SlideShare a Scribd company logo
DevSecOpsDevSecOps
A New Hope for Security in CI/CDA New Hope for Security in CI/CD
Featuring
Franklin Mosley
Senior Application Security Engineer
PagerDuty
1
“Fear is the path to the dark side…fear“Fear is the path to the dark side…fear
leads to anger…anger leads to hate…hateleads to anger…anger leads to hate…hate
leads to suffering.”leads to suffering.”
2
ThenThen
3
NowNow
4
5
““I find your lack of securityI find your lack of security
disturbing.disturbing.””
6
21% of all data breach incidents occur
from attacks on web applications
Source: Verizon Data Breach Investigations Report - http://www.verizonenterprise.com/verizon-insights-lab/dbir/tool/pattern/web-applications 7
import re
re.search('([Dd]ev[Ss]ec|[Ss]ec[Dd]ev|[Rr]uggeds[Dd]ev)[Oo]ps')
Automated Speed Scale People
8
How do we get there?How do we get there?
9
Change the security mindsetChange the security mindset
10
Change the security mindsetChange the security mindset
Security: Stop being the organization of "No"
Security: Walk in a developer's shoes
Developer: 48%* know security is important
Shift left and integrate throughout the SDLC
* Source: Sonatype "2018 DevSecOps Community Survey" - https://www.sonatype.com/2018survey
11
SecuritySecurity
12
Change the security mindsetChange the security mindset
Security: Stop being the organization of "No"
Security: Walk in a developer's shoes
Developer: 48%* know security is important
Shift left and integrate throughout the SDLC
* Source: Sonatype "2018 DevSecOps Community Survey" - https://www.sonatype.com/2018survey
13
Who's responsible for security?Who's responsible for security?
SecurityDevelopers Operations
14
You code it. You own it.You code it. You own it.
45% increase in number of changes deployed to production
25% reduction in major incidents that impact customers
50% reduction in Mean Time To Resolution (MTTR) of major incidents
Less silo-based knowledge centers
Source: PagerDuty "Owning Your Code is Better" - https://www.pagerduty.com/blog/developers-own-code/
15
““Do. Or do not. There is no try.Do. Or do not. There is no try.””
16
17
Application ScanningApplication Scanning
Long scan timesLong scan times
False PositivesFalse Positives
Did not scaleDid not scale
100% coverage?100% coverage?
18
“I assure you, Lord Vader.“I assure you, Lord Vader.
My men are working asMy men are working as
fast as they can.”fast as they can.”
19
Application ScanningApplication Scanning
Targeted testingTargeted testing
Integrate with Q/AIntegrate with Q/A
ScaleScale
20
21
22
23
Make it easy to do the rightMake it easy to do the right
thingthing
24
25
Source Code ScanningSource Code Scanning
Use the right tool for the jobUse the right tool for the job
Full scansFull scans
26
Source Code ScanningSource Code Scanning
Incremental scansIncremental scans
Use the right tool for the jobUse the right tool for the job
27
28
Container/AMI ValidationContainer/AMI Validation
Early in the pipelineEarly in the pipeline
Learn to use the toolsLearn to use the tools
Golden imagesGolden images
29
30
Security OperationsSecurity Operations
Be Reactive and ResponsiveBe Reactive and Responsive
Learn normal from abnormal behaviorLearn normal from abnormal behavior
Act on it!Act on it!
31
TL;DRTL;DR
Security is a shared responsibilitySecurity is a shared responsibility
Change the security mindsetChange the security mindset
Owning the code is betterOwning the code is better
Be FrictionlessBe Frictionless
32
“You must“You must
unlearnunlearn
what youwhat you
havehave
learned.”learned.”
33
Thank You!Thank You!
Franklin MosleyFranklin Mosley
@fpmosley3
/in/franklinmosley
34

More Related Content

PDF
The New Security Playbook: DevSecOps
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
PDF
Demystifying DevSecOps
PPTX
DevSecOps : an Introduction
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
The New Security Playbook: DevSecOps
Maturing DevSecOps: From Easy to High Impact
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Demystifying DevSecOps
DevSecOps : an Introduction
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...

What's hot (20)

PPTX
How to get the best out of DevSecOps - an operations perspective
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
PDF
DevOps or DevSecOps
PDF
Zero to Ninety in Securing DevOps
PDF
Getting to Know Security and Devs: Keys to Successful DevSecOps
PDF
DevSecCon London 2018: Open DevSecOps
PDF
Adversary Driven Defense in the Real World
PDF
DevSecOps: Bringing security to the DevOps pipeline
PDF
DevSecOps at Agile 2019
PDF
Practical DevSecOps Course - Part 1
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
PDF
2019 DevSecOps Reference Architectures
PDF
Introduction to DevSecOps
PDF
DevSecOps - The big picture
PPTX
Introduction to DevSecOps
PPTX
DevSecOps reference architectures 2018
PDF
The State of DevSecOps
PPTX
DevSecOps
PDF
DevSecOps The Evolution of DevOps
How to get the best out of DevSecOps - an operations perspective
RSAC DevSecOpsDays 2018 - We are all Equifax
DevOps or DevSecOps
Zero to Ninety in Securing DevOps
Getting to Know Security and Devs: Keys to Successful DevSecOps
DevSecCon London 2018: Open DevSecOps
Adversary Driven Defense in the Real World
DevSecOps: Bringing security to the DevOps pipeline
DevSecOps at Agile 2019
Practical DevSecOps Course - Part 1
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
2019 DevSecOps Reference Architectures
Introduction to DevSecOps
DevSecOps - The big picture
Introduction to DevSecOps
DevSecOps reference architectures 2018
The State of DevSecOps
DevSecOps
DevSecOps The Evolution of DevOps
Ad

Similar to DevSecOps: A New Hope for Security in CI/CD (20)

PDF
Building Security Teams
PDF
AppSec How-To: Achieving Security in DevOps
PDF
AppSec in an Agile World
PPTX
Digital Product Security
DOCX
10 things to get right for successful dev secops
PPT
Intro to-ssdl--lone-star-php-2013
PPTX
Turning security into code by Jeff Williams
PDF
Integrating DevOps and Security
ODP
CISSP Week 12
PDF
Shift Left Security
PPT
Software Security Engineering
PDF
Devops is a Security Requirement
PPTX
DevSecOps without DevOps is Just Security
PPTX
7-Software_Development_Security.pptx
PDF
The What, Why, and How of DevSecOps
PDF
Top 5 best practice for delivering secure in-vehicle software
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PPTX
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
PPTX
Speed with Confidence
Building Security Teams
AppSec How-To: Achieving Security in DevOps
AppSec in an Agile World
Digital Product Security
10 things to get right for successful dev secops
Intro to-ssdl--lone-star-php-2013
Turning security into code by Jeff Williams
Integrating DevOps and Security
CISSP Week 12
Shift Left Security
Software Security Engineering
Devops is a Security Requirement
DevSecOps without DevOps is Just Security
7-Software_Development_Security.pptx
The What, Why, and How of DevSecOps
Top 5 best practice for delivering secure in-vehicle software
Perforce on Tour 2015 - Grab Testing By the Horns and Move
Best Practices for a Mature Application Security Program Webinar - February 2016
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Speed with Confidence
Ad

More from Franklin Mosley (6)

PDF
Taking Security Responsibility in the AWS Cloud
PDF
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
PDF
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
PDF
DevSecOps: Minimizing Risk, Improving Security
PDF
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
PDF
RoboCop: Bringing Law and Order to CI/CD
Taking Security Responsibility in the AWS Cloud
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
DevSecOps: Minimizing Risk, Improving Security
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
RoboCop: Bringing Law and Order to CI/CD

Recently uploaded (20)

PDF
Website Design Services for Small Businesses.pdf
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PPTX
assetexplorer- product-overview - presentation
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
Website Design Services for Small Businesses.pdf
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Complete Guide to Website Development in Malaysia for SMEs
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
CHAPTER 2 - PM Management and IT Context
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Design an Analysis of Algorithms I-SECS-1021-03
Reimagine Home Health with the Power of Agentic AI​
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Computer Software and OS of computer science of grade 11.pptx
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
assetexplorer- product-overview - presentation
wealthsignaloriginal-com-DS-text-... (1).pdf
Wondershare Filmora 15 Crack With Activation Key [2025

DevSecOps: A New Hope for Security in CI/CD