and DevOps at Rabobank
Continuous Delivery and DevOps at Rabobank
 
DevOps 2016 summit
DevOps 2016 summitDevOps 2016 summit
DevOps 2016 summit
 
The New Age of Enterprise DevOps
The New Age of Enterprise DevOpsThe New Age of Enterprise DevOps
The New Age of Enterprise DevOps
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017DevOps by examples - Continuous Lifecycle London 2017
DevOps by examples - Continuous Lifecycle London 2017
 
DevOps: What, who, why and how?
DevOps: What, who, why and how?DevOps: What, who, why and how?
DevOps: What, who, why and how?
 
devops
devops devops
devops
 
DevOps Explained
DevOps ExplainedDevOps Explained
DevOps Explained
 

Viewers also liked

Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Jules Pierre-Louis
 
Travis ci
Travis ciTravis ci
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
A Smart Landfill Gas Control System Design to Optimize ROI & PerformanceA Smart Landfill Gas Control System Design to Optimize ROI & Performance
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
Affinity Energy
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
MAX Risk Intelligence by LOGICnow
 
How to Build the Right Automation
How to Build the Right AutomationHow to Build the Right Automation
How to Build the Right Automation
Jules Pierre-Louis
 
Starting and Scaling Devops
Starting and Scaling Devops Starting and Scaling Devops
Starting and Scaling Devops
Jules Pierre-Louis
 
Hitting back against digital disruption
Hitting back against digital disruptionHitting back against digital disruption
Hitting back against digital disruption
Mike Shaw
 
The four changes in IT because of digital technology
The four changes in IT because of digital technologyThe four changes in IT because of digital technology
The four changes in IT because of digital technology
Mike Shaw
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?
Mike Shaw
 

Viewers also liked (9)

Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
 
Travis ci
Travis ciTravis ci
Travis ci
 
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
A Smart Landfill Gas Control System Design to Optimize ROI & PerformanceA Smart Landfill Gas Control System Design to Optimize ROI & Performance
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 
How to Build the Right Automation
How to Build the Right AutomationHow to Build the Right Automation
How to Build the Right Automation
 
Starting and Scaling Devops
Starting and Scaling Devops Starting and Scaling Devops
Starting and Scaling Devops
 
Hitting back against digital disruption
Hitting back against digital disruptionHitting back against digital disruption
Hitting back against digital disruption
 
The four changes in IT because of digital technology
The four changes in IT because of digital technologyThe four changes in IT because of digital technology
The four changes in IT because of digital technology
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?
 

Similar to The Human Side of DevSecOps

The Human Side of DevSecOps
The Human Side of DevSecOpsThe Human Side of DevSecOps
The Human Side of DevSecOps
Timothy Jarrett
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Sebastian Taphanel CISSP-ISSEP
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter Chestna
DevSecCon
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 
DevOpsDays - Pick any Three - Devops from scratch
DevOpsDays - Pick any Three - Devops from scratchDevOpsDays - Pick any Three - Devops from scratch
DevOpsDays - Pick any Three - Devops from scratch
Pete Cheslock
 
DevOps: Security's Big Opportunity
DevOps: Security's Big OpportunityDevOps: Security's Big Opportunity
DevOps: Security's Big Opportunity
Timothy Jarrett
 
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
VMware Tanzu
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
James Wickett
 
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of QualityThe DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
TechWell
 
How to get the best out of DevSecOps - a developers perspective
How to get the best out of DevSecOps - a developers perspectiveHow to get the best out of DevSecOps - a developers perspective
How to get the best out of DevSecOps - a developers perspective
Colin Domoney
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service DeliveryAchieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
SC18 DevOps Short Introduction
SC18 DevOps Short IntroductionSC18 DevOps Short Introduction
SC18 DevOps Short Introduction
Jason Echols
 
Top Lessons Learned While Researching and Writing The DevOps Handbook
Top Lessons Learned While Researching and Writing The DevOps HandbookTop Lessons Learned While Researching and Writing The DevOps Handbook
Top Lessons Learned While Researching and Writing The DevOps Handbook
Dynatrace
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
From Rogue One to Rebel Alliance: Building Developers into Security Champions
From Rogue One to Rebel Alliance: Building Developers into Security Champions From Rogue One to Rebel Alliance: Building Developers into Security Champions
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Digital Transformation EXPO Event Series
 
How to apply DevOps in a regulated organisation
How to apply DevOps in a regulated organisationHow to apply DevOps in a regulated organisation
How to apply DevOps in a regulated organisation
Colin Domoney
 

Similar to The Human Side of DevSecOps (20)

The Human Side of DevSecOps
The Human Side of DevSecOpsThe Human Side of DevSecOps
The Human Side of DevSecOps
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter Chestna
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
DevOpsDays - Pick any Three - Devops from scratch
DevOpsDays - Pick any Three - Devops from scratchDevOpsDays - Pick any Three - Devops from scratch
DevOpsDays - Pick any Three - Devops from scratch
 
DevOps: Security's Big Opportunity
DevOps: Security's Big OpportunityDevOps: Security's Big Opportunity
DevOps: Security's Big Opportunity
 
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
 
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of QualityThe DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
 
How to get the best out of DevSecOps - a developers perspective
How to get the best out of DevSecOps - a developers perspectiveHow to get the best out of DevSecOps - a developers perspective
How to get the best out of DevSecOps - a developers perspective
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service DeliveryAchieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
 
SC18 DevOps Short Introduction
SC18 DevOps Short IntroductionSC18 DevOps Short Introduction
SC18 DevOps Short Introduction
 
Top Lessons Learned While Researching and Writing The DevOps Handbook
Top Lessons Learned While Researching and Writing The DevOps HandbookTop Lessons Learned While Researching and Writing The DevOps Handbook
Top Lessons Learned While Researching and Writing The DevOps Handbook
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
 
From Rogue One to Rebel Alliance: Building Developers into Security Champions
From Rogue One to Rebel Alliance: Building Developers into Security Champions From Rogue One to Rebel Alliance: Building Developers into Security Champions
From Rogue One to Rebel Alliance: Building Developers into Security Champions
 
How to apply DevOps in a regulated organisation
How to apply DevOps in a regulated organisationHow to apply DevOps in a regulated organisation
How to apply DevOps in a regulated organisation
 

More from Jules Pierre-Louis

Sandstorm or Significant: The evolving role of context in Incident Management
Sandstorm or Significant: The evolving role of context in Incident ManagementSandstorm or Significant: The evolving role of context in Incident Management
Sandstorm or Significant: The evolving role of context in Incident Management
Jules Pierre-Louis
 
From Monolith to Microservices – and Beyond!
From Monolith to Microservices – and Beyond!From Monolith to Microservices – and Beyond!
From Monolith to Microservices – and Beyond!
Jules Pierre-Louis
 
Containers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical SolutionsContainers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical Solutions
Jules Pierre-Louis
 
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBMAdopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Jules Pierre-Louis
 
Managing Quality of Service for Containerized Microservice Applications
Managing Quality of Service for Containerized Microservice ApplicationsManaging Quality of Service for Containerized Microservice Applications
Managing Quality of Service for Containerized Microservice Applications
Jules Pierre-Louis
 
The Evolution of Application Release Automation
The Evolution of Application Release AutomationThe Evolution of Application Release Automation
The Evolution of Application Release Automation
Jules Pierre-Louis
 
DevOPs Transformation Workshop
DevOPs Transformation WorkshopDevOPs Transformation Workshop
DevOPs Transformation Workshop
Jules Pierre-Louis
 
Pipeline: Continuous Delivery as Code in Jenkins 2.0
Pipeline: Continuous Delivery as Code in Jenkins 2.0Pipeline: Continuous Delivery as Code in Jenkins 2.0
Pipeline: Continuous Delivery as Code in Jenkins 2.0
Jules Pierre-Louis
 
7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
Jules Pierre-Louis
 

More from Jules Pierre-Louis (11)

Sandstorm or Significant: The evolving role of context in Incident Management
Sandstorm or Significant: The evolving role of context in Incident ManagementSandstorm or Significant: The evolving role of context in Incident Management
Sandstorm or Significant: The evolving role of context in Incident Management
 
From Monolith to Microservices – and Beyond!
From Monolith to Microservices – and Beyond!From Monolith to Microservices – and Beyond!
From Monolith to Microservices – and Beyond!
 
Containers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical SolutionsContainers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical Solutions
 
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBMAdopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
 
Managing Quality of Service for Containerized Microservice Applications
Managing Quality of Service for Containerized Microservice ApplicationsManaging Quality of Service for Containerized Microservice Applications
Managing Quality of Service for Containerized Microservice Applications
 
The Evolution of Application Release Automation
The Evolution of Application Release AutomationThe Evolution of Application Release Automation
The Evolution of Application Release Automation
 
DevOPs Transformation Workshop
DevOPs Transformation WorkshopDevOPs Transformation Workshop
DevOPs Transformation Workshop
 
Pipeline: Continuous Delivery as Code in Jenkins 2.0
Pipeline: Continuous Delivery as Code in Jenkins 2.0Pipeline: Continuous Delivery as Code in Jenkins 2.0
Pipeline: Continuous Delivery as Code in Jenkins 2.0
 
7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users
 
7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users7 Habits of Highly Effective Jenkins Users
7 Habits of Highly Effective Jenkins Users
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
 

Recently uploaded

GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 

Recently uploaded (20)

GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 

The Human Side of DevSecOps

  • 1. © 2016 VERACODE INC. 1© 2016 VERACODE INC. The Human Side of DevSecOps
  • 2. © 2016 VERACODE INC. 2 • @tojarrett • Over 20 years in software development and management • At Veracode since 2008 • Grammy award winner • Bacon number of 3 About Tim Jarrett
  • 3. This talk assumes automation.
  • 4. © 2016 VERACODE INC. 4 DevOps: transformation or tragedy?
  • 6. © 2016 VERACODE INC. 6 Culture clash revisited
  • 7. Credit: Gene Kim, IT Revolution
  • 8. © 2016 VERACODE INC. 8 Why desiloing Security is hard Source • Cory Scott, LinkedIn Director Information Security, Information Security Talent Pool Research, BlackHat CISO Summit 2015.
  • 9. © 2016 VERACODE INC. 9 Consider the theory
  • 10. © 2016 VERACODE INC. 10 Consider the theory Development work products Security Release velocity starved
  • 11. © 2016 VERACODE INC. 11 Theory of constraints for security in software development Identify Exploit SubordinateElevate Repeat Remove low value work from security team, shift upstream where possible Minimize changes requiring security review ?
  • 12. Enter Security Champions!Security Champions to the rescue
  • 13. Pick the right people Start strong Empower, within limits
  • 14. © 2016 VERACODE INC. 14 How to pick the right people • Just developers • Brand new • (Too) Junior • Already in a scrum role
  • 15. © 2016 VERACODE INC. 15 Start strong • Start with formal training in security fundamentals • Reinforce with eLearning • Use CTFs and other opportunities to learn in the wild • Set guidelines for common activities
  • 16. © 2016 VERACODE INC. 16 Empower, within limits • Security grooming within guidelines • Security review guidelines • Know when, and how, to escalate
  • 17.
  • 18. © 2016 VERACODE INC. 18 Measuring and managing • Baseline security maturity • Code review certifications • Individual and team goals
  • 19. © 2016 VERACODE INC. 19 Security champions: the conscience of development.
  • 22. © 2016 VERACODE INC. 22© 2016 VERACODE INC. Questions? Ask in the webinar or tweet to @tojarrett

Editor's Notes

  1. As noted up front, this is a talk about people and organizational factors. If you think that DevOps begins and ends at the pipeline and the technologies that plug into it, you may want to wait for the recap on Twitter. And this talk is definitely not for you if your job description for your AppSec team includes configuring, tuning, and running code and web app scanners by hand. For those of you who have had one or more transformation efforts fail due to change management failures, staff shortages, or other organizational issues—and for those who have one or more automated AppSec tools and are wondering how to make them successful—this talk is for you.
  2. I think none of us would be at this webinar if we didn’t think there is transformational power in DevOps. But for a lot of teams facing the DevOps transformation, the potential comes with a lot of anxiety. After all, we’re talking about collapsing silos. In the real world, when that happens, people die. This goes double for integrating Security into DevOps. But given that DevOps has already absorbed development, operations, QA and release engineering, why should the security transition be harder?
  3. The reason is culture clash. More than any other organization, Security has been publicly skeptical of the benefits of DevOps. They’ve seen a lot of development processes come and go, and insecure software keeps getting built. h/t @petecheslock, DevOpsDays Austin
  4. Let’s put a finer point on the skepticism. Security has traditionally been a discipline of controls and gates. But there’s no room for this sort of manual, expert-driven check in DevOps, just as there’s no room for weeks of manual quality assurance testing if you want to ship code several times a day. That means developers have to get security conscious, and security folks have to stop looking down their noses at DevOps and figure out how to help it move faster, not stand in the way.
  5. As with a lot of other things, Gene Kim’s Three Ways help us to see the problem: We need to see software delivery as an end to end system that includes security as part of the problem. Security needs to help create some of the feedback loops from production (and earlier stages of the process), and needs to help Dev interpret and act on them. And security needs to participate in the culture of continual experimentation and learning.
  6. A big part of the challenge of meeting the need for security to participate in DevOps is math: specifically, for every four people employed in infosec, there are three additional job openings. You can’t hire an infosec team big enough to define security requirements, perform secure code reviews, interpret security testing results, and handle security alerts for all your applications in your entire portfolio if you’re operating at DevOps speed.
  7. Theory of Constraints: in an end to end flow, identify the constraint, exploit, subordinate, elevate, then repeat What is the constraint in DevSecOps? Define requirements --> Develop code --> Review code --> Build code --> Test code --> Handle bugs (Almost) all have some touch between security and development First pass: Security is the constraint Exploit constraint – maximize throughput with processes like security reviews etc. Subordinate constraint – implicitly done either by minimizing the amount of security changes that happen or adding surge capacity Elevate constraint – Optimize handoffs, change the process
  8. So to put it another way, once you’ve optimized your Dev and Ops processes, Security becomes the constraint.
  9. Identify Exploit Subordinate (This theory, by the way, is why I say that this talk isn’t for you if you are still running your scanners by hand. If you’re doing that, you haven’t even begun to exploit the constraint of your security team yet.) Elevate? How do we do that? The definition is “In this step, more substantive changes are implemented to “break” the constraint. These changes may necessitate a significant investment of time and/or money” – and may involve targeted review of lost productive time, tactical actions, design and/or component upgrades, and supplementing the constraint with additional throughput. But how does that work if you don’t have enough people in the first place? You do it by making more people who can do the work that security is doing
  10. Enter Security Champions – members of the DevOps team who can perform lower-skill, high frequency jobs to take load off the security team and help DevSecOps to scale. You can think of this role as essentially a new guild, like release engineers or folks who work on unit tests. Some examples of things security champions can take on (we’ll talk about a few of these): Peer reviews Security grooming Code reviews (very specific topics based on certain security controls) Data validation Encoding Parameterization Logging Error handling Product security incident response – new CVEs based on impact and severity Provide details of components, how to tell if you’re exposed, etc Known vulns e.g. Shellshock/Heartbleed/Struts-Shock – triage impact, provide remediation plan This sounds great, but how will we make this happen?
  11. So how do we do this practically? There’s a lot to talk about here, but I want to focus on how you get started— -- how to pick the right people for the guild, how do you get the program started, and how do you set up the working relationship between the security champion and the central security team. We’ll be drawing examples from Veracode’s own experience standing up a security champion function.
  12. Let’s assume you’ve made the case to management. The first step is drafting your team. Let’s talk about how not to pick the right people— -- You shouldn’t assume that only developers are going to be good security champions. A strong QA resource may be a great candidate. ---- They should just have clear expectations on the time commitment. ---- And make sure to loop the managers into the call for volunteers. ---- And don’t stop with just one per team – you want to make sure you’re not introducing a new single point of failure -- You should also have clear requirements. These will probably be specific to your culture and process, but some likely common requirements include: ---- Not new to company (ramping on day 2 day) ---- Not too junior (needed an influencer) ---- Not in an existing scrum role (PO, SM)
  13. Now that you have the team in place, you need to give them a certain baseline knowledge. How you do this will differ according to what your security team looks like, but some of the basics are: 1. security fundamentals (2 day instructor led training) CIA, etc Trust no one Security controls must be server-side Deny by default Use white lists Defense in depth Threat modeling 2. Reinforce with eLearning to provide ongoing training and access 3. Ongoing education with CTF exercises Use stuff that’s readily available – https://overthewire.org
  14. Set guidelines for common activities – Product specific grooming guidelines Update based on findings Self-service review guidelines (what to teach vs. what can be done by anyone) – automate if possible (pro tip) Does it need a review Does it have to be a security team person Crypto? Can it be security champion Dictates basic acceptance criteria
  15. All of these things are great activities. To be really successful, you need to measure what you’re doing and how you’re making progress.
  16. Product security maturity model Baseline and regular updates Open Samm and BSIMM useless – built our own Needed a vision of an ideal security program Code review certification eLearning, classroom training, code review ‘test’ First year – mentored transition – failure SC do first review Expert validates results Absence of findings was a problem Formal exercise with 1:1 meeting to discuss process and findings Goals for security champions Goals for teams (against maturity model) Positive and negative impacts Include eLearning Document inside of stories with security disposition
  17. So this is the first step in easing security as a constraint in your process. You’ll probably find a lot of additional places to improve this process.
  18. Last, a quick plug – if you would like to know more about how Veracode thinks about securing DevOps, you may want to look at our white paper, 5 Steps to Achieving Secure DevOps, which includes a few other topics around automation and Appsec in Production.