SlideShare a Scribd company logo
SESSION ID:
#RSAC
Hasan Yasar
DOS AND DON'TS OF DEVSECOPS
DEV-F01
Technical Manager, Adjunct Faculty Member
CERT | Software Engineering Institute | Carnegie Mellon University
@SecureLifeCycle
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Notices
Copyright 2018 Carnegie Mellon University. All Rights Reserved.
This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie
Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS.
CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT
NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE
MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT,
TRADEMARK, OR COPYRIGHT INFRINGEMENT.
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for
non-US Government use and distribution.
This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting
formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at
permission@sei.cmu.edu.
Carnegie Mellon® and CERT® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
DM18-0424
#RSAC
THE FACT!
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
4
2017 Incident Highlights
• 159,700 total cyber incidents
• 7 billion records exposed in first 3 Qtr
• $5 billion financial impact
• 93% of breaches could have been prevented
*Online Trust Alliance report 2018
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Software Vulnerabilities (CVEs) by Year
Source: cve.mitre.org as of August 2017
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
The world we live in..
Software is eating up the world !
Marc Andreessen
https://www.wsj.com/articles/SB10001424053111903480904576512250915629460
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
How We Manage Software Security -
Application Security Metrics , Financial Institutes
Source: “Managing Application Security”, Security Compass, 2017.
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Challenges with Secure Software Development
• Writing code is hard
• Lack of security skills
• Legacy software
• Best practices are insufficient
• Lack of risk focus, lack of audit
and control points
• Wrong automated tools
8
• Unsupervised collaboration
• Emphasis on speed
• Vulnerabilities in deployment
pipeline
• Unprotected production
environment
• Lack of security requirements
traceability
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
So we all do “Last Minute Security”…
https://dzone.com/articles/last-minute-security-comic
#RSAC
DEVOPS WITH PRINCIPLES
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Three Pillars , p3
DevOps enables “Continuous Everything” on
People
Process
Platform
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
BLUF(Bottom Line Up Front) : People
• Heavy collaboration between all stakeholders
• Secure Design / Architecture decisions
• Secure Environment / Network configuration
• Secure Deployment planning
• Secure Code Review
• Constantly available open communication channels:
• Dev and OpSec together in all project decision meeting
• Chat/e-mail/Wiki services available to all team members
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
BLUF: Process
• Establish a process to enable people to succeed using
the platform to develop secure application
• Such that;
• Constant communication and visible to all
• Ensures that tasks are testable and repeatable
• Frees up human experts to do challenging, creative
work
• Allows tasks to be performed with minimal effort or
cost
• Creates confidence in task success, after past
repetitions
• Faster deployment , frequent quality release
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
BLUF: Platform
• Where people use process to build secure
software
• Automated environment creation and
provisioning
• Automated infrastructure testing
• Parity between Development, QA, Staging,
and Production environments
• Sharing and versioning of environmental
configurations
• Collaborative environment between all
stakeholders
#RSAC
DEVSECOPS
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Enhancing SDLC Security
Secure
DevOps Lifecycle
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Security must be addressed without
breaking the rapid delivery, continuous
feedback model
Security must be addressed without breaking the rapid delivery,
continuous feedback model
Security must be addressed without breaking the
rapid delivery, continuous feedback model!
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Devs
Enhancing SDLC Security
Secure
DevOps Lifecycle
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Devs
Continuous Feedback
to Developer and others
Enhancing SDLC Security
Secure
DevOps Lifecycle
#RSAC
DEVSECOPS
Dos and Don’ts
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Automation
• Don’t leave security automation out of your DevOps automation strategy
• Automated security testing removes human error, infrequent execution, and
excuses
• Don’t try to avoid open source with policies, it is coming whether you like it or
not!
• InfoSec must maintain awareness of open source vulnerabilities and
continuously check for them
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Automation
You automate…
…builds
…functional tests
…deployment
…reporting
…the coffee machine (as we do)
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Multiverse: Environment Parity
• When environments are not the same,
• app may never behave predictably.
• Environment parity (between dev, test, prod) is critical for controlling opportunity
for security gaps
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Multiverse: Environment Parity
• Automate manual steps to the extent possible
• Make development environment parity a priority
• Get Ops involved in creating all environments, including Dev
• Focus on providing fast easy-to-use automation tools for developers everyone to
keep environments in synch
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Configuration: IaC
• Uncontrolled configuration changes will
lead to an unmanageable, unpredictable,
and unrepeatable solution
• Easy for info security to get out of synch; For
example, change in DNS and you have security
hole.
• Avoid the manual quick fix particularly for
configuration changes
• Put configuration files under configuration
controls
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Infiltrator – Insider Threat
• He sneaks in…
• …and alters production …but he works for you!
• Set up roles and revoke administrative access to
manually edit production
• Configure prod environment to alert the entire
team when manually accessed. Transparency is
key.
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Incident:
We have all been there…
Intrusions overnight…
…cascading system failures…
…it’s all crashing…
…help…me..…
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Response
• But you survive…
• Glad its over. Going to go sleep for 18 hours…and then back to the normal
cycle.
• When do we analyze what went wrong?
• How do we prevent similar failures in the future?
• Just forget it is over!
• All failures must result in codified change to DevOps process
• Understand exactly what went wrong
• Never let the same failure happen twice
• Propagate fixes across the enterprise
• Ensure that you teach the next generation
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Open Source Technology
98% of developers use open source tools (*)
Do you know
what’s in your app?
Code we wrote
Code someone else wrote
(*) https://about.gitlab.com/2017/03/03/why-choose-open-source/
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Open Source Technology
• Place infosec outside of the dev workflow
• When UI/UX, infosec and accessibility requirements conflict and never get resolved
• Dictate policy to not use open source
• Document-driven checking is not going catch
• Infosec must enable constant (read: automated) checking for open source
vulnerabilities
• Create a centralized private repositories of vetted 3rd party components for all
developers
• Establish good product distribution practices
• Minimize variation of components to make things easier (multiple versions,
duplicated utility)
Prepare for what is coming….
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Continuous Delivery: Rollback
• Once you jump, you can’t return to the
plane.
• You are committed. Permanently.
• This is not how we should model our
deployments
• Rollback is essential; Never be left without
an escape route to completely working
software
• Strive for approaches that support “one
button” rollback (e.g, feature flags or A/B)
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
SLS team GitHub Projects
• Once Click DevOps deployment
https://github.com/SLS-ALL/devops-microcosm
• Sample app with DevOps Process
https://github.com/SLS-ALL/flask_api_sample
• Tagged checkpoints
• v0.1.0: base Flask project
• v0.2.0: Vagrant development configuration
• v0.3.0: Test environment and Fabric deployment
• v0.4.0: Upstart services, external configuration files
• v0.5.0: Production environment
• On YouTube:
https://www.youtube.com/watch?v=5nQlJ-FWA5A
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
For more information…
• SEI – Carnegie Mellon University
• DevOps Blog: https://insights.sei.cmu.edu/devops
• Webinar : https://www.sei.cmu.edu/publications/webinars/index.cfm
• Podcast : https://www.sei.cmu.edu/publications/podcasts/index.cfm
• DevSecOps: http://www.devsecops.org
• Rugged Software: https://www.ruggedsoftware.org
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Let us Apply what we have learned today
34
Next week,
Change your mindset say “We all are responsible for security” not “You, I or
somebody else!”
Share what you have learned from failure
Next Month(s)
Start to build Integrated DevOps pipeline
Made incremental security integration as part of application lifecycle
Measure the results and keep iterating
By End of 2018!
Continuous learning on “how and where we need to improve security of our app”
Use DevOps to deploy secure application: DevSecOps
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Any Question?
Hasan Yasar
Technical Manager,
Secure Lifecycle Solutions
hyasar@sei.cmu.edu
@securelifecycle
#RSAC
APPENDIX
DevOps Fundamentals
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
What is DevOps?
DevOps is a set of principles and practices emphasizing collaboration and
communication between software development teams and IT operations staff along
with acquirers, suppliers and other stakeholders in the life cycle of a software
system [1]
[1] IEEE P2675 DevOps Standard for Building Reliable and Secure Systems Including Application Build, Package and Deployment
The history of DevOps
• Patrick Debois, “Agile infrastructure and operations: how infra-gile are you?”, Agile 2008
• John Allspaw, “ 10+Deploys per Day: Dev and Ops Cooperation”, Velocity 2009
• DevOpsDays, October 30th 2009, #DevOps term born
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
• Follow Agile methodologies
• Using Scrum, Kanban and modern
development approaches
• Self directing, self managed, self
organized
• Using any new technology
• Each Dev has own development strategy
• OpenSource,
• Allowed to have
• Close relationships with the business
• Software driven economy
Who are Dev?
Want to deliver software faster with new requirements…
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
• Operations
• Runs the application
• Manages the infrastructure
• Support the applications
• Operations provides
• Service Strategy
• Service Design
• Service Transition
• Service Operations
• Secure systems
Who are Ops?
Want to maintain stability, reliability and security…
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
DevOps aims to Increase…
…the pace of innovation
…responsiveness to business needs
…collaboration
…software stability and quality
... continuous feedback
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
DevOps has four Fundamental Principles
• Collaboration: between project team roles
• Infrastructure as Code: all assets are versioned, scripted, and shared where possible
• Automation: deployment, testing, provisioning, any manual or human-error-prone
process
• Monitoring: any metric in the development or operational spaces that can inform
priorities, direction, and policy
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
DevelopersDeployment
Maintenance
Security
Programming
Infrastructure
Scalability
Networks
Functional
Requirements
Performance
Testing
User Interface
Technical
Documentation
Updates
Code Review
Release
Review
User
Documentation
Data Privacy
Intrusion
Detection
User
Requirements
Business Constraints
Legal Issues
Market Needs
Budgets / Timelines
Monitoring
Incident response
IT Operations
Quality Assurance
Business Analyst
Information Security
Collaboration: Many stakeholders
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Collaboration: Silos Inhibit Collaboration and poor
communication
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Infrastructure as Code (IaC)
A program that creates infrastructure,
A concretely defined description of the environment is good
material for conversation between team members.
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Automation : Continuous Integration (CI)
#RSAC
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution
Shift Left Operational Concerns Enforced by Continuous Delivery
Automation : Continuous Delivery /
Deployment (CD)

More Related Content

PDF
Security Process in DevSecOps
PDF
DevSecOps What Why and How
PPTX
DevSecOps reference architectures 2018
PDF
Practical DevSecOps Course - Part 1
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
2019 DevSecOps Reference Architectures
PDF
DevSecOps and the CI/CD Pipeline
Security Process in DevSecOps
DevSecOps What Why and How
DevSecOps reference architectures 2018
Practical DevSecOps Course - Part 1
DevSecOps: What Why and How : Blackhat 2019
2019 DevSecOps Reference Architectures
DevSecOps and the CI/CD Pipeline

What's hot (20)

PDF
DevSecOps in Baby Steps
PPTX
ABN AMRO DevSecOps Journey
PDF
DevSecOps Implementation Journey
PPTX
DevOps to DevSecOps Journey..
PPTX
Enterprise Security Architecture Design
PPTX
How to Get Started with DevSecOps
PPTX
Secure SDLC Framework
PDF
DevSecOps - The big picture
PPTX
DevSecOps : an Introduction
PPT
OWASP Top Ten
PDF
Security champions v1.0
PPT
Application Threat Modeling
PDF
Slide DevSecOps Microservices
PDF
DevSecOps, The Good, Bad, and Ugly
PPTX
DevSecOps
PDF
DevSecOps: Taking a DevOps Approach to Security
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
DevSecOps Jenkins Pipeline -Security
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
DevSecOps in Baby Steps
ABN AMRO DevSecOps Journey
DevSecOps Implementation Journey
DevOps to DevSecOps Journey..
Enterprise Security Architecture Design
How to Get Started with DevSecOps
Secure SDLC Framework
DevSecOps - The big picture
DevSecOps : an Introduction
OWASP Top Ten
Security champions v1.0
Application Threat Modeling
Slide DevSecOps Microservices
DevSecOps, The Good, Bad, and Ugly
DevSecOps
DevSecOps: Taking a DevOps Approach to Security
[DevSecOps Live] DevSecOps: Challenges and Opportunities
DevSecOps Jenkins Pipeline -Security
Security Training: #3 Threat Modelling - Practices and Tools
Ad

Similar to Dos and Don'ts of DevSecOps (20)

PPTX
API Security: Assume Possible Interference
PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PDF
How Security can be the Next Force Multiplier in DevOps
PPTX
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
PDF
Practical appsec lessons learned in the age of agile and DevOps
PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
PDF
Open Source in Security-Critical Environments
PDF
Open source-in-security-critical-environments
PDF
Secure Cloud Development Resources with DevOps
PDF
How to Manage the Risk of your Polyglot Environments
PDF
Release Your Inner DevSecOp
PDF
Agile Security—Field of Dreams
PDF
Cloud security : Automate or die
PDF
DevSecOps in Baby Steps
PDF
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
PDF
Introducing a Security Program to Large Scale Legacy Products
PDF
DevSecOps - Building continuous security into it and app infrastructures
PDF
Collaborative security : Securing open source software
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
API Security: Assume Possible Interference
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
How Security can be the Next Force Multiplier in DevOps
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Practical appsec lessons learned in the age of agile and DevOps
2021-10-14 The Critical Role of Security in DevOps.pdf
Open Source in Security-Critical Environments
Open source-in-security-critical-environments
Secure Cloud Development Resources with DevOps
How to Manage the Risk of your Polyglot Environments
Release Your Inner DevSecOp
Agile Security—Field of Dreams
Cloud security : Automate or die
DevSecOps in Baby Steps
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
Introducing a Security Program to Large Scale Legacy Products
DevSecOps - Building continuous security into it and app infrastructures
Collaborative security : Securing open source software
Outpost24 webinar: Turning DevOps and security into DevSecOps
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Dos and Don'ts of DevSecOps

  • 1. SESSION ID: #RSAC Hasan Yasar DOS AND DON'TS OF DEVSECOPS DEV-F01 Technical Manager, Adjunct Faculty Member CERT | Software Engineering Institute | Carnegie Mellon University @SecureLifeCycle
  • 2. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Notices Copyright 2018 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. Carnegie Mellon® and CERT® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM18-0424
  • 4. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution 4 2017 Incident Highlights • 159,700 total cyber incidents • 7 billion records exposed in first 3 Qtr • $5 billion financial impact • 93% of breaches could have been prevented *Online Trust Alliance report 2018
  • 5. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Software Vulnerabilities (CVEs) by Year Source: cve.mitre.org as of August 2017
  • 6. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution The world we live in.. Software is eating up the world ! Marc Andreessen https://www.wsj.com/articles/SB10001424053111903480904576512250915629460
  • 7. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution How We Manage Software Security - Application Security Metrics , Financial Institutes Source: “Managing Application Security”, Security Compass, 2017.
  • 8. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Challenges with Secure Software Development • Writing code is hard • Lack of security skills • Legacy software • Best practices are insufficient • Lack of risk focus, lack of audit and control points • Wrong automated tools 8 • Unsupervised collaboration • Emphasis on speed • Vulnerabilities in deployment pipeline • Unprotected production environment • Lack of security requirements traceability
  • 9. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution So we all do “Last Minute Security”… https://dzone.com/articles/last-minute-security-comic
  • 11. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Three Pillars , p3 DevOps enables “Continuous Everything” on People Process Platform
  • 12. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution BLUF(Bottom Line Up Front) : People • Heavy collaboration between all stakeholders • Secure Design / Architecture decisions • Secure Environment / Network configuration • Secure Deployment planning • Secure Code Review • Constantly available open communication channels: • Dev and OpSec together in all project decision meeting • Chat/e-mail/Wiki services available to all team members
  • 13. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution BLUF: Process • Establish a process to enable people to succeed using the platform to develop secure application • Such that; • Constant communication and visible to all • Ensures that tasks are testable and repeatable • Frees up human experts to do challenging, creative work • Allows tasks to be performed with minimal effort or cost • Creates confidence in task success, after past repetitions • Faster deployment , frequent quality release
  • 14. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution BLUF: Platform • Where people use process to build secure software • Automated environment creation and provisioning • Automated infrastructure testing • Parity between Development, QA, Staging, and Production environments • Sharing and versioning of environmental configurations • Collaborative environment between all stakeholders
  • 16. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Enhancing SDLC Security Secure DevOps Lifecycle
  • 17. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Security must be addressed without breaking the rapid delivery, continuous feedback model Security must be addressed without breaking the rapid delivery, continuous feedback model Security must be addressed without breaking the rapid delivery, continuous feedback model!
  • 18. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Devs Enhancing SDLC Security Secure DevOps Lifecycle
  • 19. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Devs Continuous Feedback to Developer and others Enhancing SDLC Security Secure DevOps Lifecycle
  • 21. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Automation • Don’t leave security automation out of your DevOps automation strategy • Automated security testing removes human error, infrequent execution, and excuses • Don’t try to avoid open source with policies, it is coming whether you like it or not! • InfoSec must maintain awareness of open source vulnerabilities and continuously check for them
  • 22. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Automation You automate… …builds …functional tests …deployment …reporting …the coffee machine (as we do)
  • 23. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Multiverse: Environment Parity • When environments are not the same, • app may never behave predictably. • Environment parity (between dev, test, prod) is critical for controlling opportunity for security gaps
  • 24. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Multiverse: Environment Parity • Automate manual steps to the extent possible • Make development environment parity a priority • Get Ops involved in creating all environments, including Dev • Focus on providing fast easy-to-use automation tools for developers everyone to keep environments in synch
  • 25. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Configuration: IaC • Uncontrolled configuration changes will lead to an unmanageable, unpredictable, and unrepeatable solution • Easy for info security to get out of synch; For example, change in DNS and you have security hole. • Avoid the manual quick fix particularly for configuration changes • Put configuration files under configuration controls
  • 26. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Infiltrator – Insider Threat • He sneaks in… • …and alters production …but he works for you! • Set up roles and revoke administrative access to manually edit production • Configure prod environment to alert the entire team when manually accessed. Transparency is key.
  • 27. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Incident: We have all been there… Intrusions overnight… …cascading system failures… …it’s all crashing… …help…me..…
  • 28. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Response • But you survive… • Glad its over. Going to go sleep for 18 hours…and then back to the normal cycle. • When do we analyze what went wrong? • How do we prevent similar failures in the future? • Just forget it is over! • All failures must result in codified change to DevOps process • Understand exactly what went wrong • Never let the same failure happen twice • Propagate fixes across the enterprise • Ensure that you teach the next generation
  • 29. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Open Source Technology 98% of developers use open source tools (*) Do you know what’s in your app? Code we wrote Code someone else wrote (*) https://about.gitlab.com/2017/03/03/why-choose-open-source/
  • 30. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Open Source Technology • Place infosec outside of the dev workflow • When UI/UX, infosec and accessibility requirements conflict and never get resolved • Dictate policy to not use open source • Document-driven checking is not going catch • Infosec must enable constant (read: automated) checking for open source vulnerabilities • Create a centralized private repositories of vetted 3rd party components for all developers • Establish good product distribution practices • Minimize variation of components to make things easier (multiple versions, duplicated utility) Prepare for what is coming….
  • 31. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Continuous Delivery: Rollback • Once you jump, you can’t return to the plane. • You are committed. Permanently. • This is not how we should model our deployments • Rollback is essential; Never be left without an escape route to completely working software • Strive for approaches that support “one button” rollback (e.g, feature flags or A/B)
  • 32. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution SLS team GitHub Projects • Once Click DevOps deployment https://github.com/SLS-ALL/devops-microcosm • Sample app with DevOps Process https://github.com/SLS-ALL/flask_api_sample • Tagged checkpoints • v0.1.0: base Flask project • v0.2.0: Vagrant development configuration • v0.3.0: Test environment and Fabric deployment • v0.4.0: Upstart services, external configuration files • v0.5.0: Production environment • On YouTube: https://www.youtube.com/watch?v=5nQlJ-FWA5A
  • 33. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution For more information… • SEI – Carnegie Mellon University • DevOps Blog: https://insights.sei.cmu.edu/devops • Webinar : https://www.sei.cmu.edu/publications/webinars/index.cfm • Podcast : https://www.sei.cmu.edu/publications/podcasts/index.cfm • DevSecOps: http://www.devsecops.org • Rugged Software: https://www.ruggedsoftware.org
  • 34. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Let us Apply what we have learned today 34 Next week, Change your mindset say “We all are responsible for security” not “You, I or somebody else!” Share what you have learned from failure Next Month(s) Start to build Integrated DevOps pipeline Made incremental security integration as part of application lifecycle Measure the results and keep iterating By End of 2018! Continuous learning on “how and where we need to improve security of our app” Use DevOps to deploy secure application: DevSecOps
  • 35. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Any Question? Hasan Yasar Technical Manager, Secure Lifecycle Solutions hyasar@sei.cmu.edu @securelifecycle
  • 37. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution What is DevOps? DevOps is a set of principles and practices emphasizing collaboration and communication between software development teams and IT operations staff along with acquirers, suppliers and other stakeholders in the life cycle of a software system [1] [1] IEEE P2675 DevOps Standard for Building Reliable and Secure Systems Including Application Build, Package and Deployment The history of DevOps • Patrick Debois, “Agile infrastructure and operations: how infra-gile are you?”, Agile 2008 • John Allspaw, “ 10+Deploys per Day: Dev and Ops Cooperation”, Velocity 2009 • DevOpsDays, October 30th 2009, #DevOps term born
  • 38. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution • Follow Agile methodologies • Using Scrum, Kanban and modern development approaches • Self directing, self managed, self organized • Using any new technology • Each Dev has own development strategy • OpenSource, • Allowed to have • Close relationships with the business • Software driven economy Who are Dev? Want to deliver software faster with new requirements…
  • 39. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution • Operations • Runs the application • Manages the infrastructure • Support the applications • Operations provides • Service Strategy • Service Design • Service Transition • Service Operations • Secure systems Who are Ops? Want to maintain stability, reliability and security…
  • 40. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution DevOps aims to Increase… …the pace of innovation …responsiveness to business needs …collaboration …software stability and quality ... continuous feedback
  • 41. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution DevOps has four Fundamental Principles • Collaboration: between project team roles • Infrastructure as Code: all assets are versioned, scripted, and shared where possible • Automation: deployment, testing, provisioning, any manual or human-error-prone process • Monitoring: any metric in the development or operational spaces that can inform priorities, direction, and policy
  • 42. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution DevelopersDeployment Maintenance Security Programming Infrastructure Scalability Networks Functional Requirements Performance Testing User Interface Technical Documentation Updates Code Review Release Review User Documentation Data Privacy Intrusion Detection User Requirements Business Constraints Legal Issues Market Needs Budgets / Timelines Monitoring Incident response IT Operations Quality Assurance Business Analyst Information Security Collaboration: Many stakeholders
  • 43. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Collaboration: Silos Inhibit Collaboration and poor communication
  • 44. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Infrastructure as Code (IaC) A program that creates infrastructure, A concretely defined description of the environment is good material for conversation between team members.
  • 45. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Automation : Continuous Integration (CI)
  • 46. #RSAC [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution Shift Left Operational Concerns Enforced by Continuous Delivery Automation : Continuous Delivery / Deployment (CD)