SlideShare a Scribd company logo
DevSecOps
Security and Compliance at the Speed of
Continuous Delivery
Agile Ottawa June 2018
Tehama
• Delivers privileged technical services
over the internet with
– Transparency
– Security
– Auditability
• Ensures trust while enabling quick
onboarding and connectivity
Tehama and SOC2
• Decided early on that SOC2 was
mandatory to build trust with clients
– Demonstrates robust security practices
via a trusted 3rd party
Compliance Basics
• Say what you’re going to do
• Do it
• Prove that you did it
– Easy =)
Compliance Basics
• Say what you’re going to do
– Done via Security Controls, plans, and
processes
• Do it
– Hard
• Prove that you did it
– Evidence
• Hardest ... if you haven’t planned for it
Control Example
• A vulnerability management plan is
maintained to identify potential threats.
Threats are triaged and mitigated as
required. Remediation plans are developed
to address risks.
DevSecOps
• DevOps used to deliver and run systems in a
secure and reliable way
• Bringing in Security and Compliance
increases the focus on Ops
– “You build it, you run it”
DevSecOps
• Look at security and compliance as a
– Release problem
– Test problem
– Monitoring and observability problem
• Leverage security and compliance expertise
in building out the system
– This is the secret sauce
Tehama and DevSecOps
• Security and compliance can’t be “the office
of no”
• Make it secure in order to demonstrate
compliance
– Keep it valuable
– Don’t make it a checkbox exercise
– E.g. continuous vuln mgmt is much better
than a monthly review cycle
There is no Magic
• It’s just mature DevOps
– DevSecOps
– DevOpsSec
– Rugged DevOps
• But it is a good phrase to search with
DevOps Patterns
• Infrastructure as Code
• Continuous Delivery
• Continuous Monitoring
• Learning from Failure
• Collaborative Culture
Security Patterns
Using DevOps to implement
• Defense in depth
• Access control
• Principle of least privilege
Policy Designed for CI/CD
Change Management
• Standard Change
– Pre-approved
– Move most changes here
– High success rate, low MTTR
• High Risk Change
– Classic security approval
• Emergency Change
– Post release approval
– Don’t block an emergency change
Policy Requires Vulnerability
Management
Common categorization between tools
• Tools find CVEs
– Common Vulnerabilities and Exposures
• Classified via Common Vulnerability Scoring
System
– CVSS
• Includes remediation timelines (SLA)
Implementation
Security is everyone’s job, all the time
• Design it into the system, then it is just how
the software is delivered
• Audit evidence is generated during daily
work
– Not a scramble before an audit
Implementation
Secure software supply chain
• All images and OSs are from trusted repos
– Hardened
• All software dependencies are scanned
• Patch management is a priority
– Custom software dependencies
– EC2 OS
– Docker images
– Open source applications
Implementation - SDLC
The SDLC is based on a CI/CD pipeline
Automatic
• SAST
– Static Application Security Testing
• DAST
– Dynamic Application Security Testing
• SCA
– Software Component Analysis
• Container vulnerability analysis
Implementation - SDLC
Manual
• Prioritization and planning
• Pull requests and code review
– Code review guidelines call out security
concerns with a standard checklist
• PR approval, and release authorization
Implementation - Monitoring
Vulnerability plan includes intrusion detection
Requires monitoring and alerting to detect
incidents
• Alerting will launch Incident Response (IR)
• Note, manual detection is still in scope
– Strange system behaviour
– Customer reports
– AWS security
– Law enforcement
Implementation - IR
Vulnerability plan includes intrusion detection
Requires monitoring and alerting to detect
incidents
• Alerting will launch Incident Response (IR)
• Manual detection is still in scope
– Noticing strange system behaviour
– Customer reports
– AWS security
– Law enforcement
Implementation - IR and Logging
DevOps includes a focus on monitoring and
observability
• This is adds big value
• Enables robust Incident Response and
troubleshooting capabilities
Where’s the Evidence?
• Agile planning
• Work ticket workflow
– Pull requests
• CI/CD scan logs
– Remediation tickets
• Release ticket workflow
– Authorization
• Production monitoring
• Incident tickets
• Chat Ops
• Blameless post-mortems
– Remediation tickets
Results
• Last pen test had no findings
• Security and compliance dev work is not exceptional
• First audit (Type 1) passed without complications
– Kudos from auditors
• Second audit (Type 2) had no major out of band work
for developers or compliance
• Continuous improvement on logging and monitoring
• IR and post-mortem process well established
References
• DevOpsSec: Securing software through continuous delivery
– https://www.safaribooksonline.com/library/view/devopssec/978149197
1413/
• DevOps Audit Defense Toolkit
– https://itrevolution.com/devops-audit-defense-toolkit/
• The DevOps Handbook: How to Create World-Class Agility, Reliability, and
Security in Technology Organizations
– Chapter 19
– Section VI
– Appendix 9
– https://www.amazon.ca/DevOps-Handbook-World-Class-Reliability-
Organizations/dp/1942788002
References
• Accelerate: The Science of Lean Software and DevOps: Building and
Scaling High Performing Technology Organizations
– Chapter 6
– https://www.amazon.ca/Accelerate-Software-Performing-Technology-
Organizations/dp/1942788339/
• Incident Management for Operations
– https://www.amazon.ca/Incident-Management-Operations-Rob-
Schnepp/dp/1491917628/
• Pagerduty Incident Response
– https://response.pagerduty.com/
• Incident Response: Trade-offs Under Pressure
– https://www.slideshare.net/InfoQ/incident-response-tradeoffs-under-
pressure
References
• Blameless PostMortems and a Just Culture
– https://codeascraft.com/2012/05/22/blameless-postmortems/
• The infinite hows
– https://www.oreilly.com/ideas/the-infinite-hows
• Debriefing Facilitation Guide
– https://extfiles.etsy.com/DebriefingFacilitationGuide.pdf
• Was it technical failure or human error?
– https://www.youtube.com/watch?v=Ygx2AI2RtkI
• AWS Monitoring & Logging
– https://www.slideshare.net/JasonPoley/aws-monitoring-logging
• Container & Microservice Security
– https://www.youtube.com/watch?v=8tDpGyVV8OQ

More Related Content

PPTX
Agile and Secure SDLC
PPTX
Havex Deep Dive (English)
PPTX
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
PPTX
Splitting The Check On Compliance and Security
PPTX
Integrating the Alphabet Soup of Standards
PPTX
Key Findings from the 2019 State of DevOps Report
PPTX
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
PDF
Flight East 2018 Presentation–Black Duck at Docusign
Agile and Secure SDLC
Havex Deep Dive (English)
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Splitting The Check On Compliance and Security
Integrating the Alphabet Soup of Standards
Key Findings from the 2019 State of DevOps Report
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Flight East 2018 Presentation–Black Duck at Docusign

What's hot (20)

PDF
Putting the Sec into DevOps
PPTX
Dev opsandsecurity owasp
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PPTX
Vulnerability Inheritance in ICS (English)
PPTX
Securing the continuous integration
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
PDF
Practical Application of Agile Techniques in Developing Safety Related Systems
PDF
Applying formal methods to existing software by B.Monate
PPT
Agile methods and safety critical software - Peter Gardner
PDF
Monitoring ICS Communications
PPT
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
PDF
PCI and Vulnerability Assessments - What’s Missing
PDF
S4xJapan Closing Keynote
PPTX
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
PDF
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
PPTX
Cyber security - It starts with the embedded system
PPTX
Using Assessment Tools on ICS (English)
PPTX
ICS Performance Lab
PDF
Girish Dambal Ver 1.1
PPTX
Challenges of Agile Qualification
Putting the Sec into DevOps
Dev opsandsecurity owasp
CISSP Prep: Ch 7. Security Assessment and Testing
Vulnerability Inheritance in ICS (English)
Securing the continuous integration
Perforce on Tour 2015 - Grab Testing By the Horns and Move
Practical Application of Agile Techniques in Developing Safety Related Systems
Applying formal methods to existing software by B.Monate
Agile methods and safety critical software - Peter Gardner
Monitoring ICS Communications
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
PCI and Vulnerability Assessments - What’s Missing
S4xJapan Closing Keynote
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
Cyber security - It starts with the embedded system
Using Assessment Tools on ICS (English)
ICS Performance Lab
Girish Dambal Ver 1.1
Challenges of Agile Qualification
Ad

Similar to DevSecOps: Security and Compliance at the Speed of Continuous Delivery (20)

PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
PDF
Journey to the center of DevOps - v6
PPTX
SecDevOps: The New Black of IT
PDF
AppSec in an Agile World
PPTX
Efforts in Scaling Application Security Programs
PPTX
DevSecOps - It can change your life (cycle)
PPTX
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
DevSecOps Story with added security controls
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
PPTX
Secure DevOPS Implementation Guidance
PPTX
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPT
Lecture Course Outline and Secure SDLC.ppt
PPTX
Digital Product Security
PDF
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
PPTX
Devops as a service
PPTX
Introduction to DevSecOps OWASP Ahmedabad
Dev secops security and compliance at the speed of continuous delivery - owasp
Journey to the center of DevOps - v6
SecDevOps: The New Black of IT
AppSec in an Agile World
Efforts in Scaling Application Security Programs
DevSecOps - It can change your life (cycle)
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
Succeeding-Marriage-Cybersecurity-DevOps final
DevSecOps Story with added security controls
Bringing Security Testing to Development: How to Enable Developers to Act as ...
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
Secure DevOPS Implementation Guidance
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Lecture Course Outline and Secure SDLC.ppt
Digital Product Security
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Devops as a service
Introduction to DevSecOps OWASP Ahmedabad
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools

DevSecOps: Security and Compliance at the Speed of Continuous Delivery

  • 1. DevSecOps Security and Compliance at the Speed of Continuous Delivery Agile Ottawa June 2018
  • 2. Tehama • Delivers privileged technical services over the internet with – Transparency – Security – Auditability • Ensures trust while enabling quick onboarding and connectivity
  • 3. Tehama and SOC2 • Decided early on that SOC2 was mandatory to build trust with clients – Demonstrates robust security practices via a trusted 3rd party
  • 4. Compliance Basics • Say what you’re going to do • Do it • Prove that you did it – Easy =)
  • 5. Compliance Basics • Say what you’re going to do – Done via Security Controls, plans, and processes • Do it – Hard • Prove that you did it – Evidence • Hardest ... if you haven’t planned for it
  • 6. Control Example • A vulnerability management plan is maintained to identify potential threats. Threats are triaged and mitigated as required. Remediation plans are developed to address risks.
  • 7. DevSecOps • DevOps used to deliver and run systems in a secure and reliable way • Bringing in Security and Compliance increases the focus on Ops – “You build it, you run it”
  • 8. DevSecOps • Look at security and compliance as a – Release problem – Test problem – Monitoring and observability problem • Leverage security and compliance expertise in building out the system – This is the secret sauce
  • 9. Tehama and DevSecOps • Security and compliance can’t be “the office of no” • Make it secure in order to demonstrate compliance – Keep it valuable – Don’t make it a checkbox exercise – E.g. continuous vuln mgmt is much better than a monthly review cycle
  • 10. There is no Magic • It’s just mature DevOps – DevSecOps – DevOpsSec – Rugged DevOps • But it is a good phrase to search with
  • 11. DevOps Patterns • Infrastructure as Code • Continuous Delivery • Continuous Monitoring • Learning from Failure • Collaborative Culture
  • 12. Security Patterns Using DevOps to implement • Defense in depth • Access control • Principle of least privilege
  • 13. Policy Designed for CI/CD Change Management • Standard Change – Pre-approved – Move most changes here – High success rate, low MTTR • High Risk Change – Classic security approval • Emergency Change – Post release approval – Don’t block an emergency change
  • 14. Policy Requires Vulnerability Management Common categorization between tools • Tools find CVEs – Common Vulnerabilities and Exposures • Classified via Common Vulnerability Scoring System – CVSS • Includes remediation timelines (SLA)
  • 15. Implementation Security is everyone’s job, all the time • Design it into the system, then it is just how the software is delivered • Audit evidence is generated during daily work – Not a scramble before an audit
  • 16. Implementation Secure software supply chain • All images and OSs are from trusted repos – Hardened • All software dependencies are scanned • Patch management is a priority – Custom software dependencies – EC2 OS – Docker images – Open source applications
  • 17. Implementation - SDLC The SDLC is based on a CI/CD pipeline Automatic • SAST – Static Application Security Testing • DAST – Dynamic Application Security Testing • SCA – Software Component Analysis • Container vulnerability analysis
  • 18. Implementation - SDLC Manual • Prioritization and planning • Pull requests and code review – Code review guidelines call out security concerns with a standard checklist • PR approval, and release authorization
  • 19. Implementation - Monitoring Vulnerability plan includes intrusion detection Requires monitoring and alerting to detect incidents • Alerting will launch Incident Response (IR) • Note, manual detection is still in scope – Strange system behaviour – Customer reports – AWS security – Law enforcement
  • 20. Implementation - IR Vulnerability plan includes intrusion detection Requires monitoring and alerting to detect incidents • Alerting will launch Incident Response (IR) • Manual detection is still in scope – Noticing strange system behaviour – Customer reports – AWS security – Law enforcement
  • 21. Implementation - IR and Logging DevOps includes a focus on monitoring and observability • This is adds big value • Enables robust Incident Response and troubleshooting capabilities
  • 22. Where’s the Evidence? • Agile planning • Work ticket workflow – Pull requests • CI/CD scan logs – Remediation tickets • Release ticket workflow – Authorization • Production monitoring • Incident tickets • Chat Ops • Blameless post-mortems – Remediation tickets
  • 23. Results • Last pen test had no findings • Security and compliance dev work is not exceptional • First audit (Type 1) passed without complications – Kudos from auditors • Second audit (Type 2) had no major out of band work for developers or compliance • Continuous improvement on logging and monitoring • IR and post-mortem process well established
  • 24. References • DevOpsSec: Securing software through continuous delivery – https://www.safaribooksonline.com/library/view/devopssec/978149197 1413/ • DevOps Audit Defense Toolkit – https://itrevolution.com/devops-audit-defense-toolkit/ • The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations – Chapter 19 – Section VI – Appendix 9 – https://www.amazon.ca/DevOps-Handbook-World-Class-Reliability- Organizations/dp/1942788002
  • 25. References • Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations – Chapter 6 – https://www.amazon.ca/Accelerate-Software-Performing-Technology- Organizations/dp/1942788339/ • Incident Management for Operations – https://www.amazon.ca/Incident-Management-Operations-Rob- Schnepp/dp/1491917628/ • Pagerduty Incident Response – https://response.pagerduty.com/ • Incident Response: Trade-offs Under Pressure – https://www.slideshare.net/InfoQ/incident-response-tradeoffs-under- pressure
  • 26. References • Blameless PostMortems and a Just Culture – https://codeascraft.com/2012/05/22/blameless-postmortems/ • The infinite hows – https://www.oreilly.com/ideas/the-infinite-hows • Debriefing Facilitation Guide – https://extfiles.etsy.com/DebriefingFacilitationGuide.pdf • Was it technical failure or human error? – https://www.youtube.com/watch?v=Ygx2AI2RtkI • AWS Monitoring & Logging – https://www.slideshare.net/JasonPoley/aws-monitoring-logging • Container & Microservice Security – https://www.youtube.com/watch?v=8tDpGyVV8OQ