SlideShare a Scribd company logo
PAGE
1
DEVOPS INDONESIA
DevOps Community in Indonesia
Jakarta, 17 Maret 2021
How to Secure Process in DevOps with
OpenSource (DevSecOps Beginners Guide)
Andre Kurniawan & Alan Adi Prasetyo
PAGE
2
DEVOPS INDONESIA Page 2
About me Nama : Andre Kurniawan
General Manager – i3
Experience in Cloud, DevOps,and Security with over 12 years
Implement more than 50 Project Open Source with high
complexity
Contribute Asian Games 2018
1. Red Hat Certified Architect ( RHCA)
2. Red Hat Certified Instructor and Examiner (RHCI and RHCX )
3. DevSecOps Certified Professional
4. Microsoft Certified Professional ( Azure )
5. MikroTik Trainer ( MCT )
6. IBM Storwize Family Technical Solutions V4
7. Scrum Fundamental Certified ( SFC )
General Manager – i3
www.i-3.co.id
PAGE
3
DEVOPS INDONESIA Page 3
About me Nama : Alan Adi Prasetyo
Team Leader RnD – i3
Linux Geek, Kubernetes and Openshift Enthusiast
- RHCA
- COA
- DevOps
- Researcher
1. Red Hat Certified Architect ( RHCA)
2. Red Hat Certified Instructor (RHCI)
3. DevOps Foundation Certified
4. Alibaba Cloud Associate ( ACA )
5. Certified Openstack Administrator (COA)
6. Scrum Fundamental Certified ( SFC )
Team Leader RnD – i3
www.i-3.co.id
PAGE
4
DEVOPS INDONESIA
What is DevSecOps?
Effort to strive for “Secure by Default”
● Integrate Security via tools
● Create Security as Code culture
● Implement automatic process security
PAGE
5
DEVOPS INDONESIA
How important is it really?
• Agile took us from months to days to deliver software
• DevOps took us from months to minutes to deploy software
• More applications are mission critical
• Now security has become the bottleneck
PAGE
6
DEVOPS INDONESIA
How important is it really?
The Real impact of
hacks & breaches
PAGE
7
DEVOPS INDONESIA
The Evolution of Security Tools
PAGE
8
DEVOPS INDONESIA
Generic Case Study
PAGE
9
DEVOPS INDONESIA
DevSecOps
DEVSECOPS is not Pentesters
You build it, you run it  You build it, you secure it
10
Phase DEVSECOPS
PAGE
11
DEVOPS INDONESIA
Phase about DevSecOps
• Secret Scanning
• Software Composition Analysis (SCA)
• Static Analysis Security Testing (SAST)
• Dynamic Analysis Security Testing (DAST)
• Security in Infrastructure as Code
• RunTime Application Self-Protection (RASP)
• Vulnerability Management (VA)
• Alert and Monitoring in Security
For Starter in DevSecOps
PAGE
12
DEVOPS INDONESIA
Secret Scanning
• Sensitive information such as the access keys,
access tokens, SSH keys etc
• Work on pure Regex-based approach for filtering
sensitive data
Tools :
1. detect-secrets
2. Truffle Hog
PAGE
13
DEVOPS INDONESIA
Software Composition Analysis
• Software Composition Analysis (SCA) is an application
security methodology for managing open source
components.
• Discover all related components, their supporting libraries,
and their direct and indirect dependencies
Tools :
1. Snyk ( All )
2. find-sec-bugs ( Java )
3. retireJS ( Javascript / NodeJS )
4. bundler-audit ( Ruby )
5. Bandit , safety( Python )
PAGE
14
DEVOPS INDONESIA
Software Composition Analysis
Tools : Snyk
Tools : Depedency-Check
PAGE
15
DEVOPS INDONESIA
Static Analysis Security Testing
• White-box security testing using automated tools
• Useful for weeding out low-hanging fruits like SQL
Injection, Cross-Site Scripting, insecure libraries etc
• Needs manual oversight for managing false-
positives
Tools : Sonarqube
PAGE
16
DEVOPS INDONESIA
Static Analysis Security Testing
“ Secure your code “
PAGE
17
DEVOPS INDONESIA
Dynamic Analysis Security Testing
• Black/Grey-box security testing using automated tools
• DAST will help in picking out deployment specific issues
• Results from DAST and SAST can be compared to weed out
false-positives
Tools : nmap, nikto, sqlmap, metasploit, Nessus, zap, w3af,
wapiti, sslyze, dirb, hydra, burpsuite, etc
“ We can use tools pentest but must support cmd and export file “
PAGE
18
DEVOPS INDONESIA
Dynamic Analysis Security Testing
PAGE
19
DEVOPS INDONESIA
Security in Infrastructure Code
• Infrastructure as a code allows you to document and version
control the infra
• It also allows you to perform audit on the infrastructure
• Environment is as secure as the base image container
• Hardening your server with automation (Compliance as Code)
Tools :
Infrastructure
Code
Image
Scanning
Hardening
ansible inspec clair anchore dockscan openscap
PAGE
20
DEVOPS INDONESIA
Security in Infrastructure Code
PAGE
21
DEVOPS INDONESIA
Vulnerability Management
• A central dashboard is required to normalize the data
• Vulnerability Management System can then be integrated to
bug tracking systems
Tools :
1. defect dojo
2. archery
Vulnerability Management
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
PAGE
24
DEVOPS INDONESIA
Alert and Monitoring Security
Monitoring is needed for two end goals
• Understand if our security controls are effective
• What and where we need to improve
Tools :
1. grafana
2. elk
3. WAF
4. Dynatrace
5. Aqua Security
6. Imperva
“Detect, Mitigation ,and Maintain
Continuous Security”
PAGE
25
DEVOPS INDONESIA
Alert and Monitoring Security
https://github.com/defenxor/dsiem
26
DEVSECOPS Pipeline
PAGE
27
DEVOPS INDONESIA
Inject Security in Process DevOps
PAGE
28
DEVOPS INDONESIA
Sample Pipeline
29
DSOMM (Maturity Model)
PAGE
30
DEVOPS INDONESIA
How we start to DevSecOps
Choose with DevSecOps Maturity Model
(DSOMM)
PAGE
31
DEVOPS INDONESIA
How we start to DevSecOps
Choose with DevSecOps Maturity Model
(DSOMM)
PAGE
32
DEVOPS INDONESIA
DSOMM Model
• Static Depth: How deep is static code analysis ?
• Dynamic Depth: How deep are dynamic scans executed ?
• Intensity: How intense are the majority of the executed
attacks ?
• Consolidation: How complete is the process of handling
findings ?
https://dsomm.timo-pagel.de/
PAGE
33
DEVOPS INDONESIA
DSOMM Model
Try to Implement Maturity 1 and 2
PAGE
34
DEVOPS INDONESIA
Level 1
• Never fail a build. There are false positives. Ensure tools are fit for the
pipeline
• Ensure team training through champions programs and partnership.
• Start small, rollout SCA, then token scanning then …
• Your process should provide immediate feedback
• Consolidating - Super helpful but not yet a necessity
PAGE
35
DEVOPS INDONESIA
Level 2
1. Now that some scans are being run in pipeline, incrementally
improve
2. Include minor tweaks to static scans
3. Minor tweaks to DAST - Target worrisome areas
4. Run your scans more often
5. Store the results somewhere central for your review.
6. Meet regularly with and support your champions
36
Strategy implement
DEVSECOPS
A leading open source influencer to create a flexible and agile IT environment in Indonesia.
PAGE
37
DEVOPS INDONESIA
Strategy DevSecOps
1. Implement DevSecOps Maturity Level 1 and 2
2. Use DevSecOps Security Controls Design
3. Start from small. (SCA, SAST, DAST, and Vulnerability Management)
4. Ensure team training through champions programs
Inject Security in Process DevOps
PAGE
39
DEVOPS INDONESIA
Demonstration
Demo Flow DevSecOps
Our social media
@devopsindonesia
http://www.devopsindonesia.com
@IDDevOps
@DevOpsIndonesia
@IDDevOps DevOps Indonesia
AloneWearesmart,togetherWearebrilliant
THANKYOU!
Quote by Steve Anderson

More Related Content

PPTX
DevSecOps
PDF
Introduction to DevSecOps
PDF
DevSecOps What Why and How
PPTX
How to Get Started with DevSecOps
PDF
Slide DevSecOps Microservices
PDF
Secure coding presentation Oct 3 2020
PDF
Dos and Don'ts of DevSecOps
DevSecOps
Introduction to DevSecOps
DevSecOps What Why and How
How to Get Started with DevSecOps
Slide DevSecOps Microservices
Secure coding presentation Oct 3 2020
Dos and Don'ts of DevSecOps

What's hot (20)

PPTX
DevSecOps reference architectures 2018
PDF
DevSecOps The Evolution of DevOps
PDF
DevSecOps in Baby Steps
PDF
DevSecOps: What Why and How : Blackhat 2019
PPTX
(Ab)Using GPOs for Active Directory Pwnage
PDF
DevSecOps Implementation Journey
PDF
DevSecOps
PDF
2019 DevSecOps Reference Architectures
PPTX
DevSecOps : an Introduction
PDF
Scaling DevSecOps Culture for Enterprise
PDF
Practical DevSecOps - Arief Karfianto
PPTX
DevOps to DevSecOps Journey..
PDF
Demystifying DevSecOps
PDF
DevSecOps
PDF
Practical DevSecOps Course - Part 1
PPTX
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
PPTX
Secure SDLC Framework
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Mobile Application Penetration Testing
DevSecOps reference architectures 2018
DevSecOps The Evolution of DevOps
DevSecOps in Baby Steps
DevSecOps: What Why and How : Blackhat 2019
(Ab)Using GPOs for Active Directory Pwnage
DevSecOps Implementation Journey
DevSecOps
2019 DevSecOps Reference Architectures
DevSecOps : an Introduction
Scaling DevSecOps Culture for Enterprise
Practical DevSecOps - Arief Karfianto
DevOps to DevSecOps Journey..
Demystifying DevSecOps
DevSecOps
Practical DevSecOps Course - Part 1
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Secure SDLC Framework
DevSecOps Jenkins Pipeline -Security
Mobile Application Penetration Testing
Ad

Similar to DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource (20)

PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
PDF
DevOps Indonesia #9 - DevSecOps
PPTX
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PDF
Strengthen and Scale Security for a dollar or less
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PDF
Scale security for a dollar or less
PPTX
Introduction to DevSecOps
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PPTX
State of DevSecOps - DevSecOpsDays 2019
PPTX
Ahmed Abugharbia - Securing Cloud DevOps Cycle.pptx
PPTX
Secure DevOps - Evolution or Revolution?
PDF
How To Implement DevSecOps In Your Existing DevOps Workflow
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PPTX
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
PPTX
DevSecOps Powerpoint Presentation for Students
DevSecOps : The Open Source Way by Yusuf Hadiwinata
DevOps Indonesia #9 - DevSecOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Devops Indonesia - DevSecOps - The Open Source Way
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Pentest is yesterday, DevSecOps is tomorrow
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
Strengthen and Scale Security for a dollar or less
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
Scale security for a dollar or less
Introduction to DevSecOps
DevSecOps Best Practices-Safeguarding Your Digital Landscape
State of DevSecOps - DevSecOpsDays 2019
Ahmed Abugharbia - Securing Cloud DevOps Cycle.pptx
Secure DevOps - Evolution or Revolution?
How To Implement DevSecOps In Your Existing DevOps Workflow
Why Security Engineer Need Shift-Left to DevSecOps?
Outpost24 webinar - application security in a dev ops world-08-2018
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevSecOps Powerpoint Presentation for Students
Ad

More from DevOps Indonesia (20)

PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
PDF
Securing an NGINX deployment for K8s
PDF
DevOps Indonesia Meetup #52 - announcement
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
PDF
Securing DevOps Lifecycle
PDF
DevOps Meetup 50 : Securing your Application - Announcement
PDF
Secure your Application with Google cloud armor
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
PDF
Operate Containers with AWS Copilot
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
PDF
Securing Your Database Dynamic DB Credentials
PDF
DevOps Indonesia (online) meetup 45 - Announcement
PDF
The Death and Rise of Enterprise DevOps
PDF
API Security Webinar - Credential Stuffing
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Hendra Tanto
PDF
API Security Webinar : Credential Stuffing
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
PDF
Feature Scoring in Green Field Application Development and DevOps
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
Securing an NGINX deployment for K8s
DevOps Indonesia Meetup #52 - announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Securing DevOps Lifecycle
DevOps Meetup 50 : Securing your Application - Announcement
Secure your Application with Google cloud armor
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
Operate Containers with AWS Copilot
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
Securing Your Database Dynamic DB Credentials
DevOps Indonesia (online) meetup 45 - Announcement
The Death and Rise of Enterprise DevOps
API Security Webinar - Credential Stuffing
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Hendra Tanto
API Security Webinar : Credential Stuffing
API Security Webinar : Security Guidelines for Providing and Consuming APIs
Feature Scoring in Green Field Application Development and DevOps

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx

DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource