Zero to Ninety in Securing DevOps
J Wolfgang Goerlich
VP Strategic Programs, CBI
CIO CISO
Dev AppSecDevOps
Developers Security
It takes two years for
technology to go from
builders to breakers.
Relationships
Perception
Competency
Deliver Wins
DevSecOps
Learn
Assess
Plan
DevSecOps
Learn
Assess
Plan
Are we really doing
DevOps? Really?
Ad Hoc
Defined
Optimized
Ad Hoc
Defined
Optimized
DevOps
What are our levels
of maturity?
What is the CI/CD pipeline?
Wait … pipelines?
Who’s who?
Establish
relationships.
Wins
• Directory of people
• Inventory of DevOps’d apps
• Inventory of CI/CD pipelines
• Stay alive (task and stress management)
DevSecOps
Learn
Assess
Plan
Code
Review
SCA
Don’t go
too fast.
Assess.
Don’t audit.
(No one likes auditors)
Build a
Checklist.
Hug a Checklist
• NIST SP 800-64 Development Lifecycle
• NIST SP 800-190 Container Security
• ISO 27002 (Yeah, I know)
• ISO 27034 Application Security
• CSA Guidance 4.0 Application Security
• BSIMM, SAMM Maturity
And the most important checklist of them
all … the one from the Customers.
Follow the money.
Assess and?
Build
relationships.
Wins
• Find a champion Advisory council
• Find a pilot pipeline Business case
• Define a maturity model Security backlog
• Still alive (task and stress management)
DevSecOps
Learn
Assess
Plan
Threat
Model Vuln
Measure success.
Define metrics.
Create a culture of quality and security
one line of code at a time
30
90
60
Security as a Product
Security as a Product
• Features: Security Requirements
• Process: Borrow from DevOps
• Experience: Borrow from UXD
Apply industrial design principles and
DevOps methods to build our product
Wins
• Innovators and adopters Advisory council
• Pipeline security feature Business case
• Communicate roadmap Security backlog
• Alive! So alive. And kicking!
DevSecOps
Learn
Assess
Plan
Relationships
Perception
Competency
Deliver Wins
DevSecOps
Learn
Assess
Plan
Follow the Money
Build a Backlog
Define Success
Implement, Iterate
J Wolfgang Goerlich
VP Strategic Programs, CBI
@jwgoerlich
https://jwgoerlich.com
Thank you.
Zero to Ninety in Securing DevOps

Zero to Ninety in Securing DevOps