SlideShare a Scribd company logo
Are your DevOps and Security teams
friends or foes?
Colby Dyess, Director Cloud Marketing, Tufin
Reuven Harrison Co-founder & CTO, Tufin
2
Yes, we have a DevOps team. I have no idea
what they’re up to, but my team [Security] is
responsible for securing their apps.
“
”
—Tufin Customer
2018
Understanding DevOps
4
• Collaboration between Developers and IT Operations
• To speed up things
• Through automation
• And shared responsibility
DevOps Origin
5
DevOps Today
GOALS
Improved deployment frequency
Faster time to market
Less failure rate to new releases
Short lead time between fixes
Improve mean time to recovery
RESPONSIBILITIES
CI/CD pipelines
Dev environments
Run-time environments
DevOps is about Speed and Repeatability
6
CI
Development
Source
Control
Build
Testing
Commit
Initiate
CI Process
TestReport
Continuous Integration (CI) is a
development practice that requires developers
to integrate code into a shared repository
several times a day. Each check-in is then
verified by an automated build, allowing teams
to detect problems early.
7
CD
Continuous deployment is a strategy for software releases wherein any code commit that passes the
automated testing phase is automatically released into the production environment, making changes that are
visible to the software's users.
Unit Test Platform Test Deliver to Staging
Application
Acceptance Tests
Deploy to
Production
Post Deploy Tests
Auto
Continuous Delivery
Auto Auto Manual Auto
Unit Test Platform Test Deliver to Staging
Application
Acceptance Tests
Deploy to
Production
Post Deploy Tests
Auto
Continuous Deployment
Auto Auto AutoAuto
8
From IT to No IT
1980’s 1999 2006 2013 2015 2015
9
• Deployments should be based on a descriptive language
• Code AND infrastructure should be defined in a code repository like github
Infrastructure as Code
10
Immutable Infrastructure
SSH
11
Advantages:
• Deployments are repeatable and automated
• Easier troubleshooting because the state is known (no one manipulates it after
deployment)
• Automatic audit trail for all changes
• Easy upgrades and rollbacks
Infrastructure as Code & Immutable Infrastructure
12
DevOps Stuff
Impact on IT Security
14
Agility
Digital Transformation, powered by
cloud-native platforms, is increasing
business agility and accelerating
innovation.
Security in this new world requires a
totally different approach where
traditional tools and practices are
unsuitable.
Security
Agility vs. Security
15
The New Stack
App
Switches and Routers
Firewalls
Compute
Load Balancers
Cloud
Service Service Service
Service Service Service
Service Service Service
App
NewOld
16
App
New Roles and Responsibilities
Switches and Routers
Firewalls
Compute
Load Balancers
Cloud
Service Service Service
Service Service Service
Service Service Service
App
Dev
IT / Security
Dev
DevOps
NewOld
17
• In order to segment, we need to categorize our resources
• Traditional security zones are based on IP addresses, Subnets and VLANs
• As we move to higher-level abstractions, these become less suitable
Bye Bye IP
WHO?
18
• Security Groups
• Roles (IAM)
• Tags and Labels
• Domain names (FQDN) - *.aws.com
• Subnets are still used but to a lesser extent (usually for connectivity to external,
legacy environments)
Policy Categories that Work (Instead of IP Addresses)
19
Challenges
Don’t have access – limited visibility
Traditional tools don’t work – limited control
Existing tools & practices will break agility
Baking Security into DevOps
21
CI/CD to the Rescue
Development
Source
Control
Build
Testing
Commit
Initiate
CI Process
TestReport
22
Monitoring, alerting,
enforcement, threat
detection & response
Shift Left
Appsec
Static code analysis
Vulnerability analysis
Security testing
Check Infrastructure
as Code against
policies
Code Build & Test Deploy Operate
Shift left
23
Monitoring, alerting,
enforcement, threat
detection & response
Shift Left
Appsec
Static code analysis
Vulnerability analysis
Security testing
Check Infrastructure
as Code against
policies
Code Build & Test Deploy Operate
Shift left
NEW:
Auto-Policy
Generation
24
Learn the Policy
Automatically
Automatically discover which services are deployed,
how they are connected, and which external services
they rely on.
Visibility Learn Review Enforce
Service A
Service C
Service B
Github Azure
25
The Policy is Reset Before Tests
26
Automatic Policy Learning in the CI/CD Pipeline
27
The Policy is Generated After Tests
28
Auto-Generated Policy in GitHub
29
• DevOps is about collaboration
• Security must be part of that
• There will be a learning curve
• Assign owners to make security work in the DevOps environments
• Task them with learning and bridging the gap
Collaborate!
You will get much better security!
30
Tufin Cloud Security
• Gain visibility into cloud-native environments
• Define and control security policies
• Security automation in the CI/CD pipeline
Thank You

More Related Content

PPTX
The DevOps Journey in an Enterprise - DOES 2021
PDF
Monitoring at the Speed of DevOps
PDF
Keynote: Puppet camp compliance
PPTX
PDF
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
PPTX
How to go from waterfall app dev to secure agile development in 2 weeks
PDF
Mainframe Automation: A Panel Discussion
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
The DevOps Journey in an Enterprise - DOES 2021
Monitoring at the Speed of DevOps
Keynote: Puppet camp compliance
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
How to go from waterfall app dev to secure agile development in 2 weeks
Mainframe Automation: A Panel Discussion
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program

What's hot (20)

PDF
Application Asset Management with ThreadFix
PPTX
Building a Bridge Between CI/CD and ITSM
PPTX
Integrating security into Continuous Delivery
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PPTX
KGI compliance as-code approach
PPTX
Is Your DevOps Ready for the Cloud?
PPTX
DevOps Monitoring and Alerting
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
API Security - Everything You Need to Know To Protect Your APIs
PDF
Your Resolution for 2018: Five Principles For Securing DevOps
PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
PDF
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
PPTX
DevOps Hits Adolescence – what’s next?
PDF
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
PPTX
Accelerate DevOps Transformation with App Migration to the Cloud
PPTX
How to Get Started with DevSecOps
DOCX
10 things to get right for successful dev secops
PPTX
Secure DevOPS Implementation Guidance
PDF
Create code confidence for better application security
Application Asset Management with ThreadFix
Building a Bridge Between CI/CD and ITSM
Integrating security into Continuous Delivery
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
KGI compliance as-code approach
Is Your DevOps Ready for the Cloud?
DevOps Monitoring and Alerting
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
API Security - Everything You Need to Know To Protect Your APIs
Your Resolution for 2018: Five Principles For Securing DevOps
Dev secops security and compliance at the speed of continuous delivery - owasp
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Hits Adolescence – what’s next?
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
Accelerate DevOps Transformation with App Migration to the Cloud
How to Get Started with DevSecOps
10 things to get right for successful dev secops
Secure DevOPS Implementation Guidance
Create code confidence for better application security
Ad

Similar to Are your DevOps and Security teams friends or foes? (20)

PPTX
SecDevOps: The New Black of IT
PPTX
DevOps to DevSecOps Journey..
PPTX
Shift Left for More Secure Apps with F5 NGINX
PPTX
Overcoming Security Challenges in DevOps
PPTX
ABN AMRO DevSecOps Journey
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
PDF
GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021
PDF
The What, Why, and How of DevSecOps
PDF
DevOps, Common use cases, Architectures, Best Practices
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
PPTX
DevSecOps: Key Controls to Modern Security Success
PDF
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
PDF
Integrating Security into your Development Pipeline
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PDF
Introduction to DevSecOps
PDF
Devops, Secops, Opsec, DevSec *ops *.* ?
PDF
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
PDF
DevOps in the Modern Era - Thoughtfully Critical Podcast
SecDevOps: The New Black of IT
DevOps to DevSecOps Journey..
Shift Left for More Secure Apps with F5 NGINX
Overcoming Security Challenges in DevOps
ABN AMRO DevSecOps Journey
The Rise of DevSecOps in CI_CD Workflows.pdf
Outpost24 webinar - application security in a dev ops world-08-2018
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
GitOps, Driving NGN Operations Teams 211127 #kcdgt 2021
The What, Why, and How of DevSecOps
DevOps, Common use cases, Architectures, Best Practices
From DevOps to DevSecOps: Evolution of Secure Software Development
DevSecOps: Key Controls to Modern Security Success
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
Integrating Security into your Development Pipeline
BsidesMCR_2016-what-can-infosec-learn-from-devops
Introduction to DevSecOps
Devops, Secops, Opsec, DevSec *ops *.* ?
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
DevOps in the Modern Era - Thoughtfully Critical Podcast
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx

Are your DevOps and Security teams friends or foes?

  • 1. Are your DevOps and Security teams friends or foes? Colby Dyess, Director Cloud Marketing, Tufin Reuven Harrison Co-founder & CTO, Tufin
  • 2. 2 Yes, we have a DevOps team. I have no idea what they’re up to, but my team [Security] is responsible for securing their apps. “ ” —Tufin Customer 2018
  • 4. 4 • Collaboration between Developers and IT Operations • To speed up things • Through automation • And shared responsibility DevOps Origin
  • 5. 5 DevOps Today GOALS Improved deployment frequency Faster time to market Less failure rate to new releases Short lead time between fixes Improve mean time to recovery RESPONSIBILITIES CI/CD pipelines Dev environments Run-time environments DevOps is about Speed and Repeatability
  • 6. 6 CI Development Source Control Build Testing Commit Initiate CI Process TestReport Continuous Integration (CI) is a development practice that requires developers to integrate code into a shared repository several times a day. Each check-in is then verified by an automated build, allowing teams to detect problems early.
  • 7. 7 CD Continuous deployment is a strategy for software releases wherein any code commit that passes the automated testing phase is automatically released into the production environment, making changes that are visible to the software's users. Unit Test Platform Test Deliver to Staging Application Acceptance Tests Deploy to Production Post Deploy Tests Auto Continuous Delivery Auto Auto Manual Auto Unit Test Platform Test Deliver to Staging Application Acceptance Tests Deploy to Production Post Deploy Tests Auto Continuous Deployment Auto Auto AutoAuto
  • 8. 8 From IT to No IT 1980’s 1999 2006 2013 2015 2015
  • 9. 9 • Deployments should be based on a descriptive language • Code AND infrastructure should be defined in a code repository like github Infrastructure as Code
  • 11. 11 Advantages: • Deployments are repeatable and automated • Easier troubleshooting because the state is known (no one manipulates it after deployment) • Automatic audit trail for all changes • Easy upgrades and rollbacks Infrastructure as Code & Immutable Infrastructure
  • 13. Impact on IT Security
  • 14. 14 Agility Digital Transformation, powered by cloud-native platforms, is increasing business agility and accelerating innovation. Security in this new world requires a totally different approach where traditional tools and practices are unsuitable. Security Agility vs. Security
  • 15. 15 The New Stack App Switches and Routers Firewalls Compute Load Balancers Cloud Service Service Service Service Service Service Service Service Service App NewOld
  • 16. 16 App New Roles and Responsibilities Switches and Routers Firewalls Compute Load Balancers Cloud Service Service Service Service Service Service Service Service Service App Dev IT / Security Dev DevOps NewOld
  • 17. 17 • In order to segment, we need to categorize our resources • Traditional security zones are based on IP addresses, Subnets and VLANs • As we move to higher-level abstractions, these become less suitable Bye Bye IP WHO?
  • 18. 18 • Security Groups • Roles (IAM) • Tags and Labels • Domain names (FQDN) - *.aws.com • Subnets are still used but to a lesser extent (usually for connectivity to external, legacy environments) Policy Categories that Work (Instead of IP Addresses)
  • 19. 19 Challenges Don’t have access – limited visibility Traditional tools don’t work – limited control Existing tools & practices will break agility
  • 21. 21 CI/CD to the Rescue Development Source Control Build Testing Commit Initiate CI Process TestReport
  • 22. 22 Monitoring, alerting, enforcement, threat detection & response Shift Left Appsec Static code analysis Vulnerability analysis Security testing Check Infrastructure as Code against policies Code Build & Test Deploy Operate Shift left
  • 23. 23 Monitoring, alerting, enforcement, threat detection & response Shift Left Appsec Static code analysis Vulnerability analysis Security testing Check Infrastructure as Code against policies Code Build & Test Deploy Operate Shift left NEW: Auto-Policy Generation
  • 24. 24 Learn the Policy Automatically Automatically discover which services are deployed, how they are connected, and which external services they rely on. Visibility Learn Review Enforce Service A Service C Service B Github Azure
  • 25. 25 The Policy is Reset Before Tests
  • 26. 26 Automatic Policy Learning in the CI/CD Pipeline
  • 27. 27 The Policy is Generated After Tests
  • 29. 29 • DevOps is about collaboration • Security must be part of that • There will be a learning curve • Assign owners to make security work in the DevOps environments • Task them with learning and bridging the gap Collaborate! You will get much better security!
  • 30. 30 Tufin Cloud Security • Gain visibility into cloud-native environments • Define and control security policies • Security automation in the CI/CD pipeline

Editor's Notes

  • #6: DevOps is an engineering methodology for streamlining app development If something needs to be done more than once – automate it!
  • #7: Git: Developers cooperate and communicate through this platform Jenkins: the main pivot
  • #11: No config changes after deployment
  • #15: Organizations are under constant pressure to innovate and remain competitive, while reducing costs. This has driven business leaders to push for digital transformation, often powered by cloud-native platforms and DevOps practices that boost business agility. Security teams, however, have been left behind – forced to rely on tools and practices that were not designed for cloud and agile environments. As a result, organizations have had to trade agility for security.
  • #16: How did we get here? Traditionally, applications were built on top of infrastructure – both physical and virtual – and security teams had standard practices for provisioning, managing and operating the infrastructure. Applications took months, sometimes years to build and might get updated only a handful of times each year. For the most part, security teams could keep pace with new app deployments and change requests. <CLICK> But over the past several years, developers have turned to public clouds for rapid provisioning and organizations have adopted DevOps practices that automate application build, test and deployment cycles. <CLICK> We still build applications, of course, but they’re no longer monolithic or dependent upon infrastructure. <CLICK> Instead applications are composed of several small or micro services. This enables developers to add new services and change existing services faster than ever before. In fact, updates that used to happen every few months now happen multiple times a day! Traditional IT and security practices are not setup to handle the scale or pace of change that cloud enables.
  • #17: The adoption of cloud-native platforms and DevOps practices also impacts traditional roles and responsibilities. For example, developers focused on building applications while IT managed infrastructure provisioning and security. In the new world, developers build applications based on microservices – some of services are custom built, while others are provided by the cloud platform. Meanwhile, DevOps teams have taken responsibility for management of cloud infrastructure and services. However, when it comes to security most organizations are left vulnerable. DevOps are not security specialists and may not properly address security and compliance requirements. At the same time, IT security rarely has access, visibility or control of cloud-native environments.
  • #19: Don’t define the low-level SGs and forth – define guardrails using tags Ideally – define a unified policy across everything
  • #20: We don’t own the infrastructure Developers deploy the full stack including security configuration We can’t use IP addresses for segmentation Everything should be automated
  • #23: Add automated security testing in the CI/CD pipeline Work in the pipeline with the developers to test, assess, audit and block! Build and test: Identify malicious and vulnerable dependencies Add security tests Deploy: Ensure compliance before production (for both code and configuration!) Operate: Swap out misbehaving components (e.g., a container)
  • #24: Add automated security testing in the CI/CD pipeline Work in the pipeline with the developers to test, assess, audit and block! Build and test: Identify malicious and vulnerable dependencies Add security tests Deploy: Ensure compliance before production (for both code and configuration!) Operate: Swap out misbehaving components (e.g., a container)