SlideShare a Scribd company logo
DevOps and Security: It’s Happening. Right Now.
Helen Bravo
Director of Product Management at Checkmarx
Helen.bravo@checkmarx.com
• Intro to DevOps
• Integrating security within DevOps
– Problems with traditional controls
– Steps to DevOps security
Agenda
What is DevOps About?
An unstoppable deployment process
… in small chunks of time
DevOps is Happening
Companies that have adopted DevOps
Can TRADITIONAL
web application
security controls fit
in…
… a DevOps environment?!
Traditional Web Application Security Controls
• Penetration Testing
• WAF (Web Application Firewall)
• Code Analysis
Penetration Testing- Takes Time!
Penetration Testing
– 300 pages report
– 3 weeks assessment time
– 2 weeks to get it into development
Web Application Firewall (WAF)
Thinking Continuous
Deployment?
Think Continuous
Configuration!
Code Analysis
• Setup time
• Running time
• Analysis time
… just too slow!
Dev opsandsecurity owasp
… Do Nothing?
Required: A New Secure SDLC Approach
Step by Step
Step 1: Plan for Security
• Identify unsecured APIs and frameworks
• Map security sensitive code portions. E.g. password
changes mechanism, user authentication
mechanism.
• Anticipate regulatory problems, plan for it.
Step 1: Plan for Security
Step 2: Engage the Developers.
And Be Engaged
• Connect developers to security
– Going to OWASP? Bring a developer with you!
• Is your house on fire? Share the details with your
developers.
• Have an open door approach
• Set up an online collaboration platform E.g. Jive,
Confluence etc.
Step 2: Engage the Developers. And Be Engaged
Step 3: Arm the Developers
• Secure frameworks:
– Use a secure framework such as Spring Security, JAAS, Apache
Shiro, Symfony2
– ESAPI is a very useful OWASP security framework
• SCA tools that can provide security feedback on pre-commit stage.
– Rapid response
– Small chunks
Step 3: Arm the Developer
Step 3: Automate the Process
• Integrate within your build (Jenkins, Bamboo,
TeamCity, etc.)
– SAST
– DAST
• Fail the build if security does not pass the bar.
Step 3: Automate the Process
Develop
Code
Commit
Source
Control
Build
Trigger
Unit Tests
Deploy
to
Production
Deploy to
Test Env
Report
&
Notify
Publish to
release
repository
Continuous Deployment
Develop
Code
Commit
Source
Control
Build
Trigger
Tests
Deploy
to
ProductionDeploy
to Test
Env
Report
&
Notify
Publish to
release
repository
Automatic
security
test
SCA
Test
Security within Continuous Deployment
Step 5: Use Old Tools Wisely
Step 5: Use Old Tools Wisely
• Periodic pen testing
• WAF on main functions
• Code review for security sensitive code portions.
Summary
• DevOps is happening. Right Now.
– During the time of this talk, Amazon has released
75 features and bug fixes.
• Security should not be compromised
• Don’t be overwhelmed. Start small
Summary
The 3 Takeaways
1. Plan from the ground
2. Engage with your developers
3. Integrate security into automatic build
process.
Questions?
Thank you
Helen.bravo@checkmarx.com

More Related Content

PPTX
SecDevOps: The New Black of IT
PDF
Integrating DevOps and Security
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
PDF
Continuous Security Testing - DevSecCon
PDF
Embracing the Rise of SecDevOps
PDF
Building a Modern Security Engineering Organization
PPTX
Automating security tests for Continuous Integration
PPTX
DevOps & Security: Here & Now
SecDevOps: The New Black of IT
Integrating DevOps and Security
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Continuous Security Testing - DevSecCon
Embracing the Rise of SecDevOps
Building a Modern Security Engineering Organization
Automating security tests for Continuous Integration
DevOps & Security: Here & Now

What's hot (20)

PDF
Proactive Security AppSec Case Study
PDF
Devops, Secops, Opsec, DevSec *ops *.* ?
PDF
Effective approaches to web application security
PDF
we45 - SecDevOps Concept Presentation
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
T23 HTML5 Security Testing at Spotify
PPTX
Integrating security into Continuous Delivery
PDF
The Joy of Proactive Security
PPTX
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
PPTX
we45 SecDevOps Presentation - ISACA Chennai
PPTX
The Journey to DevSecOps
PPTX
Continuous Security Testing in a Devops World #OWASPHelsinki
PDF
Automating OWASP Tests in your CI/CD
PDF
Vulnerabilities are bugs, Let's Test For Them!
PDF
DevSecCon London 2017: Shift happens ... by Colin Domoney
ODP
Making security-agile matt-tesauro
PPTX
AppSec Pipeline - Velcocity NY 2015
PDF
Automated Security Testing
PDF
A Secure DevOps Journey
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
Proactive Security AppSec Case Study
Devops, Secops, Opsec, DevSec *ops *.* ?
Effective approaches to web application security
we45 - SecDevOps Concept Presentation
Succeeding-Marriage-Cybersecurity-DevOps final
T23 HTML5 Security Testing at Spotify
Integrating security into Continuous Delivery
The Joy of Proactive Security
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
we45 SecDevOps Presentation - ISACA Chennai
The Journey to DevSecOps
Continuous Security Testing in a Devops World #OWASPHelsinki
Automating OWASP Tests in your CI/CD
Vulnerabilities are bugs, Let's Test For Them!
DevSecCon London 2017: Shift happens ... by Colin Domoney
Making security-agile matt-tesauro
AppSec Pipeline - Velcocity NY 2015
Automated Security Testing
A Secure DevOps Journey
DevSecCon London 2017: when good containers go bad by Tim Mackey
Ad

Viewers also liked (11)

PDF
Introduction to Threat Modeling
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
PPTX
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
PPTX
Continuous and Visible Security Testing with BDD-Security
PDF
DevSecOps in Baby Steps
PDF
DevSecOps: Taking a DevOps Approach to Security
PPTX
Continuous Security Testing with Devops - OWASP EU 2014
PDF
Designing Teams for Emerging Challenges
PDF
Visual Design with Data
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
PDF
How to Become a Thought Leader in Your Niche
Introduction to Threat Modeling
Walls of Steel, Doors of Wood - Relevance of Application Security
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Continuous and Visible Security Testing with BDD-Security
DevSecOps in Baby Steps
DevSecOps: Taking a DevOps Approach to Security
Continuous Security Testing with Devops - OWASP EU 2014
Designing Teams for Emerging Challenges
Visual Design with Data
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
Ad

Similar to Dev opsandsecurity owasp (20)

PDF
AppSec How-To: Achieving Security in DevOps
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PPTX
Secure DevOPS Implementation Guidance
PPTX
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
PPTX
Introduction to DevSecOps
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PDF
Scale security for a dollar or less
PPTX
DevSecOps and Drupal: Securing your applications in a modern IT landscape
PDF
Strengthen and Scale Security for a dollar or less
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
The What, Why, and How of DevSecOps
PDF
You build it - Cyber Chicago Keynote
PPTX
DevSecOps : an Introduction
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PDF
Pentest is yesterday, DevSecOps is tomorrow
AppSec How-To: Achieving Security in DevOps
You Build It, You Secure It: Introduction to DevSecOps
Secure DevOPS Implementation Guidance
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
Introduction to DevSecOps
The Rise of DevSecOps in CI_CD Workflows.pdf
Scale security for a dollar or less
DevSecOps and Drupal: Securing your applications in a modern IT landscape
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
The What, Why, and How of DevSecOps
You build it - Cyber Chicago Keynote
DevSecOps : an Introduction
Secure DevOps - Evolution or Revolution?
Outpost24 webinar - application security in a dev ops world-08-2018
Why Security Engineer Need Shift-Left to DevSecOps?
DevSecCon Keynote
DevSecCon KeyNote London 2015
Pentest is yesterday, DevSecOps is tomorrow

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...

Dev opsandsecurity owasp