SlideShare a Scribd company logo
Application Security in a DevOps World
Peter Chestna
DST37T
DEVSECOPS
Director of Developer Engagement
Veracode
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of This Presentation
3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Who am I?
• 25+ Years Software Development Experience
• 11+ Years Application Security Experience
• Certified Agile Product Owner and Scrum Master
• At Veracode since 2006
• From Waterfall to Agile to DevOps
• From Monolith to MicroService
• Consultant on DevSecOps best practices
• Fun Fact: I love whiskey!
• Tell me where to drink local whiskey
@PeteChestna
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Goals
 Why is AppSec important?
 How is DevOps changing application development?
 How is AppSec traditionally done?
 What needs to change?
– What to build
– What to measure
– How to help
5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Applications Are as Risky as Ever
of all applications used some kind of hard-coded password
of all applications use broken or risky cryptographic algorithms
of all applications were vulnerable to open redirect attacks
of all applications mix trusted and untrusted data in the same
data structure or message
39%
35%
28%
16%
6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Lack of App Security is Damaging Companies
7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
High Profile Breaches Through the App Layer
How: Vulnerability on
website built and
maintained by third-party
vendor in support of a
charity.
Result: Usernames and
passwords for 76 million
households and 7 million
business were stolen.
Financial
Institution
How: Hackers exploited a
known vulnerability in an
open source component
Result: Social Security
Numbers and personal data
for more than 143 million
Americans stolen. Three
executives lose their jobs.
Financial
Institution
How: Targeted a flaw in
OpenSSL, CVE-2014-0160,
better known as Heartbleed
Result: The theft of Social
Security Numbers and other
personal data belonging to
4.5 million patients
Healthcare
Provider
How: Sophisticated kill
chain including exploitation
of vulnerable web
application
Result: Hackers stole
names, mailing addresses,
phone numbers and email
addresses for more than 70
million shoppers
Retailer
8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Business Mandate
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Compressed Timelines & Smaller Teams
Waterfall Agile DevOps
1-4 Releases
Per Year
12-24 Releases
Per Year
100+ Releases
Per Year
50+ people 6-12 people 6-12 people
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Waterfall
Technology
Agile
DevOps
11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Definition of DevOps
12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What’s a DevOps Team?
DevOps Team
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DevOps – Process: Where is security?
Security
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agile – Process for DevOps
Copyright 2005, Mountain Goat Software
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Is this your current AppSec program?
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
They/We know it’s coming…
17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Which outcome do you see?
@PeteChestna
18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy
 Relationship & Accountability
 Integration & Automation
 Training & Remediation
Coaching
 Security Champions
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy - Relationships
 Who is your peer in
development/security?
 Do you meet with them?
 Do you understand each
others goals?
 Are you sympathetic to
each others struggles?
20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy – Accountability
 Shared between
development and security
 Part of annual goals
for both teams
 Measured and
reported regularly
21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CI
CD
1
Develop
4
Check in
Static
Analysis
3
Build
& Test
2
Backlog
Strategy – Integration & Automation
Pass?
7
Synchronize
No Yes
7
Deploy to
QA/Stage
6
Static
Analysis
6
Unit
Tests
8
Dynamic
Analysis
8
Regression
Testing
Pass?
Yes
Stage
then
Prod
Per
Check-in
5
Build
CI/CD
Pipeline
3a
Manual
Testing*
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy – Training
 Security teams can help developers by providing training, either through eLearning or
in-person instructor-led training
 Think about targeted training based on policy violations
CA Veracode State of Software Security 2017
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy - Training
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy – Remediation Coaching
@PeteChestna
CA Veracode State of Software Security 2017
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Strategy – Security Champions
 Eyes and ears of security
 Specialized training
– Basic security concepts
– Threat modeling
– Grooming guidelines
– Secure code review training
– Security controls
– CTF Exercises
 Escalate when necessary
26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Static Application Security Testing + 3rd Party Risk Analysis
Remediation and Mitigation Guidance
Secure Code Reviews
Manual Penetration Testing
Red Team Activities
Dynamic Application Security Testing
Plan Code Build Test Stage Deploy Monitor
Threat Modeling
Security Grooming
Secure Design
Strategy - DevOps (Shift Left & Monitor)
Runtime Application Self Protection
Training (eLearning, instructor led, metadata driven)
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Bridge the Gap Between Development and Security
1. Scan early & often
2. Integrate & automate
3. Take Training
4. Request Remediation
Guidance
5. Be a security champion
Development Security
1. Be involved in all phases
2. Define & explain policy
3. Provide Targeted Training
4. Provide Remediation
Guidance
5. Recruit & train champions
28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Recommended Sessions
SESSION # TITLE DATE/TIME
DST43T
The CA Technologies Veracode Platform: 360
Degree View of Your Application’s Security
11/15/2017 at 12:45 pm
DST50T How Components Increase Speed & Risk 11/15/2017 at 1:45 pm
DST40T
Scale Your Application Security Program Effectively
with the Right Program Management Model
11/15/2017 at 3:30 pm
DST41T DevOps: Security’s Chance to Get It Right 11/16/2017 at 12:45 pm
29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Must See Demos
Securing
Apps from Dev
to Production CA Veracode Static Analysis
CA Veracode Greenlight
CA Veracode Remediation
Guidance
Manage
Your
Software Risk
Open Sourced Component
Scanning
Developer Training on Secure
Coding
Integrations into Your Dev Tools
301 Manage
Your
Software Risk
CA Veracode Static Analysis
CA Veracode Web Application
Scanning
CA Veracode Greenlight
CA Veracode Static Analysis
CA Veracode Greenlight
CA Veracode Remediation
Guidance
506P 509P
DevOps-CD SecuritySecurity
30 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at https://community.veracode.com
Thank you.
31 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DevSecOps
For more information on DevSecOps,
please visit: http://cainc.to/CAW17-DevSecOps

More Related Content

PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
PDF
DevSecOps - Building continuous security into it and app infrastructures
PDF
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Securing 100 products - How hard can it be?
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Lessons from a recovering runtime application self protection addict
PDF
Dev week cloud world conf2021
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
DevSecOps - Building continuous security into it and app infrastructures
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Webinar – Risk-based adaptive DevSecOps
Securing 100 products - How hard can it be?
Webinar–Best Practices for DevSecOps at Scale
Lessons from a recovering runtime application self protection addict
Dev week cloud world conf2021

What's hot (20)

PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
How to transform developers into security people
PDF
Practical appsec lessons learned in the age of agile and DevOps
PDF
Empowering Financial Institutions to Use Open Source With Confidence
PDF
Collaborative security : Securing open source software
PPTX
Veracode - Inglês
PPTX
DevOps and the Future of Enterprise Security
PPTX
Practical DevSecOps Using Security Instrumentation
PPTX
Ten Tenets of CISO Success
PDF
Zero to Ninety in Securing DevOps
PDF
Demystifying DevSecOps
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PDF
DevSecOps: A New Hope for Security in CI/CD
PDF
When You Test Matters: Why Testing Early in the SDLC is Important
PPTX
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
PDF
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
A worldwide journey to build a secure development environment
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PPTX
A journey from dev ops to devsecops
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
How to transform developers into security people
Practical appsec lessons learned in the age of agile and DevOps
Empowering Financial Institutions to Use Open Source With Confidence
Collaborative security : Securing open source software
Veracode - Inglês
DevOps and the Future of Enterprise Security
Practical DevSecOps Using Security Instrumentation
Ten Tenets of CISO Success
Zero to Ninety in Securing DevOps
Demystifying DevSecOps
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps: A New Hope for Security in CI/CD
When You Test Matters: Why Testing Early in the SDLC is Important
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Bridging the Security Testing Gap in Your CI/CD Pipeline
A worldwide journey to build a secure development environment
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
A journey from dev ops to devsecops
Ad

Similar to Application Security in a DevOps World (20)

PDF
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
PPTX
Cisco Security as a foundation for SP Digitization
PPTX
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
PDF
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
PPTX
KiwiQA-Corporate-Presefvdvdxvxcvxcntation (2).pptx
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Making Security Work—Implementing a Transformational Security Program
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Mobile Payment Security with CA Rapid App Security
PDF
Protect Your Customers Data from Cyberattacks
PDF
CA's Vision for Business Automation
PDF
CA's Vision for Business Automation
PDF
Security and Data Breach
PDF
Introduction to Software Lifecycle Services 2018
PDF
From Rogue One to Rebel Alliance: Building Developers into Security Champions
PDF
Deliver the ‘Right’ Customer Experience without Compromising Data Security
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Oracle Customer Engagement in a Digital World
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Cisco Security as a foundation for SP Digitization
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
KiwiQA-Corporate-Presefvdvdxvxcvxcntation (2).pptx
Application Experience Analytics Services: The Strategic Digital Transformati...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Making Security Work—Implementing a Transformational Security Program
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Payment Security with CA Rapid App Security
Protect Your Customers Data from Cyberattacks
CA's Vision for Business Automation
CA's Vision for Business Automation
Security and Data Breach
Introduction to Software Lifecycle Services 2018
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Oracle Customer Engagement in a Digital World
Ad

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
How Components Increase Speed and Risk
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
How Components Increase Speed and Risk
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf

Application Security in a DevOps World

  • 1. Application Security in a DevOps World Peter Chestna DST37T DEVSECOPS Director of Developer Engagement Veracode
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of This Presentation
  • 3. 3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Who am I? • 25+ Years Software Development Experience • 11+ Years Application Security Experience • Certified Agile Product Owner and Scrum Master • At Veracode since 2006 • From Waterfall to Agile to DevOps • From Monolith to MicroService • Consultant on DevSecOps best practices • Fun Fact: I love whiskey! • Tell me where to drink local whiskey @PeteChestna
  • 4. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Goals  Why is AppSec important?  How is DevOps changing application development?  How is AppSec traditionally done?  What needs to change? – What to build – What to measure – How to help
  • 5. 5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Applications Are as Risky as Ever of all applications used some kind of hard-coded password of all applications use broken or risky cryptographic algorithms of all applications were vulnerable to open redirect attacks of all applications mix trusted and untrusted data in the same data structure or message 39% 35% 28% 16%
  • 6. 6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Lack of App Security is Damaging Companies
  • 7. 7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS High Profile Breaches Through the App Layer How: Vulnerability on website built and maintained by third-party vendor in support of a charity. Result: Usernames and passwords for 76 million households and 7 million business were stolen. Financial Institution How: Hackers exploited a known vulnerability in an open source component Result: Social Security Numbers and personal data for more than 143 million Americans stolen. Three executives lose their jobs. Financial Institution How: Targeted a flaw in OpenSSL, CVE-2014-0160, better known as Heartbleed Result: The theft of Social Security Numbers and other personal data belonging to 4.5 million patients Healthcare Provider How: Sophisticated kill chain including exploitation of vulnerable web application Result: Hackers stole names, mailing addresses, phone numbers and email addresses for more than 70 million shoppers Retailer
  • 8. 8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Business Mandate
  • 9. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Compressed Timelines & Smaller Teams Waterfall Agile DevOps 1-4 Releases Per Year 12-24 Releases Per Year 100+ Releases Per Year 50+ people 6-12 people 6-12 people
  • 10. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Waterfall Technology Agile DevOps
  • 11. 11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Definition of DevOps
  • 12. 12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What’s a DevOps Team? DevOps Team
  • 13. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DevOps – Process: Where is security? Security
  • 14. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agile – Process for DevOps Copyright 2005, Mountain Goat Software
  • 15. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Is this your current AppSec program?
  • 16. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS They/We know it’s coming…
  • 17. 17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Which outcome do you see? @PeteChestna
  • 18. 18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy  Relationship & Accountability  Integration & Automation  Training & Remediation Coaching  Security Champions
  • 19. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy - Relationships  Who is your peer in development/security?  Do you meet with them?  Do you understand each others goals?  Are you sympathetic to each others struggles?
  • 20. 20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy – Accountability  Shared between development and security  Part of annual goals for both teams  Measured and reported regularly
  • 21. 21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CI CD 1 Develop 4 Check in Static Analysis 3 Build & Test 2 Backlog Strategy – Integration & Automation Pass? 7 Synchronize No Yes 7 Deploy to QA/Stage 6 Static Analysis 6 Unit Tests 8 Dynamic Analysis 8 Regression Testing Pass? Yes Stage then Prod Per Check-in 5 Build CI/CD Pipeline 3a Manual Testing*
  • 22. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy – Training  Security teams can help developers by providing training, either through eLearning or in-person instructor-led training  Think about targeted training based on policy violations CA Veracode State of Software Security 2017
  • 23. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy - Training
  • 24. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy – Remediation Coaching @PeteChestna CA Veracode State of Software Security 2017
  • 25. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Strategy – Security Champions  Eyes and ears of security  Specialized training – Basic security concepts – Threat modeling – Grooming guidelines – Secure code review training – Security controls – CTF Exercises  Escalate when necessary
  • 26. 26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Static Application Security Testing + 3rd Party Risk Analysis Remediation and Mitigation Guidance Secure Code Reviews Manual Penetration Testing Red Team Activities Dynamic Application Security Testing Plan Code Build Test Stage Deploy Monitor Threat Modeling Security Grooming Secure Design Strategy - DevOps (Shift Left & Monitor) Runtime Application Self Protection Training (eLearning, instructor led, metadata driven)
  • 27. 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Bridge the Gap Between Development and Security 1. Scan early & often 2. Integrate & automate 3. Take Training 4. Request Remediation Guidance 5. Be a security champion Development Security 1. Be involved in all phases 2. Define & explain policy 3. Provide Targeted Training 4. Provide Remediation Guidance 5. Recruit & train champions
  • 28. 28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Recommended Sessions SESSION # TITLE DATE/TIME DST43T The CA Technologies Veracode Platform: 360 Degree View of Your Application’s Security 11/15/2017 at 12:45 pm DST50T How Components Increase Speed & Risk 11/15/2017 at 1:45 pm DST40T Scale Your Application Security Program Effectively with the Right Program Management Model 11/15/2017 at 3:30 pm DST41T DevOps: Security’s Chance to Get It Right 11/16/2017 at 12:45 pm
  • 29. 29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Must See Demos Securing Apps from Dev to Production CA Veracode Static Analysis CA Veracode Greenlight CA Veracode Remediation Guidance Manage Your Software Risk Open Sourced Component Scanning Developer Training on Secure Coding Integrations into Your Dev Tools 301 Manage Your Software Risk CA Veracode Static Analysis CA Veracode Web Application Scanning CA Veracode Greenlight CA Veracode Static Analysis CA Veracode Greenlight CA Veracode Remediation Guidance 506P 509P DevOps-CD SecuritySecurity
  • 30. 30 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at https://community.veracode.com Thank you.
  • 31. 31 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DevSecOps For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps