SlideShare a Scribd company logo
DevOps and Application Security
Shahee Mirza
Co-Founder : BEETLES
Twitter: @shaheemirza
DevOps?
But Where is the Security?
TRADITIONAL
QA and OPS: Devs:
Security is last task?
• Security Testing
• Firewall Configuration
• Source Code Analysis
Security Testing, Firewall configuration and
Code analysis – Takes time
But, the investor has no time
So, What have we got:
But, What we planned :
… is that end of everything?
Required: Security in DevOps
Welcome to DevOpsSec !!
But, How will I introduce DevOpsSec to my team?
Module 1: Make a plan for Security
Module 2: Connect entire Team
Module 3: Make a culture of Self-
Learning about Security for Devs + QA.
Module 4: Automate everything.
Develop
Code
Commit
Source
Control
Build
Trigger
Tests
Deploy
to
ProductionDeploy
to Test
Env
Report
&
Notify
Publish to
release
repository
Automatic
security
test
SCA
Test
Security within Continuous Deployment
Module 5: Build a Security Team
Now, you have…
Summary
1. Make a plan for security
2. Educate your team
3. Integrate security into automatic build
process.
Thank you

More Related Content

PPSX
Web application security
PPTX
Web Application Security 101
PPTX
Bug Bounty 101
PPT
Introduction To OWASP
PDF
Android Security
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
PPTX
Threat modelling with_sample_application
PPT
Application Security
Web application security
Web Application Security 101
Bug Bounty 101
Introduction To OWASP
Android Security
Bug Bounty Hunter Methodology - Nullcon 2016
Threat modelling with_sample_application
Application Security

What's hot (20)

PDF
Malware and security
PDF
BugBounty Roadmap with Mohammed Adam
PDF
Securisation des web services soap contre les attaques par injection
PPTX
Web Application Security Vulnerability Management Framework
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PDF
The Joy of Proactive Security
PDF
Mobile Application Security
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Penetration testing reporting and methodology
PDF
Bug Bounty - Hackers Job
PDF
Malware classification and detection
PDF
Secure coding presentation Oct 3 2020
PPTX
OWASP TOP 10 VULNERABILITIS
PPTX
System security
PDF
Introduction to Software Security and Best Practices
PPTX
OWASP Top 10 2021 What's New
PDF
React Server Side Rendering with Next.js
PDF
Secure Code Review 101
PPTX
Vulnerabilities in modern web applications
PPT
Bypass file upload restrictions
Malware and security
BugBounty Roadmap with Mohammed Adam
Securisation des web services soap contre les attaques par injection
Web Application Security Vulnerability Management Framework
Cross Site Request Forgery (CSRF) Scripting Explained
The Joy of Proactive Security
Mobile Application Security
OWASP Top 10 Web Application Vulnerabilities
Penetration testing reporting and methodology
Bug Bounty - Hackers Job
Malware classification and detection
Secure coding presentation Oct 3 2020
OWASP TOP 10 VULNERABILITIS
System security
Introduction to Software Security and Best Practices
OWASP Top 10 2021 What's New
React Server Side Rendering with Next.js
Secure Code Review 101
Vulnerabilities in modern web applications
Bypass file upload restrictions
Ad

Viewers also liked (20)

PPTX
Responsible Disclosure Program: Why and How
PDF
A simple model of consumer behavior
PDF
Bug bounty programs
PDF
5 Tips to Successfully Running a Bug Bounty Program
PDF
Icebreaking how to break the ice and give an awesome presentation
PDF
Case solving Tips shown in Brandwitz'15 RoadShow
PPTX
Sending a for ahuh. win32 exploit development old school
PPTX
How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth
PDF
A designer resume
PPTX
Bug Bounty for - Beginners
PDF
Brandwitz'14 biggest branding competition of the country
PDF
10 Mind blowing facts about Greece's Economy
PDF
10 Life Lessons by Bill Gates
PDF
Brandwitz'15 Semi Finals-Team 360 degree
PDF
Team Dexters-Socio Camp Slides
PPTX
My Little Webap - DevOpsSec is Magic
PDF
What's My Security Policy Doing to My Help Desk w/ Chris Swan
PDF
Devops security
PDF
The Retail Enterprise - And the rise of the omni-present consumer Part 2
PDF
Devops/Sysops security
Responsible Disclosure Program: Why and How
A simple model of consumer behavior
Bug bounty programs
5 Tips to Successfully Running a Bug Bounty Program
Icebreaking how to break the ice and give an awesome presentation
Case solving Tips shown in Brandwitz'15 RoadShow
Sending a for ahuh. win32 exploit development old school
How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth
A designer resume
Bug Bounty for - Beginners
Brandwitz'14 biggest branding competition of the country
10 Mind blowing facts about Greece's Economy
10 Life Lessons by Bill Gates
Brandwitz'15 Semi Finals-Team 360 degree
Team Dexters-Socio Camp Slides
My Little Webap - DevOpsSec is Magic
What's My Security Policy Doing to My Help Desk w/ Chris Swan
Devops security
The Retail Enterprise - And the rise of the omni-present consumer Part 2
Devops/Sysops security
Ad

Similar to DevOps and Application Security (20)

PDF
Scale security for a dollar or less
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
Strengthen and Scale Security for a dollar or less
PPTX
DevSecOps presentation explaining what is devsecops
PPTX
What is devsecops and how it works and best practices
PPTX
The Unlikely Couple, DevOps and Security. Can it work?
PPTX
Introduction to DevSecOps OWASP Ahmedabad
PDF
DevSecOps Basics with Azure Pipelines
PPTX
Time To Get Your DevOps E-Degree Now !!
PDF
DevSecOps - The big picture
PDF
DevSecOps - The big picture
PPTX
Devops Engineer E-Degree In Just 3 Months
PDF
DevSecOps - Background, Status and Future Challenges
PDF
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
PDF
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PDF
SecDevOps Risk Workflow - v0.6
PPTX
DevOps to DevSecOps Journey..
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
Scale security for a dollar or less
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security for a dollar or less
DevSecOps presentation explaining what is devsecops
What is devsecops and how it works and best practices
The Unlikely Couple, DevOps and Security. Can it work?
Introduction to DevSecOps OWASP Ahmedabad
DevSecOps Basics with Azure Pipelines
Time To Get Your DevOps E-Degree Now !!
DevSecOps - The big picture
DevSecOps - The big picture
Devops Engineer E-Degree In Just 3 Months
DevSecOps - Background, Status and Future Challenges
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
Outpost24 webinar: Turning DevOps and security into DevSecOps
SecDevOps Risk Workflow - v0.6
DevOps to DevSecOps Journey..
Outpost24 webinar - application security in a dev ops world-08-2018
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?

DevOps and Application Security