SlideShare a Scribd company logo
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES1 © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES
Five Principles For Securing
DevOps
Colin Domoney
Senior Principal Transformation Consultant
CA Technologies
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES2
Colin Domoney
• Senior Principal Transformation Consultant
• Offering coaching, collaboration and technical solutions
to organization’s who need an impactful transformation to
advance DevOps with optimised flow and security
• At the forefront of CA Veracode’s product and innovation
strategy, particularly in helping ensure the challenges of
DevOps are met
• Led a large scale application security program in a
multinational investment bank where he was responsible
for the deployment and operation of the Veracode
service. Over 1,000 applications were assessed and
remediated in a few years using very limited human
resources.
colin.domoney@ca.com
@colindomoney
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES3
Defining DevOps
“DevOps is a cultural and professional movement, focused
on how we build and operate high velocity organizations,
born from the experiences of its practitioners.”
- Nathan Harvey (Chef)
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES4
The ‘Three Ways’ of DevOps
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES5
DevOps, a new model for software
development, is transforming the
way the world creates software.
Despite its substantial
organizational, cultural and
technological requirements,
this new way of organizing
development and IT operations
work is spreading rapidly.
The DevOps Difference
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES6
DevOps is built on Agile
Security
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7
“Shift Left”: Securing DevOps
• Goal: Minimize
organization
risk without
slowing down
development
• Changing how
security
operates within
an organization
Security
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES8
Five Principles for Integrating Security into DevOps
1 Automate Security In
DevOps Pipeline2 Integrate to “Fail Quickly”
3 No false alarms
4 Build security champions Development
5 Keep operational visibility Production
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES9
Principle #1: Automate Security In
• Automate from Day 1
• Integrate into common
development tools
– IDE
– Build Systems
– Bug Tracking
– GRC
• Leverage comprehensive APIs
• Integrate testing results within
development backlogs
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES10
Principle #2: Integrate to Fail Quickly
• Education that delivers cost savings
– Inform development early
• Two Phased approach
– Consistent frequency (part of pipeline)
– Development being proactive (testing
outside of the pipeline)
• AppSec must be a partnership
– security defines the acceptable
security quality level
– developers implement continuous
testing to address issues as they
appear
Development
Operations
Both failures create notifications within
the backlog
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES11
Principle #3: No False Alarms
• Too many false positives will frustrate
development and security
• Technology will end up being ignored
• Action oriented and accurate findings
are important
• In CI/CD a failure may cause the
entire pipeline to stop
• Delays could yield lost revenue for the
whole organization
• Need to provide both maximum
coverage for finding critical flaws
while tuning out the noise of low-level
issues
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES12
Principle #4: Build Security Champions
• Eyes and ears of Security
• Specialized training
• Basic security concepts
• Threat modeling
• Grooming guidelines
• Secure code review training
• Security controls
• Capture the Flag Exercises
• Escalate when necessary
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES13
Principle #5: Keep Operational Visibility
• Security doesn't stop once a release
candidate has made it to production
• Cultural decision to determine where
to test
– Pre production vs production
• Business may decide to bypass
security checks to move faster
• Misconfigured pipelines are possible
• Runtime environments are always
changing
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES14
Integrating Security
Into DevOps
Questions to Ask!
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES15 © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES
CA Veracode’s
Approach
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES17
DevSecOps: Uniting Development and Security
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES18
CA Veracode Platform:
Security Throughout the SDLC
Code Commit Build Test Release Deploy Operate
CA Veracode Greenlight CA Veracode Static Analysis
CA Veracode Web Application Scanning
CA Veracode Runtime Protection
CA Veracode Software Composition Analysis
CA Veracode Integrations, APIs
CA Veracode eLearning
Code RepositoriesIDEs GRCs
SIEMs
WAFs
Security Assurance Operational SecurityDevelopment Integration
Bug Tracking Build and Deploy
Systems
Veracode Program Management and Services

More Related Content

PDF
Full Spectrum Engineering – The New Full-stack
PDF
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
PDF
Scale DevSecOps with your Continuous Integration Pipeline
PDF
The DevOps Challenge: Open Source Security at Scale
PDF
The Challenges of Scaling DevSecOps
PDF
A beginners guide to scaling DevOps
PDF
2018 State Of DevOps Report Key Findings
PDF
Secure your Azure and DevOps in a smart way
Full Spectrum Engineering – The New Full-stack
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
Scale DevSecOps with your Continuous Integration Pipeline
The DevOps Challenge: Open Source Security at Scale
The Challenges of Scaling DevSecOps
A beginners guide to scaling DevOps
2018 State Of DevOps Report Key Findings
Secure your Azure and DevOps in a smart way

What's hot (20)

PDF
Security as Code
PPTX
How to apply DevOps in a regulated organisation
PPTX
Why Serverless is scary without DevSecOps and Observability
PDF
Addressing the Challenges of Mobile Test Automation
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PPTX
Tales from an Enterprise DevOps transformation
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
PDF
How To Become A DevOps Engineer? | DevOps Engineer Roadmap | DevOps Training ...
PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PPTX
Making Security Agile - Oleg Gryb
PDF
Ops Happens: DevOps Beyond Deployment - Damon Edwards
PPTX
PPTX
Scaling DevOps Adoption
PDF
DevSecOps for you Full Stack
PPTX
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
Practical DevSecOps Course - Part 1
PPT
Estafet Eacis Demo Slides
Security as Code
How to apply DevOps in a regulated organisation
Why Serverless is scary without DevSecOps and Observability
Addressing the Challenges of Mobile Test Automation
Implementing DevOps in a Regulated Environment - DJ Schleen
Open Source Security: How to Lay the Groundwork for a Secure Culture
Tales from an Enterprise DevOps transformation
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
How To Become A DevOps Engineer? | DevOps Engineer Roadmap | DevOps Training ...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Making Security Agile - Oleg Gryb
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Scaling DevOps Adoption
DevSecOps for you Full Stack
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
Outpost24 webinar - application security in a dev ops world-08-2018
Practical DevSecOps Course - Part 1
Estafet Eacis Demo Slides
Ad

Similar to Embrace DevSecOps and Enjoy a Significant Competitive Advantage! (20)

PDF
Your Resolution for 2018: Five Principles For Securing DevOps
PPTX
How to get the best out of DevSecOps - a security perspective
PPTX
DevOps: Security's Big Opportunity
PPTX
How to get the best out of DevSecOps - an operations perspective
PDF
Webinar – Risk-based adaptive DevSecOps
PPTX
Shifting security all day dev ops
PDF
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
PPTX
SD DevOps Meet-up - Exploring Quadrants of DevOps Maturity
PDF
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
PPTX
Shift Left for More Secure Apps with F5 NGINX
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
DevSecOps-Explained-converted.pptx
PPTX
Agile DevOps Transformation At HUD (AgileDC 2017)
PDF
5 principles-securing-devops-veracode-whitepaper
PDF
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
PDF
Take Control: Design a Complete DevSecOps Program
PDF
Take Control: Design a Complete DevSecOps Program
PPTX
Enterprise DevOps and the Modern Mainframe Webcast Presentation
PPTX
What is the role of DevSecOps in securing software development.pptx
PPTX
The End of Security as We Know It - Shannon Lietz
Your Resolution for 2018: Five Principles For Securing DevOps
How to get the best out of DevSecOps - a security perspective
DevOps: Security's Big Opportunity
How to get the best out of DevSecOps - an operations perspective
Webinar – Risk-based adaptive DevSecOps
Shifting security all day dev ops
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
SD DevOps Meet-up - Exploring Quadrants of DevOps Maturity
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Shift Left for More Secure Apps with F5 NGINX
Pentest is yesterday, DevSecOps is tomorrow
DevSecOps-Explained-converted.pptx
Agile DevOps Transformation At HUD (AgileDC 2017)
5 principles-securing-devops-veracode-whitepaper
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Enterprise DevOps and the Modern Mainframe Webcast Presentation
What is the role of DevSecOps in securing software development.pptx
The End of Security as We Know It - Shannon Lietz
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Touch Screen Technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mushroom cultivation and it's methods.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Hindi spoken digit analysis for native and non-native speakers
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A Presentation on Artificial Intelligence
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Touch Screen Technology
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Mushroom cultivation and it's methods.pdf
Encapsulation theory and applications.pdf
cloud_computing_Infrastucture_as_cloud_p
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Univ-Connecticut-ChatGPT-Presentaion.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A novel scalable deep ensemble learning framework for big data classification...
1 - Historical Antecedents, Social Consideration.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx

Embrace DevSecOps and Enjoy a Significant Competitive Advantage!

  • 1. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES1 © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES Five Principles For Securing DevOps Colin Domoney Senior Principal Transformation Consultant CA Technologies
  • 2. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES2 Colin Domoney • Senior Principal Transformation Consultant • Offering coaching, collaboration and technical solutions to organization’s who need an impactful transformation to advance DevOps with optimised flow and security • At the forefront of CA Veracode’s product and innovation strategy, particularly in helping ensure the challenges of DevOps are met • Led a large scale application security program in a multinational investment bank where he was responsible for the deployment and operation of the Veracode service. Over 1,000 applications were assessed and remediated in a few years using very limited human resources. colin.domoney@ca.com @colindomoney
  • 3. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES3 Defining DevOps “DevOps is a cultural and professional movement, focused on how we build and operate high velocity organizations, born from the experiences of its practitioners.” - Nathan Harvey (Chef)
  • 4. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES4 The ‘Three Ways’ of DevOps
  • 5. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES5 DevOps, a new model for software development, is transforming the way the world creates software. Despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly. The DevOps Difference
  • 6. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES6 DevOps is built on Agile Security
  • 7. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7 “Shift Left”: Securing DevOps • Goal: Minimize organization risk without slowing down development • Changing how security operates within an organization Security
  • 8. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES8 Five Principles for Integrating Security into DevOps 1 Automate Security In DevOps Pipeline2 Integrate to “Fail Quickly” 3 No false alarms 4 Build security champions Development 5 Keep operational visibility Production
  • 9. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES9 Principle #1: Automate Security In • Automate from Day 1 • Integrate into common development tools – IDE – Build Systems – Bug Tracking – GRC • Leverage comprehensive APIs • Integrate testing results within development backlogs
  • 10. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES10 Principle #2: Integrate to Fail Quickly • Education that delivers cost savings – Inform development early • Two Phased approach – Consistent frequency (part of pipeline) – Development being proactive (testing outside of the pipeline) • AppSec must be a partnership – security defines the acceptable security quality level – developers implement continuous testing to address issues as they appear Development Operations Both failures create notifications within the backlog
  • 11. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES11 Principle #3: No False Alarms • Too many false positives will frustrate development and security • Technology will end up being ignored • Action oriented and accurate findings are important • In CI/CD a failure may cause the entire pipeline to stop • Delays could yield lost revenue for the whole organization • Need to provide both maximum coverage for finding critical flaws while tuning out the noise of low-level issues
  • 12. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES12 Principle #4: Build Security Champions • Eyes and ears of Security • Specialized training • Basic security concepts • Threat modeling • Grooming guidelines • Secure code review training • Security controls • Capture the Flag Exercises • Escalate when necessary
  • 13. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES13 Principle #5: Keep Operational Visibility • Security doesn't stop once a release candidate has made it to production • Cultural decision to determine where to test – Pre production vs production • Business may decide to bypass security checks to move faster • Misconfigured pipelines are possible • Runtime environments are always changing
  • 14. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES14 Integrating Security Into DevOps Questions to Ask!
  • 15. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES15 © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES CA Veracode’s Approach
  • 16. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES17 DevSecOps: Uniting Development and Security
  • 17. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES18 CA Veracode Platform: Security Throughout the SDLC Code Commit Build Test Release Deploy Operate CA Veracode Greenlight CA Veracode Static Analysis CA Veracode Web Application Scanning CA Veracode Runtime Protection CA Veracode Software Composition Analysis CA Veracode Integrations, APIs CA Veracode eLearning Code RepositoriesIDEs GRCs SIEMs WAFs Security Assurance Operational SecurityDevelopment Integration Bug Tracking Build and Deploy Systems Veracode Program Management and Services