SlideShare a Scribd company logo
DevOps
+
Network Security
=
DevSecOps
By Jeremiah Tillman
A Well Rounded DevOps Team
QA
Testing
Operatio
Develop
Continuous Integration (CI)
๏‚šMerging the development branches
together (master branch)
๏‚šMust successfully pass a series of tests
Continuous Delivery (CD)
๏‚šDeploying small changes more often
๏‚šAutomated delivery of updates
Deployment Pipeline
Stages Build & Automate CI Test Automation Deploy Automation
Components Visibility Feedback Continuously Deploy
DevSecOps Manifesto
๏‚š Leaning in over Always Saying โ€œNoโ€
๏‚š Data & Security Science over Fear,
Uncertainty and Doubt
๏‚š Open Contribution & Collaboration over
Security-Only Requirements
๏‚š Consumable Security Services with APIs over
Mandated Security Controls & Paperwork
๏‚š Business Driven Security Scores over Rubber
Stamp Security
๏‚š Red & Blue Team Exploit Testing over Relying
on Scans & Theoretical Vulnerabilities
๏‚š 24x7 Proactive Security Monitoring over
Reacting after being Informed of an Incident
๏‚š Shared Threat Intelligence over Keeping Info
to Ourselves
๏‚š Compliance Operations over Clipboards &
Checklists
DevSecOps Integration
๏‚š 1. Prior to code being committed
๏‚š SAST that be run locally or integrated into an IDE
๏‚š 2. During CI
๏‚š Security checks can be issued via the jobs server
๏‚š Unit testing, abuse cases, SAST, and software component analysis (supply chain hygiene)
๏‚š 3. After a successful build
๏‚š Automatically and securely configure and provision servers
๏‚š Configuration management, DAST, security smoke tests
๏‚š 4. Post deployment
๏‚š Automated runtime asserts and compliance checks
๏‚š Automated correction
๏‚š Production monitoring/feedback
Greenfield vs. Legacy
๏‚š Greenfield Environment /Applications
๏‚š Do it right from the start!
๏‚š Legacy Applications
๏‚š Start with vulnerability & risk assessment
๏‚š Apply patches to remediate all vulnerabilities that donโ€™t require major design changes
๏‚š Integrate automated security testing in future releases when possible
๏‚š Rebuilding / Sunsetting
๏‚š Consider breaking out individual components one at a time, where possible, instead of a hard cutover
๏‚š New system should be following secure architecture principles and integrate security throughout the
SDLC

More Related Content

PPTX
Chefdevseccon2015
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
Enterprise Security APIs
PDF
A Successful SAST Tool Implementation
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
Devops security-An Insight into Secure-SDLC
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
From Gates to Guardrails: Alternate Approaches to Product Security
Chefdevseccon2015
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Enterprise Security APIs
A Successful SAST Tool Implementation
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Devops security-An Insight into Secure-SDLC
Bringing Security Testing to Development: How to Enable Developers to Act as ...
From Gates to Guardrails: Alternate Approaches to Product Security

What's hot (20)

PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PDF
A Secure DevOps Journey
PDF
Evident io Continuous Compliance - Mar 2017
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PDF
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PPTX
Open Source Libraries - Managing Risk in Cloud
PPTX
DevSecOps outline
PDF
DevSecOps, The Good, Bad, and Ugly
PPTX
Splitting The Check On Compliance and Security
PPTX
Secure Software Development Life Cycle
PDF
The Challenges of Scaling DevSecOps
PDF
Dev week cloud world conf2021
PPTX
Whatโ€™s making way for secure sdlc
PPTX
Introduction to DevSecOps
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PPTX
A journey from dev ops to devsecops
PDF
OSB130 Patch Management Best Practices
ย 
PPTX
Turning security into code by Jeff Williams
PDF
PIACERE - DevSecOps Automated
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
A Secure DevOps Journey
Evident io Continuous Compliance - Mar 2017
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Automating Open Source Security: A SANS Review of WhiteSource
Open Source Libraries - Managing Risk in Cloud
DevSecOps outline
DevSecOps, The Good, Bad, and Ugly
Splitting The Check On Compliance and Security
Secure Software Development Life Cycle
The Challenges of Scaling DevSecOps
Dev week cloud world conf2021
Whatโ€™s making way for secure sdlc
Introduction to DevSecOps
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
A journey from dev ops to devsecops
OSB130 Patch Management Best Practices
ย 
Turning security into code by Jeff Williams
PIACERE - DevSecOps Automated
Ad

Similar to DevOps (20)

PDF
DevSecOps as a Service_ Secure Your Software Pipeline Without Slowing It Down...
PDF
Scale security for a dollar or less
PPTX
The DevSecOps Advantage: A Comprehensive Guide
ODP
Making security-agile matt-tesauro
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
AppSec in an Agile World
PPTX
Securing the continuous integration
ODP
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
PDF
The Challenge of Integrating Security Solutions with CI.pdf
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
PPTX
DevSecOps : an Introduction
PDF
Strengthen and Scale Security for a dollar or less
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PPTX
ะ”ะผะธั‚ั€ะพ ะขะตั€ะตั‰ะตะฝะบะพ, "How to secure your application with Secure SDLC"
PPTX
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
PDF
DevSecOps Basics with Azure Pipelines
PDF
Top 20 DevSecOps Interview Questions and Answers
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
PDF
Are You Ready to Ace Your DevSecOps Interview?
DevSecOps as a Service_ Secure Your Software Pipeline Without Slowing It Down...
Scale security for a dollar or less
The DevSecOps Advantage: A Comprehensive Guide
Making security-agile matt-tesauro
Succeeding-Marriage-Cybersecurity-DevOps final
AppSec in an Agile World
Securing the continuous integration
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
The Challenge of Integrating Security Solutions with CI.pdf
From DevOps to DevSecOps: Evolution of Secure Software Development
DevSecOps : an Introduction
Strengthen and Scale Security for a dollar or less
The Rise of DevSecOps in CI_CD Workflows.pdf
ะ”ะผะธั‚ั€ะพ ะขะตั€ะตั‰ะตะฝะบะพ, "How to secure your application with Secure SDLC"
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps Basics with Azure Pipelines
Top 20 DevSecOps Interview Questions and Answers
Top 20 DevSecOps Interview Questions.pdf
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
Are You Ready to Ace Your DevSecOps Interview?
Ad

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
ย 
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
ย 
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
ย 
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
ย 
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology

DevOps

  • 2. A Well Rounded DevOps Team QA Testing Operatio Develop
  • 3. Continuous Integration (CI) ๏‚šMerging the development branches together (master branch) ๏‚šMust successfully pass a series of tests
  • 4. Continuous Delivery (CD) ๏‚šDeploying small changes more often ๏‚šAutomated delivery of updates
  • 5. Deployment Pipeline Stages Build & Automate CI Test Automation Deploy Automation Components Visibility Feedback Continuously Deploy
  • 6. DevSecOps Manifesto ๏‚š Leaning in over Always Saying โ€œNoโ€ ๏‚š Data & Security Science over Fear, Uncertainty and Doubt ๏‚š Open Contribution & Collaboration over Security-Only Requirements ๏‚š Consumable Security Services with APIs over Mandated Security Controls & Paperwork ๏‚š Business Driven Security Scores over Rubber Stamp Security ๏‚š Red & Blue Team Exploit Testing over Relying on Scans & Theoretical Vulnerabilities ๏‚š 24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident ๏‚š Shared Threat Intelligence over Keeping Info to Ourselves ๏‚š Compliance Operations over Clipboards & Checklists
  • 7. DevSecOps Integration ๏‚š 1. Prior to code being committed ๏‚š SAST that be run locally or integrated into an IDE ๏‚š 2. During CI ๏‚š Security checks can be issued via the jobs server ๏‚š Unit testing, abuse cases, SAST, and software component analysis (supply chain hygiene) ๏‚š 3. After a successful build ๏‚š Automatically and securely configure and provision servers ๏‚š Configuration management, DAST, security smoke tests ๏‚š 4. Post deployment ๏‚š Automated runtime asserts and compliance checks ๏‚š Automated correction ๏‚š Production monitoring/feedback
  • 8. Greenfield vs. Legacy ๏‚š Greenfield Environment /Applications ๏‚š Do it right from the start! ๏‚š Legacy Applications ๏‚š Start with vulnerability & risk assessment ๏‚š Apply patches to remediate all vulnerabilities that donโ€™t require major design changes ๏‚š Integrate automated security testing in future releases when possible ๏‚š Rebuilding / Sunsetting ๏‚š Consider breaking out individual components one at a time, where possible, instead of a hard cutover ๏‚š New system should be following secure architecture principles and integrate security throughout the SDLC