SlideShare a Scribd company logo
5
Most read
6
Most read
10
Most read
Presented By:
Sudeep James Tirkey
DevSecOps: Security
with DevOps
Our Agenda
01 What is DevSecOps
02 Why DevSecOps
03 Benefits of DevSecOps
04 DevSecOps Lifecycle
05 Demo
● DevSecOps is the philosophy of integrating security practices within the DevOps
process.
● DevSecOps involves creating a ‘Security as Code’ culture with ongoing, flexible
collaboration between release engineers and security teams.
● DevSecOps movement, like DevOps itself, is focused on creating new solutions for
complex software development processes within an agile framework.
● The goal is to bridge traditional gaps between IT Operations and security while
ensuring fast, safe delivery of code.
What is DevSecOps
● The enterprise IT paradox: Go faster and innovate – but always stay secure.
● Security threats are multiplying exponentially. Too often, until a breach occurs,
security is an afterthought in the Software Development Cycle.
● In its “State of Cloud Security” report, the Cloud Security Alliance (CSA)
acknowledged a significant skills gap in cloud security.
● DevSecOps can reduce the costs associated with fixing security flaws, by building
security into every stage of the development process, from the requirement stage
onwards.
Why DevSecOps?
Difference between DevOps and DevSecOps
● Cost reduction is achieved by detecting and fixing security issues during the
development phases which also increases the speed of delivery.
● Threat hunting can avoid bad publicity, and therefore can potentially increase
sales. It is obviously easier to sell a secure product.
● Speed of recovery is enhanced in the case of a security incident by utilising
templates and pet/cattle methodology.
● Security auditing, monitoring, and notification systems are managed and deployed
so that they can be continuously enhanced, to keep in step with the frantic
innovation intrinsic to cybercrime.
Benefits of DevSecOps
● We develop software with Spark.
● Your data becomes SQL.
● Spark SQL allows you to query structured data from many sources.
Examples
● Hardcoding credentials into your source code.
● Hardcoding credentials into your Dockerfile.
● Using environment variables as a crutch for passing secrets.
○ Environment variables are available to each process in the container.
○ You also risk leaking passwords via logs and various dashboards.
Examples
● Think of scenarios such as using a shared message queue between services
○ Who can publish to topics?
○ Who can publish to specific partitions (ie- Kafka)
○ Who else can consume your data?
● Who administers the topics? Who approves access?
● Producer:
kafka-console-producer.sh --broker-list localhost:9092 --topic creditcard-stuff
This is a credit card # xxxxxxxxxxxxxxx
This is a credit card # yyyyyyyyyyyyyyy
● Consumer:
kafka-console-consumer.sh --bootstrap-server localhost:9092 --topic creditcard-
stuff --from-beginning
Examples
DevSecOps Lifecycle
References
● https://cloudsecurityalliance.org/
● https://www.devsecops.org/
● https://www.redhat.com/en/topics/devops/what-is-devsecops
Thank You !

More Related Content

PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
DevSecOps What Why and How
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
Demystifying DevSecOps
PPTX
ABN AMRO DevSecOps Journey
PDF
Introduction to DevSecOps
PDF
DevSecOps | DevOps Sec
DevSecOps: What Why and How : Blackhat 2019
DevSecOps What Why and How
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Demystifying DevSecOps
ABN AMRO DevSecOps Journey
Introduction to DevSecOps
DevSecOps | DevOps Sec

What's hot (20)

PDF
2019 DevSecOps Reference Architectures
PDF
DevSecOps Implementation Journey
PPTX
How to Get Started with DevSecOps
PDF
Practical DevSecOps - Arief Karfianto
PDF
The State of DevSecOps
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Practical DevSecOps Course - Part 1
PDF
DevOps Best Practices
PPTX
DevSecOps reference architectures 2018
PDF
DevOps introduction
PDF
DevSecOps
PDF
DevSecOps and the CI/CD Pipeline
PPTX
What is DevOps? | DevOps Introduction | DevOps Tools | DevOps Tutorial For Be...
PPTX
DevOps to DevSecOps Journey..
PDF
How to implement DevOps in your Organization
PDF
DevSecOps The Evolution of DevOps
PDF
DevOps
PPTX
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
PPTX
2019 DevSecOps Reference Architectures
DevSecOps Implementation Journey
How to Get Started with DevSecOps
Practical DevSecOps - Arief Karfianto
The State of DevSecOps
DevSecOps Jenkins Pipeline -Security
Practical DevSecOps Course - Part 1
DevOps Best Practices
DevSecOps reference architectures 2018
DevOps introduction
DevSecOps
DevSecOps and the CI/CD Pipeline
What is DevOps? | DevOps Introduction | DevOps Tools | DevOps Tutorial For Be...
DevOps to DevSecOps Journey..
How to implement DevOps in your Organization
DevSecOps The Evolution of DevOps
DevOps
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Ad

Similar to DevSecOps: Security With DevOps (20)

PDF
Why is The IT industry moving towards a DevSecOps approach?
PDF
Understanding DevOps Security - Full Guide
PDF
understanding devops security - DevSecOps
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
DOCX
DevSecOps – The Importance of DevOps Security in 2023.docx
DOCX
The Importance of DevOps Security in 2023.docx
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PPTX
DevSecOps: Integrating Security Into Your SDLC
PPTX
Why You Should Implement DevSecOps Approach?
PDF
Why You Should Implement DevSecOps Approach?
PDF
AWS live hack: Docker + Snyk Container on AWS
PDF
FedScoop Public Sector Innovation Summit DOD Enterprise DevSecOps Initiative ...
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DOCX
DevSecOps - offpage blog final draft - 03.docx
PDF
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
PDF
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
PDF
Choosing the Right DevOps Service Provider_ Why Drish Infotech Stands Out.pdf
PDF
DevSecOps - Background, Status and Future Challenges
Why is The IT industry moving towards a DevSecOps approach?
Understanding DevOps Security - Full Guide
understanding devops security - DevSecOps
From DevOps to DevSecOps: Evolution of Secure Software Development
DevSecOps – The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
DevSecOps: Integrating Security Into Your SDLC
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
AWS live hack: Docker + Snyk Container on AWS
FedScoop Public Sector Innovation Summit DOD Enterprise DevSecOps Initiative ...
DevSecOps: Integrating Security Into DevOps! {Business Security}
Pentest is yesterday, DevSecOps is tomorrow
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DevSecOps - offpage blog final draft - 03.docx
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Choosing the Right DevOps Service Provider_ Why Drish Infotech Stands Out.pdf
DevSecOps - Background, Status and Future Challenges
Ad

More from Knoldus Inc. (20)

PPTX
Angular Hydration Presentation (FrontEnd)
PPTX
Optimizing Test Execution: Heuristic Algorithm for Self-Healing
PPTX
Self-Healing Test Automation Framework - Healenium
PPTX
Kanban Metrics Presentation (Project Management)
PPTX
Java 17 features and implementation.pptx
PPTX
Chaos Mesh Introducing Chaos in Kubernetes
PPTX
GraalVM - A Step Ahead of JVM Presentation
PPTX
Nomad by HashiCorp Presentation (DevOps)
PPTX
Nomad by HashiCorp Presentation (DevOps)
PPTX
DAPR - Distributed Application Runtime Presentation
PPTX
Introduction to Azure Virtual WAN Presentation
PPTX
Introduction to Argo Rollouts Presentation
PPTX
Intro to Azure Container App Presentation
PPTX
Insights Unveiled Test Reporting and Observability Excellence
PPTX
Introduction to Splunk Presentation (DevOps)
PPTX
Code Camp - Data Profiling and Quality Analysis Framework
PPTX
AWS: Messaging Services in AWS Presentation
PPTX
Amazon Cognito: A Primer on Authentication and Authorization
PPTX
ZIO Http A Functional Approach to Scalable and Type-Safe Web Development
PPTX
Managing State & HTTP Requests In Ionic.
Angular Hydration Presentation (FrontEnd)
Optimizing Test Execution: Heuristic Algorithm for Self-Healing
Self-Healing Test Automation Framework - Healenium
Kanban Metrics Presentation (Project Management)
Java 17 features and implementation.pptx
Chaos Mesh Introducing Chaos in Kubernetes
GraalVM - A Step Ahead of JVM Presentation
Nomad by HashiCorp Presentation (DevOps)
Nomad by HashiCorp Presentation (DevOps)
DAPR - Distributed Application Runtime Presentation
Introduction to Azure Virtual WAN Presentation
Introduction to Argo Rollouts Presentation
Intro to Azure Container App Presentation
Insights Unveiled Test Reporting and Observability Excellence
Introduction to Splunk Presentation (DevOps)
Code Camp - Data Profiling and Quality Analysis Framework
AWS: Messaging Services in AWS Presentation
Amazon Cognito: A Primer on Authentication and Authorization
ZIO Http A Functional Approach to Scalable and Type-Safe Web Development
Managing State & HTTP Requests In Ionic.

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
history of c programming in notes for students .pptx
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
ISO 45001 Occupational Health and Safety Management System
PPTX
L1 - Introduction to python Backend.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
medical staffing services at VALiNTRY
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PTS Company Brochure 2025 (1).pdf.......
How to Choose the Right IT Partner for Your Business in Malaysia
history of c programming in notes for students .pptx
Online Work Permit System for Fast Permit Processing
ISO 45001 Occupational Health and Safety Management System
L1 - Introduction to python Backend.pptx
Understanding Forklifts - TECH EHS Solution
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
2025 Textile ERP Trends: SAP, Odoo & Oracle
Wondershare Filmora 15 Crack With Activation Key [2025
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
How Creative Agencies Leverage Project Management Software.pdf
Design an Analysis of Algorithms II-SECS-1021-03
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
medical staffing services at VALiNTRY
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
CHAPTER 2 - PM Management and IT Context

DevSecOps: Security With DevOps

  • 1. Presented By: Sudeep James Tirkey DevSecOps: Security with DevOps
  • 2. Our Agenda 01 What is DevSecOps 02 Why DevSecOps 03 Benefits of DevSecOps 04 DevSecOps Lifecycle 05 Demo
  • 3. ● DevSecOps is the philosophy of integrating security practices within the DevOps process. ● DevSecOps involves creating a ‘Security as Code’ culture with ongoing, flexible collaboration between release engineers and security teams. ● DevSecOps movement, like DevOps itself, is focused on creating new solutions for complex software development processes within an agile framework. ● The goal is to bridge traditional gaps between IT Operations and security while ensuring fast, safe delivery of code. What is DevSecOps
  • 4. ● The enterprise IT paradox: Go faster and innovate – but always stay secure. ● Security threats are multiplying exponentially. Too often, until a breach occurs, security is an afterthought in the Software Development Cycle. ● In its “State of Cloud Security” report, the Cloud Security Alliance (CSA) acknowledged a significant skills gap in cloud security. ● DevSecOps can reduce the costs associated with fixing security flaws, by building security into every stage of the development process, from the requirement stage onwards. Why DevSecOps?
  • 6. ● Cost reduction is achieved by detecting and fixing security issues during the development phases which also increases the speed of delivery. ● Threat hunting can avoid bad publicity, and therefore can potentially increase sales. It is obviously easier to sell a secure product. ● Speed of recovery is enhanced in the case of a security incident by utilising templates and pet/cattle methodology. ● Security auditing, monitoring, and notification systems are managed and deployed so that they can be continuously enhanced, to keep in step with the frantic innovation intrinsic to cybercrime. Benefits of DevSecOps
  • 7. ● We develop software with Spark. ● Your data becomes SQL. ● Spark SQL allows you to query structured data from many sources. Examples
  • 8. ● Hardcoding credentials into your source code. ● Hardcoding credentials into your Dockerfile. ● Using environment variables as a crutch for passing secrets. ○ Environment variables are available to each process in the container. ○ You also risk leaking passwords via logs and various dashboards. Examples
  • 9. ● Think of scenarios such as using a shared message queue between services ○ Who can publish to topics? ○ Who can publish to specific partitions (ie- Kafka) ○ Who else can consume your data? ● Who administers the topics? Who approves access? ● Producer: kafka-console-producer.sh --broker-list localhost:9092 --topic creditcard-stuff This is a credit card # xxxxxxxxxxxxxxx This is a credit card # yyyyyyyyyyyyyyy ● Consumer: kafka-console-consumer.sh --bootstrap-server localhost:9092 --topic creditcard- stuff --from-beginning Examples
  • 11. References ● https://cloudsecurityalliance.org/ ● https://www.devsecops.org/ ● https://www.redhat.com/en/topics/devops/what-is-devsecops