SlideShare a Scribd company logo
8 Tips for8 Tips for
DeployingDeploying
DevSecOpsDevSecOps
#1 Embrace
automation
■ Prepare security and risk
management teams for
automated integration with
DevOps initiatives, and identify
the primary skills and technology
gaps.
AUTOMATION IN 2020
IS KEY
■ “Shift left” and make security
testing tools and processes
available earlier in the
development process, ideally as
the developers are writing code.
PROACTIVE DEVOPS
#2 Enable Security
Tools Sooner
#3 Auto-
triage
critical
issues first
■ As zero vulnerability
applications aren’t possible,
favor automated tools with
fast turnaround times with a
focus on reducing false
positives and allowing
developers to concentrate on
the most critical
vulnerabilities first.
PRIORITIZE
ALERTS
#4 Jump start with
3rd party leaks (OSS
& SDKs)
■ Start identifying OSS components and
vulnerabilities in development as a high-priority
project, as the biggest risk comes from known
vulnerabilities and misconfigurations.
JUMPSTART DEVSECOPS
#5 APIs and CI/CD
integrations is a MUST
■ Invest in “out of the box” integration with common
development toolchain vendors and also support full API
enablement of their offerings for automation.
CONNECT YOUR TOOLS
#6 DevOps
orchestration for
policy enforcement
■ Require security controls to understand and be
capable of applying security policies in container and
Kubernetes-based development and deployment
environments.
AUTOMATED
WORKFLOWS
#7 Public cloud scripting
drives auto-remediation
■ Experiment with DevSecOps workflows using public cloud
infrastructure and programmatic ways that security policies can
be integrated into templates, blueprints and recipes to avoid
manual security policy configuration.
CUT DOWN ON MANUAL
TASKS
#8 Continuously auto-scan in
pre-production to save your
apps in production
■ Favor offerings that can link scanning in
development (including containers) to correct
configuration and protection at runtime. manual
security policy configuration.
BE EFFICIENT
Sign up for your
DevSecOps
Starter kit today.

More Related Content

PPTX
How to Get Started with DevSecOps
PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
Dev secops. Real experience.
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DOCX
10 things to get right for successful dev secops
PPTX
DevSecOps : an Introduction
How to Get Started with DevSecOps
DevSecOps : The Open Source Way by Yusuf Hadiwinata
Dev secops security and compliance at the speed of continuous delivery - owasp
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Dev secops. Real experience.
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
10 things to get right for successful dev secops
DevSecOps : an Introduction

What's hot (20)

PDF
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
PDF
Dos and Don'ts of DevSecOps
PPTX
ABN AMRO DevSecOps Journey
PPTX
Implementing an Application Security Pipeline in Jenkins
PDF
DevSecOps | DevOps Sec
PDF
PIACERE - DevSecOps Automated
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PPT
Code Quality - Security
PDF
Barriers to Container Security and How to Overcome Them
PDF
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
PPTX
DevSecOps
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
Introduction to DevSecOps
PDF
Zero to Ninety in Securing DevOps
PDF
DevSecOps and the CI/CD Pipeline
PDF
Practical DevSecOps Course - Part 1
PDF
DevSecOps: Minimizing Risk, Improving Security
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
PDF
DevSecOps - The big picture
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
Dos and Don'ts of DevSecOps
ABN AMRO DevSecOps Journey
Implementing an Application Security Pipeline in Jenkins
DevSecOps | DevOps Sec
PIACERE - DevSecOps Automated
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Code Quality - Security
Barriers to Container Security and How to Overcome Them
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
DevSecOps
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Introduction to DevSecOps
Zero to Ninety in Securing DevOps
DevSecOps and the CI/CD Pipeline
Practical DevSecOps Course - Part 1
DevSecOps: Minimizing Risk, Improving Security
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps - The big picture
Ad

Similar to 8 Tips for Deploying DevSecOps (20)

PPTX
DevSecOps: Integrating Security Into Your SDLC
PDF
_Best practices towards a well-polished DevSecOps environment (1).pdf
PDF
DevOps and Devsecops- Everything you need to know.
PDF
Security's DevOps Transformation
PDF
DevOps and Devsecops- What are the Differences.
PDF
DevOps and Devsecops.pdf
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
PDF
Collaborative security : Securing open source software
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
Application Security Services | ProCern Technology
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
DevOps and Devsecops What are the Differences.pdf
PPTX
Navigating agile automotive software development
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
PDF
Top 5 best practice for delivering secure in-vehicle software
PPTX
DevSecOps Powerpoint Presentation for Students
PPTX
Create code confidence for better application security
PDF
AppSec How-To: Achieving Security in DevOps
PDF
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
DevSecOps: Integrating Security Into Your SDLC
_Best practices towards a well-polished DevSecOps environment (1).pdf
DevOps and Devsecops- Everything you need to know.
Security's DevOps Transformation
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops.pdf
Pentest is yesterday, DevSecOps is tomorrow
10 Tips to Keep Your Software a Step Ahead of the Hackers
Collaborative security : Securing open source software
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Application Security Services | ProCern Technology
Outpost24 webinar - application security in a dev ops world-08-2018
DevOps and Devsecops What are the Differences.pdf
Navigating agile automotive software development
DevSecOps: Integrating Security Into DevOps! {Business Security}
Top 5 best practice for delivering secure in-vehicle software
DevSecOps Powerpoint Presentation for Students
Create code confidence for better application security
AppSec How-To: Achieving Security in DevOps
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Ad

More from Felicia Haggarty (8)

PDF
Yarn presentation - DFW CUG - December 2015
PDF
Building a system for machine and event-oriented data - SF HUG Nov 2015
PDF
Kudu austin oct 2015.pptx
PPTX
IoT Austin CUG talk
PPTX
SFHUG Kudu Talk
PDF
Impala tech-talk by Dimitris Tsirogiannis
PDF
Data revolution by Doug Cutting
PDF
Whither the Hadoop Developer Experience, June Hadoop Meetup, Nitin Motgi
Yarn presentation - DFW CUG - December 2015
Building a system for machine and event-oriented data - SF HUG Nov 2015
Kudu austin oct 2015.pptx
IoT Austin CUG talk
SFHUG Kudu Talk
Impala tech-talk by Dimitris Tsirogiannis
Data revolution by Doug Cutting
Whither the Hadoop Developer Experience, June Hadoop Meetup, Nitin Motgi

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

8 Tips for Deploying DevSecOps

  • 1. 8 Tips for8 Tips for DeployingDeploying DevSecOpsDevSecOps
  • 2. #1 Embrace automation ■ Prepare security and risk management teams for automated integration with DevOps initiatives, and identify the primary skills and technology gaps. AUTOMATION IN 2020 IS KEY
  • 3. ■ “Shift left” and make security testing tools and processes available earlier in the development process, ideally as the developers are writing code. PROACTIVE DEVOPS #2 Enable Security Tools Sooner
  • 4. #3 Auto- triage critical issues first ■ As zero vulnerability applications aren’t possible, favor automated tools with fast turnaround times with a focus on reducing false positives and allowing developers to concentrate on the most critical vulnerabilities first. PRIORITIZE ALERTS
  • 5. #4 Jump start with 3rd party leaks (OSS & SDKs) ■ Start identifying OSS components and vulnerabilities in development as a high-priority project, as the biggest risk comes from known vulnerabilities and misconfigurations. JUMPSTART DEVSECOPS
  • 6. #5 APIs and CI/CD integrations is a MUST ■ Invest in “out of the box” integration with common development toolchain vendors and also support full API enablement of their offerings for automation. CONNECT YOUR TOOLS
  • 7. #6 DevOps orchestration for policy enforcement ■ Require security controls to understand and be capable of applying security policies in container and Kubernetes-based development and deployment environments. AUTOMATED WORKFLOWS
  • 8. #7 Public cloud scripting drives auto-remediation ■ Experiment with DevSecOps workflows using public cloud infrastructure and programmatic ways that security policies can be integrated into templates, blueprints and recipes to avoid manual security policy configuration. CUT DOWN ON MANUAL TASKS
  • 9. #8 Continuously auto-scan in pre-production to save your apps in production ■ Favor offerings that can link scanning in development (including containers) to correct configuration and protection at runtime. manual security policy configuration. BE EFFICIENT
  • 10. Sign up for your DevSecOps Starter kit today.