SlideShare a Scribd company logo
©2022 Cprime, Inc. All rights reserved and no copying without express written permission. cprime.com | 877.800.5221
The What, Why, and How of DevSecOps
The time is now to shift left in security
Chris Knotts
Cprime Learning Product Director
linkedin.com/in/chris-knotts/
Speaker
01 DevSecOps Prerequisites
02 Why DevSecOps? Foundations
03 Who is Responsible for DevSecOps?
04 Practical Tips for Getting Started
05 Keep the Conversation Going/Q&A
Agenda
Part 1
DevSecOps Prerequisites
• Leadership buy-in
• Commitment to cultural change
• Literacy and progress with DevOps
• Collaboration across design roles, work intake processes, testing,
security, development, and IT production staff
DevSecOps Prerequisites
Executive Buy-In
Commitment to
Cultural Change
Literacy and Progress With DevOps
Collaboration Across
Design Roles, Work
Intake Processes,
Testing, Security,
Development, and IT
Production Staff
Part 2
DevSecOps Foundations
• Traditional systems and IT
service development has relied
on a plan-driven, phase-gated
style of enterprise workflow.
• This style of managing projects
and products can work well for
physical, mission-critical work,
but doesn’t work well with
software and IT systems.
Agility
• Furthermore, plan-driven
work with a focus on
requirements and
documentation fails to take
advantage of a few of
software engineering’s
greatest strengths.
• Agility means quick,
adaptive, responsive cycles
of work…including a
welcoming attitude towards
changing requirements,
emergent needs, and real-
time customer feedback.
Agility
Agility
• Fundamentally, the DevOps
movement is about
understanding competing
incentives
• A lack of “systems thinking”
means that goals tend to get
optimized according to local,
departmental goals
• This dynamic has big
implications for security,
especially application security
DevOps
Originally defined in Continuous Delivery by Jez Humble and David Farley
• CI/CD pipelines usually
represent the practical
execution of DevOps
and technical agility
concepts
• The idea is to set up
progressive layers of
automation which force
software/system
features to “prove
themselves” before
progressing to the next
step towards
deployment
Software
Development
Pipelines
Systems Thinking
What is a “Shift Left”?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Feedback?
What is a “Shift Left”?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Feedback?
Shifting Left: Planning and Including Downstream Functions Earlier
Business
unit
constructs
Feature or
business
need
PMO
Project management
Delivery
Risk/security
Feedback?
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Security is fundamentally about
understanding and managing risk
…of movement
…of actions
…of decisions
…protection against risk
…safety (of job, of employer, of money, etc.)
…defensibility against attack
Security Freedom
Security is fundamentally about understanding and managing risk
Condition White
• Most people live in this condition
• You are in a relaxed state and are unaware of your surroundings
• Avoid condition white!
Condition Yellow
• Still in a relaxed state, but are aware of what’s going on around you
• Be cautious (not paranoid)
• Learn to live in condition yellow!
• More than 6,000 online criminal marketplaces sell ransomware products
and services.
(Source: McAfee)
• 444,259 ransomware attacks took place worldwide in 2018.
(Source: Statista)
• As of 2020, Hackers create 300,000 new pieces of malware daily.
(Source: McAfee)
Important Data Points
The bottom line:
• Observe the growth since
2016
• $3.2 million – the average
cost of a data breach in 2019
• $12 billion – the cost of
business email compromise
(BEC) in 2019
The World’s
Biggest Data
Breaches, as of
2020
YOU, the user, are the weakest link in
any enterprise’s security.
Part 3
Who is responsible for DevSecOps?
DevSecOps Roles
Decision Makers
Feedback: Measurement, improvement
Requirements
/Design Dev
Testing
& QA
Release/
Deploy
Ops &
Maintenance
Feature or
business
need
Delivery
Security
DevSecOps Roles
Part 4
Practical tips for getting started
Risk identification and classification
Factors and their probabilities
Impact estimation
Risk severity
What should be fixed and when
Five places where you should look
for risk:
1. Encryption
2. Authentication
3. Logging
4. Asset management
5. Zoning and containment
Risk Review
Threat Factors:
• Skill level
• Motive
• Opportunity
• Size
Vulnerability Factors:
• Ease of discovery
• Ease of exploit
• Awareness
• Intrusion detection
Risk Review
Business Impact Factors:
• Financial damage
• Reputation damage
• Non-compliance
• Privacy violation
Technical Impact Factors:
• Confidentiality
• Integrity
• Availability
• Accountability
Risk Review
Prioritize Testing for Risk
• Identify assets
• Identify threats
• Identify vulnerabilities
Prioritize vulnerabilities using methods :
• Damage, reproducibility, exploitability, affected users,
and discoverability (DREAD)
• Spoofing, Tampering, Repudiation, Denial of Service,
Information Disclosure and Elevation of Privilege
DevSecOps and Testing
Priorities:
• Compiling steps (dependencies)
• Framework analysis (like Spring)
• Pattern matching
• Control flow
• Data flow (e.g., untrusted inputs)
• Taint and string analysis
Static Analysis Security Testing (SAST)
OWASP Projects for SAST
• SonarQube (code quality)
• PHP, Java, JavaScript
• O2 (.NET and Windows)
• OWASP Web Application
Protection (PHP)
• Input validation
• SQLI, XSS, RFI, LFI, DT/PT, SCD,
OSC
Open Source SAST
• Bandit (Python)
• Brakeman and Codesake Dawn (Ruby)
• PMD, SpotBugs, and FindSecBugs
(Java)
• Flawfinder (C, C++,)
• LGTM (C, C++, Java, JS, TypeScrypt,
Python)
• Google CodeSearchDiggity (cloud)
• .NET Security Guard
• RIPS and phpcs (PHP)
• SonarQube & VisualCodeGrepper
(VCG)
Static Analysis Security Testing (SAST)
• Xray & Jira Test Management - Xray helps you manage your tests in an
organized way. It lets you create tests, group them into test sets, and
create test plans.
• Snyk - Snyk is a developer security platform. Integrating directly into
development tools, workflows, and automation pipelines.
Others We Like (Cprime Partners!)
• Validate ALL inputs
• Encode and Standardize Outputs
• Implement Authentication &
Authorization
• Manage Sessions Inside Trust
Boundaries
• Zero Trust?
• Enforce Access Control
• Implement updated Cryptography
• Handle Errors and Logs
• Protect Data
• Secure Communication Channels
• Update Systems, Secure by Default
• Secure Database Access
• Strict File Access
• Secure Memory Management
Secure Code & Secure Development Flyover
IAM Frameworks & Standards:
• Security Assertion Markup
Language (SAML 2.0)
• OpenID
• OAuth
• WS-Trust
• WS-Federation
IAM Vendors:
• Okta
• OneLogin
• Ping
• IBM IAA
• Microsoft Azure
• Oracle Identity CS
• Amazon
IAM
Should be used as a development building block, and a component of automation
• Repository access
• Artifacts signing
• Encrypt everywhere
• DB role provisioning
• Granular net access
• Storage assignment
• Monitoring & alerts
How Does IAM Enable Automation?
• Introduce changes that can be switched
on/off without a new release
• Validate hypothesis, testing in production
• Implement A/B Testing
• Watch relevant metrics
• Disable feature if it’s disruptive
Type of toggles:
• Toggle points: Breakpoints to switch
on/off
• Toggle router: Code that chooses what
code path is active for each runtime
thread.
• Toggle configuration: Provide context,
define expectation on what it does.
Requests might be an outcome from:
• Threat modeling
• Dependency check
• CVE publication
• Security incident
• Alarm triggered by logs or events
Favorite DevOps Deployment Patterns – Feature Toggles
• Usually implemented with
feature toggles
• Deploy to a reduced set of
users without notification
• Watch relevant metrics and
evaluate user behavior
Favorite DevOps Deployment Patterns – Dark Launches
• Data flows
• Trust boundaries
• Technical debt
• Refactoring monolithic
architecture
• Application security
testing
• Testing in parallel
• Mutation testing
• Staging
• Packages
• Infrastructure as secure
code
• Incident response
• Emergency drills
• Chaos engineering
• Game days
• Blue/green deployments
• Reliability engineering
• Monitoring and
observability
• Intelligent alerts
• AIOps
• Log management
• Policy, governance and
audit
• Coding for compliance
• Change management
• Segregation of duties
• Automating change
management
And So Much More…
• Checkbox compliance
• Security as gatekeeper of prod
• Hundreds or thousands of checks sent
back to dev teams
• 1 InfoSec expert per 10 Ops
• 1 InfoSec expert per 100 Devs
• Shift left
• Automate testing
• Self-service tools
• Quick feedback loops
• Security training
• Security by design
Key Takeaways
DevOps
Traditional Security
DevSecOps Training from Cprime
• DevSecOps Boot Camp
• Application Security with Snyk
• Fundamentals of Secure Application Development
• Enterprise Test Management with Xray
Custom Coding and Integration by Cprime Studios
Cprime Studios is the software product development division of Cprime. Using
agile working methods, we team up with businesses who want to turn ideas into
reality, from the design of the software product to development, infrastructure,
and scaling.
Key Takeaways
DevSecOps Tooling
Cprime can help you select the right tools for:
• Automated dependency checks
• Static application security testing
• Dynamic application security testing
• Fuzz testing
• Penetration testing
• Automated security attacks
Key Takeaways
Connect with our
speakers on LinkedIn
Check out Cprime
upcoming webinars,
read our blog,
download
whitepapers/case
studies & more:
cprime.com/resources
Share with us what
topics you are
interested in, ask us
questions or give us
feedback!
learn@cprime.com
Keep the Conversation Going…
Share in the conversation & keep updated on
thought leadership, events & more!
on LinkedIn, Twitter, Facebook, & YouTube
Follow Us on Social Media
QUESTIONS?
cprime.com | 877.800.5221
Thank You
cprime.com | 877.800.5221

More Related Content

What's hot

DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
NotSoSecure Global Services
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
Prashanth B. P.
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
Amazon Web Services
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
Sonatype
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
Priyanka Aash
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
abhimanyubhogwan
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Tomas Honzak
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Transforming Organizations with CI/CD
Transforming Organizations with CI/CDTransforming Organizations with CI/CD
Transforming Organizations with CI/CD
Cprime
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
Amazon Web Services
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Joel Divekar
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
Abdul_Mujeeb
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfianto
idsecconf
 
Introduction to CI/CD
Introduction to CI/CDIntroduction to CI/CD
Introduction to CI/CD
Steve Mactaggart
 

What's hot (20)

DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Transforming Organizations with CI/CD
Transforming Organizations with CI/CDTransforming Organizations with CI/CD
Transforming Organizations with CI/CD
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfianto
 
Introduction to CI/CD
Introduction to CI/CDIntroduction to CI/CD
Introduction to CI/CD
 

Similar to The What, Why, and How of DevSecOps

AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
David Lindner
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
Amazon Web Services
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?
Harry McLaren
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
Samuel Reed
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
Security Ninja
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
Steven Carlson
 
BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015Daniel Liber
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
Irina Kostina
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
Amazon Web Services
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
SoftServe
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
Kyos
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 

Similar to The What, Why, and How of DevSecOps (20)

AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 

More from Cprime

Achieving Sustainable Growth in the Digital Age
Achieving Sustainable Growth in the Digital AgeAchieving Sustainable Growth in the Digital Age
Achieving Sustainable Growth in the Digital Age
Cprime
 
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Cprime
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
 
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Cprime
 
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and AdoptionHarnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
Cprime
 
AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...
Cprime
 
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Cprime
 
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPTAI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
Cprime
 
From Project to Product - The Need for Speed
From Project to Product - The Need for SpeedFrom Project to Product - The Need for Speed
From Project to Product - The Need for Speed
Cprime
 
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product OwnerWe Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
Cprime
 
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPTHow to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
Cprime
 
Modern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your TeamsModern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your Teams
Cprime
 
Enterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and MarketingEnterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and Marketing
Cprime
 
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
Cprime
 
Perfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service ManagementPerfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service Management
Cprime
 
From Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to YouFrom Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to You
Cprime
 
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Cprime
 
6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them
Cprime
 
Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1
Cprime
 
How to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service ManagementHow to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service Management
Cprime
 

More from Cprime (20)

Achieving Sustainable Growth in the Digital Age
Achieving Sustainable Growth in the Digital AgeAchieving Sustainable Growth in the Digital Age
Achieving Sustainable Growth in the Digital Age
 
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
Mastering an Integrated Atlassian Tooling Ecosystem: Strategies, Success Stor...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
Improving IT Investment Decisions and Business Outcomes with Integrated Enter...
 
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and AdoptionHarnessing Atlassian's Power Through Cloud Transformation and Adoption
Harnessing Atlassian's Power Through Cloud Transformation and Adoption
 
AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...AI-powered Service Management: Streamlining Incident Management in JSM using ...
AI-powered Service Management: Streamlining Incident Management in JSM using ...
 
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
Enterprise Migration from Data Center to Atlassian Cloud: Start with an Asses...
 
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPTAI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
AI for Everyone: Demystifying Large Language Models (LLMs) Like ChatGPT
 
From Project to Product - The Need for Speed
From Project to Product - The Need for SpeedFrom Project to Product - The Need for Speed
From Project to Product - The Need for Speed
 
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product OwnerWe Need a Hero — How to Find and Support Your Next Superstar Product Owner
We Need a Hero — How to Find and Support Your Next Superstar Product Owner
 
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPTHow to Unlock Productivity and Innovation with Generative AI and ChatGPT
How to Unlock Productivity and Innovation with Generative AI and ChatGPT
 
Modern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your TeamsModern Learning for Enterprises: How to Empower Your Teams
Modern Learning for Enterprises: How to Empower Your Teams
 
Enterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and MarketingEnterprise Service Management for Finance, HR, and Marketing
Enterprise Service Management for Finance, HR, and Marketing
 
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
ESM Webinar Series Part 2 | The Keys to Optimal ESM are Automation and Integr...
 
Perfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service ManagementPerfecting Customer Management Using Jira Service Management
Perfecting Customer Management Using Jira Service Management
 
From Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to YouFrom Project to Product: Leaders, Here's What It Means to You
From Project to Product: Leaders, Here's What It Means to You
 
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
Using a Service Catalog and CMDB to Standardize Change Management in Jira Ser...
 
6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them6 Common Challenges RTEs Face & How to Solve Them
6 Common Challenges RTEs Face & How to Solve Them
 
Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1Enterprise Service Management Webinar Series Part 1
Enterprise Service Management Webinar Series Part 1
 
How to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service ManagementHow to Enable Change Management with Jira Service Management
How to Enable Change Management with Jira Service Management
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

The What, Why, and How of DevSecOps

  • 1. ©2022 Cprime, Inc. All rights reserved and no copying without express written permission. cprime.com | 877.800.5221
  • 2. The What, Why, and How of DevSecOps The time is now to shift left in security
  • 3. Chris Knotts Cprime Learning Product Director linkedin.com/in/chris-knotts/ Speaker
  • 4. 01 DevSecOps Prerequisites 02 Why DevSecOps? Foundations 03 Who is Responsible for DevSecOps? 04 Practical Tips for Getting Started 05 Keep the Conversation Going/Q&A Agenda
  • 6. • Leadership buy-in • Commitment to cultural change • Literacy and progress with DevOps • Collaboration across design roles, work intake processes, testing, security, development, and IT production staff DevSecOps Prerequisites
  • 9. Literacy and Progress With DevOps
  • 10. Collaboration Across Design Roles, Work Intake Processes, Testing, Security, Development, and IT Production Staff
  • 12. • Traditional systems and IT service development has relied on a plan-driven, phase-gated style of enterprise workflow. • This style of managing projects and products can work well for physical, mission-critical work, but doesn’t work well with software and IT systems. Agility
  • 13. • Furthermore, plan-driven work with a focus on requirements and documentation fails to take advantage of a few of software engineering’s greatest strengths. • Agility means quick, adaptive, responsive cycles of work…including a welcoming attitude towards changing requirements, emergent needs, and real- time customer feedback. Agility
  • 15. • Fundamentally, the DevOps movement is about understanding competing incentives • A lack of “systems thinking” means that goals tend to get optimized according to local, departmental goals • This dynamic has big implications for security, especially application security DevOps
  • 16. Originally defined in Continuous Delivery by Jez Humble and David Farley • CI/CD pipelines usually represent the practical execution of DevOps and technical agility concepts • The idea is to set up progressive layers of automation which force software/system features to “prove themselves” before progressing to the next step towards deployment Software Development Pipelines
  • 18. What is a “Shift Left”?
  • 19. Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Feedback? What is a “Shift Left”?
  • 20. Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Feedback? Shifting Left: Planning and Including Downstream Functions Earlier
  • 22. Security is fundamentally about understanding and managing risk
  • 23. …of movement …of actions …of decisions …protection against risk …safety (of job, of employer, of money, etc.) …defensibility against attack Security Freedom Security is fundamentally about understanding and managing risk
  • 24. Condition White • Most people live in this condition • You are in a relaxed state and are unaware of your surroundings • Avoid condition white! Condition Yellow • Still in a relaxed state, but are aware of what’s going on around you • Be cautious (not paranoid) • Learn to live in condition yellow!
  • 25. • More than 6,000 online criminal marketplaces sell ransomware products and services. (Source: McAfee) • 444,259 ransomware attacks took place worldwide in 2018. (Source: Statista) • As of 2020, Hackers create 300,000 new pieces of malware daily. (Source: McAfee) Important Data Points
  • 26. The bottom line: • Observe the growth since 2016 • $3.2 million – the average cost of a data breach in 2019 • $12 billion – the cost of business email compromise (BEC) in 2019 The World’s Biggest Data Breaches, as of 2020
  • 27. YOU, the user, are the weakest link in any enterprise’s security.
  • 28. Part 3 Who is responsible for DevSecOps?
  • 31. Feedback: Measurement, improvement Requirements /Design Dev Testing & QA Release/ Deploy Ops & Maintenance Feature or business need Delivery Security DevSecOps Roles
  • 32. Part 4 Practical tips for getting started
  • 33. Risk identification and classification Factors and their probabilities Impact estimation Risk severity What should be fixed and when Five places where you should look for risk: 1. Encryption 2. Authentication 3. Logging 4. Asset management 5. Zoning and containment Risk Review
  • 34. Threat Factors: • Skill level • Motive • Opportunity • Size Vulnerability Factors: • Ease of discovery • Ease of exploit • Awareness • Intrusion detection Risk Review
  • 35. Business Impact Factors: • Financial damage • Reputation damage • Non-compliance • Privacy violation Technical Impact Factors: • Confidentiality • Integrity • Availability • Accountability Risk Review
  • 36. Prioritize Testing for Risk • Identify assets • Identify threats • Identify vulnerabilities Prioritize vulnerabilities using methods : • Damage, reproducibility, exploitability, affected users, and discoverability (DREAD) • Spoofing, Tampering, Repudiation, Denial of Service, Information Disclosure and Elevation of Privilege DevSecOps and Testing
  • 37. Priorities: • Compiling steps (dependencies) • Framework analysis (like Spring) • Pattern matching • Control flow • Data flow (e.g., untrusted inputs) • Taint and string analysis Static Analysis Security Testing (SAST)
  • 38. OWASP Projects for SAST • SonarQube (code quality) • PHP, Java, JavaScript • O2 (.NET and Windows) • OWASP Web Application Protection (PHP) • Input validation • SQLI, XSS, RFI, LFI, DT/PT, SCD, OSC Open Source SAST • Bandit (Python) • Brakeman and Codesake Dawn (Ruby) • PMD, SpotBugs, and FindSecBugs (Java) • Flawfinder (C, C++,) • LGTM (C, C++, Java, JS, TypeScrypt, Python) • Google CodeSearchDiggity (cloud) • .NET Security Guard • RIPS and phpcs (PHP) • SonarQube & VisualCodeGrepper (VCG) Static Analysis Security Testing (SAST)
  • 39. • Xray & Jira Test Management - Xray helps you manage your tests in an organized way. It lets you create tests, group them into test sets, and create test plans. • Snyk - Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines. Others We Like (Cprime Partners!)
  • 40. • Validate ALL inputs • Encode and Standardize Outputs • Implement Authentication & Authorization • Manage Sessions Inside Trust Boundaries • Zero Trust? • Enforce Access Control • Implement updated Cryptography • Handle Errors and Logs • Protect Data • Secure Communication Channels • Update Systems, Secure by Default • Secure Database Access • Strict File Access • Secure Memory Management Secure Code & Secure Development Flyover
  • 41. IAM Frameworks & Standards: • Security Assertion Markup Language (SAML 2.0) • OpenID • OAuth • WS-Trust • WS-Federation IAM Vendors: • Okta • OneLogin • Ping • IBM IAA • Microsoft Azure • Oracle Identity CS • Amazon IAM Should be used as a development building block, and a component of automation
  • 42. • Repository access • Artifacts signing • Encrypt everywhere • DB role provisioning • Granular net access • Storage assignment • Monitoring & alerts How Does IAM Enable Automation?
  • 43. • Introduce changes that can be switched on/off without a new release • Validate hypothesis, testing in production • Implement A/B Testing • Watch relevant metrics • Disable feature if it’s disruptive Type of toggles: • Toggle points: Breakpoints to switch on/off • Toggle router: Code that chooses what code path is active for each runtime thread. • Toggle configuration: Provide context, define expectation on what it does. Requests might be an outcome from: • Threat modeling • Dependency check • CVE publication • Security incident • Alarm triggered by logs or events Favorite DevOps Deployment Patterns – Feature Toggles
  • 44. • Usually implemented with feature toggles • Deploy to a reduced set of users without notification • Watch relevant metrics and evaluate user behavior Favorite DevOps Deployment Patterns – Dark Launches
  • 45. • Data flows • Trust boundaries • Technical debt • Refactoring monolithic architecture • Application security testing • Testing in parallel • Mutation testing • Staging • Packages • Infrastructure as secure code • Incident response • Emergency drills • Chaos engineering • Game days • Blue/green deployments • Reliability engineering • Monitoring and observability • Intelligent alerts • AIOps • Log management • Policy, governance and audit • Coding for compliance • Change management • Segregation of duties • Automating change management And So Much More…
  • 46. • Checkbox compliance • Security as gatekeeper of prod • Hundreds or thousands of checks sent back to dev teams • 1 InfoSec expert per 10 Ops • 1 InfoSec expert per 100 Devs • Shift left • Automate testing • Self-service tools • Quick feedback loops • Security training • Security by design Key Takeaways DevOps Traditional Security
  • 47. DevSecOps Training from Cprime • DevSecOps Boot Camp • Application Security with Snyk • Fundamentals of Secure Application Development • Enterprise Test Management with Xray Custom Coding and Integration by Cprime Studios Cprime Studios is the software product development division of Cprime. Using agile working methods, we team up with businesses who want to turn ideas into reality, from the design of the software product to development, infrastructure, and scaling. Key Takeaways
  • 48. DevSecOps Tooling Cprime can help you select the right tools for: • Automated dependency checks • Static application security testing • Dynamic application security testing • Fuzz testing • Penetration testing • Automated security attacks Key Takeaways
  • 49. Connect with our speakers on LinkedIn Check out Cprime upcoming webinars, read our blog, download whitepapers/case studies & more: cprime.com/resources Share with us what topics you are interested in, ask us questions or give us feedback! learn@cprime.com Keep the Conversation Going…
  • 50. Share in the conversation & keep updated on thought leadership, events & more! on LinkedIn, Twitter, Facebook, & YouTube Follow Us on Social Media
  • 51. QUESTIONS? cprime.com | 877.800.5221 Thank You cprime.com | 877.800.5221