SlideShare a Scribd company logo
DevSecOops
Illia Lubenets
What is common?
Security is important
Security is important
• Average data breach cost – 4$ millions
• Attacks rose in 2020 – 600%
• Ukraine government is on 5th place of target attacks
• 70% of small business can’t deal with cyber attack
• 16% of healthcare providers are ready to prevent attack
DevSecOps
DevSecOps
• Collective Responsibility
• Collaboration and Integration
• Pragmatic Implementation
• Bridging Compliance and Development
• Automation
• Measure, Monitor, Report and Action
DevSecOps architecture sample
Tooling
Github security tooling
• Code scanning
• Dependabot
• Vulnerability management
Code scaning
• SonarQube
• WhiteSource
• Github
• Code scanning
• Dependabot
• Vulnerability management
• Coverity
• BlackDuck
Threat modeling
• Microsoft Threat Modeling Tool
• Threat Modeler
• Threat Dragon
Dynamic Application Security Testing
• Checkmarx
• Fortify
• ZAP
Infrastructure security tools
• Nessus
• Azure Security Center
• AWS Cloud Security
Conclusion
Security should be proper
Illia Lubenets
• Solution architect
• Microsoft Azure MVP
• https://twitter.com/L0ndra_
• https://t.me/procrastinationselfflagellation
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps»  GO DevOps

More Related Content

PDF
NSS Labs’ 2016 Information Security Predictions
PDF
Outpost24 webinar - A day in the life of an information security professional
PDF
Outpost24 webinar - Busting the myths of cloud security
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
PDF
Save Time and Act Faster with Playbooks
PDF
Outpost24 webinar - Mastering the art of multicloud security
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
NSS Labs’ 2016 Information Security Predictions
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - Busting the myths of cloud security
Acronis Active Protection: A Way To Combat Ransomware Attack
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Save Time and Act Faster with Playbooks
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Implications when migrating to a Zero Trust model

What's hot (20)

PPTX
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
PDF
Cloud Security Architecture - a different approach
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PDF
The Cyber Attack Risk
PPTX
AWS User Group August Edition
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
PDF
Top 5 Cloud Security Predictions for 2016
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PDF
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PDF
Introduction to Threat Modeling
PDF
Azure for Education Ktadeka UCL Cloud Event 2013
PDF
Jul outlook malware18
PPTX
The Case for EDR: What's In Your Toolkit
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
PPTX
The Top 7 Causes of Major Security Breaches
PDF
The Current ICS Threat Landscape
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Cloud Security Architecture - a different approach
Outpost24 webinar: Security Analytics: what's in a risk score
The Cyber Attack Risk
AWS User Group August Edition
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Top 5 Cloud Security Predictions for 2016
Outpost24 Webinar - Creating a sustainable application security program to dr...
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
Ransomware: Why Are Backup Vendors Trying To Scare You?
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Introduction to Threat Modeling
Azure for Education Ktadeka UCL Cloud Event 2013
Jul outlook malware18
The Case for EDR: What's In Your Toolkit
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
The Top 7 Causes of Major Security Breaches
The Current ICS Threat Landscape
Ad

Similar to ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps (20)

PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PPTX
Moving Security to the Left
PDF
The Changing Landscape of Information Security
PDF
The state of web applications (in)security @ ITDays 2016
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
KEY
EISA Considerations for Web Application Security
PPTX
Cyber Security Solution Empowering Digital Safety
PPTX
Solnet dev secops meetup
PDF
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
PPTX
Cloud_Security_and_Emerging_Technologies_Presentation.pptx
PPTX
Top Application Security Trends of 2012
PPTX
Security in an Interconnected and Complex World of Software
PPTX
2013 michael coates-javaone
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in the age of continuous delivery
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Started In Security Now I'm Here
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Moving Security to the Left
The Changing Landscape of Information Security
The state of web applications (in)security @ ITDays 2016
Application Hackers Have A Handbook. Why Shouldn't You?
EISA Considerations for Web Application Security
Cyber Security Solution Empowering Digital Safety
Solnet dev secops meetup
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
Cloud_Security_and_Emerging_Technologies_Presentation.pptx
Top Application Security Trends of 2012
Security in an Interconnected and Complex World of Software
2013 michael coates-javaone
SCS DevSecOps Seminar - State of DevSecOps
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Journey to the Cloud: Securing Your AWS Applications - April 2015
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Security in the age of open source - Myths and misperceptions
Started In Security Now I'm Here
Ad

More from UA DevOps Conference (10)

PPTX
ОЛЕКСАНДР СНІГОВИЙ «Continuous Deployment: Challenges, Solutions, and Lesson...
PDF
АРТЕМ КОБРІН «Achieve Networking at Scale with a Self-Service Network Solutio...
PDF
ОЛЕКСАНДР СИРОТЕНКО «DataKernel: майструючи український фреймворк для highloa...
PDF
ЯРОСЛАВ РАВЛІНКО «Data Science at scale. Next generation data processing plat...
PPTX
ОЛЕКСАНДР ВІЛЬЧИНСЬКИЙ «DevOps culture» Lviv DevOps Conference 2019
PDF
КОСТЯНТИН СЕВЕРЕНЧУК «Monitoring and Automation in DevTestSecOps world» Lviv ...
PPTX
ДЕНИС КЛЕПIКОВ «Long Term storage for Prometheus» Lviv DevOps Conference 2019
PPTX
ОЛЕКСАНДР СНІГОВИЙ «Extension of DevOps: Policy as Code» Lviv DevOps Confere...
PPTX
СТАНІСЛАВ КОЛЕНКІН «Cilium – Network security for microservices. Let’s see ho...
PDF
ОЛЕГ МАЦЬКІВ «Crash course on Operator Framework» Lviv DevOps Conference 2019
ОЛЕКСАНДР СНІГОВИЙ «Continuous Deployment: Challenges, Solutions, and Lesson...
АРТЕМ КОБРІН «Achieve Networking at Scale with a Self-Service Network Solutio...
ОЛЕКСАНДР СИРОТЕНКО «DataKernel: майструючи український фреймворк для highloa...
ЯРОСЛАВ РАВЛІНКО «Data Science at scale. Next generation data processing plat...
ОЛЕКСАНДР ВІЛЬЧИНСЬКИЙ «DevOps culture» Lviv DevOps Conference 2019
КОСТЯНТИН СЕВЕРЕНЧУК «Monitoring and Automation in DevTestSecOps world» Lviv ...
ДЕНИС КЛЕПIКОВ «Long Term storage for Prometheus» Lviv DevOps Conference 2019
ОЛЕКСАНДР СНІГОВИЙ «Extension of DevOps: Policy as Code» Lviv DevOps Confere...
СТАНІСЛАВ КОЛЕНКІН «Cilium – Network security for microservices. Let’s see ho...
ОЛЕГ МАЦЬКІВ «Crash course on Operator Framework» Lviv DevOps Conference 2019

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Machine Learning_overview_presentation.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Machine Learning_overview_presentation.pptx
The AUB Centre for AI in Media Proposal.docx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation

ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps