DJ Schleen
Embracing DevSecOps
A Changing Security Landscape for the US Government
@djschleen
2
devsecops
3
not just for hipsters
reduce risk
@djschleen
4
culture
Photos courtesy of Pixabay and Pexels.
the three ways
7
AUTOMATE
Automate security
toolsets by integrating
them into your SDLC in
an unobtrusive and
transparent way.
DISSEMINATE
Collect information
from your toolsets,
aggregate them into
actionable KPI’s, and
deliver them to the
appropriate
stakeholders.
INVESTIGATE
Establish baselines that
define normal
operating behavior and
investigate
abnormalities that
appear
EFFICIENCY
@djschleen
WHHHHHHYYYYY?
100:1
9
DEVELOPERS OUTNUMBER SECURITY
The faster a team can deploy to
production, the quicker an organization
can remediate critical vulnerabilities
and zero days
10
Cycle Time: Weeks - Months
Cycle Time: Minutes - Hours
10 – 20 Releases
Your imagination is the limit...
Plan Deploy Operate
Agile
DevSecOps
…
Design
Build
Test
Deploy
Operate
Design
Build
TestDesign
Build
Test
Plan
Design
Build
Test
Deploy
Operate Design
Build
Test
Deploy
Operate
Observation
@dschleen
Increased Flow can reduce
the risk of outdated software
stagnating in production
When change is normal and
expected, fire-drills become a thing
of the past
Learn
Learn LearnLearn
AGILE ISN’T AGILE ENOUGH
Large Scale Exploit
March 10
Equifax applications
breached through
Struts2 vulnerability
AprMar May Jun Jul Aug Sept
March 7
Apache Struts releases
updated version to
thwart vulnerability
CVE-2017-5638
July 29
Breach is discovered
by Equifax.
Probe Crisis Management
11
@dschleen
TIMELINE OF AN ATTACK
@djschleen
March 7
Apache Struts releases
updated version to
thwart vulnerability
CVE-2017-5638
Today
8,780 continue to
download vulnerable
versions of Struts
57% of the Fortune 100
3 Days in March
March 8
NSA reveals Pentagon
servers scanned by
nation-states for
vulnerable Struts
instances
Struts exploit published
to Exploit-DB.
March 10
Equifax
Canada Revenue Agency
Canada Statistics
GMO Payment Gateway
The Rest of the Story
March 13
Okinawa Power
Japan Post
March 9
Cisco observes "a high number
of exploitation events."
March ’18
India’s AADHAAR
EQUIFAX WAS NOT ALONE
April 13
India Post
December ’17
Monero Cryptomining
13
AVERAGE DAYS BEFORE VULNERABILITY IS EXPLOITED
risk
@djschleen
15
85%-97%
16
CODE YOUR DEVELOPERS DON’T BUILD
@dschleen
NIST SPECIAL PUBLICATION 800-161
@dschleen
NIST SPECIAL PUBLICATION 800-161
@dschleen
SAY HELLO TO YOUR SOFTWARE SUPPLY CHAIN
NOT ALL PARTS ARE CREATED EQUAL
@devstefop
s
AUTOMATION ACCELERATES OSS DOWNLOADS
1,096 new projects per day
10,000 new versions per day
14x releases per year
• 3M npm components
• 2M Java components
• 900K NuGet components
• 870K PyPI components
@djschleen
24
DEFECT PERCENTAGES FOR JAVASCRIPT
@djschleen
85% to 97% of
modern apps
consist of
assembled
components.
25
80% to 90% of
modern
operations
consist of
assembled
containers.
26
Containers
Hand-built
applications and
infrastructure
PULLS FROM DOCKER HUB
@djschleen
time
233 days
MeanTTR
119 days
MedianTTR
122,802
components with
known vulnerabilities
19,445
15.8% fixed the
vulnerability
TIME TO REPAIR OSS COMPONENTS
@djschleen
0 days
MeanTTR
CVE ID: CVE-2017-5638
March 7
Apache fixed the
vulnerability
March 7
APACHE STRUTS2 MEAN TIME TO REPAIR
@djschleen
170,000
Java component
downloads annually
3,500
unique
18,870
11.1% with known
vulnerabilities
7,500 ORGANIZATIONS ANALYZED
@djschleen
threats are real
@djschleen
A Shifting Battlefront of Attacks:
Hackers Inject Malicious Code into Supply Chains
March 2016 - August 2018
left-pad: Popular npm packages were
removed from the repository, breaking
thousands of websites and revealing how
changes can immediately propagate to the
real world.
1
npm credentials used by publishers
of 79,000 packages were published
online or easily compromised by
dictionary attacks.
2
PyPI typosquat: The Slovak National
Security Office (NBU) found 10 malicious
PyPI packages. Evidence of the fake
packages being downloaded and
incorporated into software multiple times
was noted between Jun '17 and Sept '17.
5
npm credentials: A core contributor to the
conventional-changelog ecosystem had their
npm credentials compromised and a malicious
version of the package was published.
Package was installed 28,000 times in 35
hours and executed a Monero crypto miner.
7
Backdoored npm: The npm security team
responded to reports of a package that
masqueraded as a cookie parsing library but
contained a malicious backdoor. Published in
March ’18 to introduce unauthorized publishing of
mailparser; despite being deprecated, mailparser
still received about 64,000 weekly downloads.
9
homebrew breach: Eric Holmes, an
operations engineer at Remind, gained
commit access to homebrew in under 30
minutes through an exposed GitHub API
token. While he had no malicious intent, he
gained access to components that are
downloaded 500,000 times per month.
11
Mar 2016 July 2017 Sep 2017 Jan 2018 Feb 2018 May 2018 Aug 2018
Malicious npm: Gilbertson writes a
fictional tale of creating a malicious
npm packages to harvest credit card
numbers from hundreds of websites.
6
3 npm typosquat: 40 intentionally
malicious packages harvested
credentials used to publish to the
npm repository itself.
4 docker123321 images were created
on Docker Hub. In Jan'18, it was
accused of poisoning a Kubernetes
honeypot, then in May’18 it was
equated to a crypto mining botnet.
8go-bindata: after a developer deleted their
GitHub account, someone immediately
grabbed the ID — inheriting the karma instilled
in that id, calling into question what packages
and sources are canonical and immutable.
10
Backdoored PyPI: SSH Decorator (ssh-decorate),
a library for handling SSH connections from
Python code, was backdoored to enable stealing
of private SSH credentials.
34
@djschleen
Laurie Voss, npm and the furture of JavaScript, 2018-10-10
NPM AUDIT STATS
9 years later, vulnerable
versions of Bouncy Castle
were downloaded…
11M
CVE-2007-6721
CVSS Base Score: 10.0 HIGH
Exploitability Subscore: 10.0
23M
2007 2016
BOUNCY CASTLE
Photo courtesy of Pixabay
@djschleen
do not boil
REDUCE DOWNSTREAM DEFECTS
@djschleen
@dschleen
PROTECT YOUR SOFTWARE SUPPLY CHAIN
THE REWARDS ARE IMPRESSIVE
90%
improvement in time to
deploy
34,000
hours saved in
90 days
48%
increase in application
quality
@djschleen
Image by DJ Schleen
inevitable
@djschleen
Embracing DevSecOps: A Changing Security Landscape for the US Government

More Related Content

PDF
How Components Increase Speed and Risk
PDF
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
PDF
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
PPTX
Velocity 2015 Amsterdam: Alerts overload
PDF
Security in the FaaS Lane
PPTX
Sarah Wells - Alert overload: How to adopt a microservices architecture witho...
PPTX
Codemotion Milan 2015 Alerts Overload
PPTX
Defining DevSecOps
How Components Increase Speed and Risk
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
Velocity 2015 Amsterdam: Alerts overload
Security in the FaaS Lane
Sarah Wells - Alert overload: How to adopt a microservices architecture witho...
Codemotion Milan 2015 Alerts Overload
Defining DevSecOps

What's hot (20)

PDF
Release Your Inner DevSecOp
PDF
Hacker Games & DevSecOps
PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
Evolving DevOps in the Age of Cloud Native
PDF
Practical Chaos Engineering
PDF
Serverless Swift for Mobile Developers
PDF
DevSecCon London 2017: Their-problems-are-your-problems-devseccon by Tim Kadlec
PPTX
5681 Sample
PDF
Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Wa...
PDF
The Seven Habits of the Highly Effective DevSecOp
PDF
Chaos Engineering: Why the World Needs More Resilient Systems
PDF
Tools & techniques, building a dev secops culture at mozilla sba live a...
PDF
Kubernetes: Learning from Zero to Production
PDF
Completing the Microservices Puzzle: Kubernetes, Prometheus and FreshTracks.io
PPT
Splunk Live in RTP - March-2014-Jeff-Bollinger-Cisco
PPTX
Tackling the Container Iceberg: How to Approach Security When Most of Your So...
PDF
Applying principles of chaos engineering to Serverless
PDF
A Hitchhiker’s Guide to the Cloud Native Stack. #DevoxxPL
PDF
The present and future of serverless observability
Release Your Inner DevSecOp
Hacker Games & DevSecOps
Serverless Security: A How-to Guide @ SnowFROC 2019
The Emergent Cloud Security Toolchain for CI/CD
Evolving DevOps in the Age of Cloud Native
Practical Chaos Engineering
Serverless Swift for Mobile Developers
DevSecCon London 2017: Their-problems-are-your-problems-devseccon by Tim Kadlec
5681 Sample
Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Wa...
The Seven Habits of the Highly Effective DevSecOp
Chaos Engineering: Why the World Needs More Resilient Systems
Tools & techniques, building a dev secops culture at mozilla sba live a...
Kubernetes: Learning from Zero to Production
Completing the Microservices Puzzle: Kubernetes, Prometheus and FreshTracks.io
Splunk Live in RTP - March-2014-Jeff-Bollinger-Cisco
Tackling the Container Iceberg: How to Approach Security When Most of Your So...
Applying principles of chaos engineering to Serverless
A Hitchhiker’s Guide to the Cloud Native Stack. #DevoxxPL
The present and future of serverless observability
Ad

Similar to Embracing DevSecOps: A Changing Security Landscape for the US Government (20)

PPTX
Making Security Agile - Oleg Gryb
PPTX
Top Lessons Learned From The DevOps Handbook
PDF
2019 04-04-dev secops-software supply chain_fst-2
PPTX
2019 Top Lessons Learned Since the Phoenix Project Was Released
PPTX
Nadog dev secops_survey
PDF
DevOps Patterns Distilled: Implementing The Needed Practices In Practical Steps
PDF
Open Source, Open Governance and Your Developers
PDF
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
PPTX
DevOps and the Importance of Single Source Code Repos 
PDF
Maturing DevSecOps: From Easy to High Impact
PPTX
The Unicorn Project and The Five Ideals (Updated Dec 2019)
PDF
Edit Privacy Settings Analytics FREE Collect Leads Micro Focus DevOps Drive-i...
PPTX
DevOps and the Death & Rebirth of Childhood Innocence
PPTX
My Top Five DevOps Learnings
PDF
AWS live hack: Docker + Snyk Container on AWS
PDF
Cloud-Native Fundamentals: Accelerating Development with Continuous Integration
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
The Unicorn Project and the Five Ideals.pdf
PPTX
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
PDF
Divine and felonios cyber security devopsdays austin 2018
Making Security Agile - Oleg Gryb
Top Lessons Learned From The DevOps Handbook
2019 04-04-dev secops-software supply chain_fst-2
2019 Top Lessons Learned Since the Phoenix Project Was Released
Nadog dev secops_survey
DevOps Patterns Distilled: Implementing The Needed Practices In Practical Steps
Open Source, Open Governance and Your Developers
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
DevOps and the Importance of Single Source Code Repos 
Maturing DevSecOps: From Easy to High Impact
The Unicorn Project and The Five Ideals (Updated Dec 2019)
Edit Privacy Settings Analytics FREE Collect Leads Micro Focus DevOps Drive-i...
DevOps and the Death & Rebirth of Childhood Innocence
My Top Five DevOps Learnings
AWS live hack: Docker + Snyk Container on AWS
Cloud-Native Fundamentals: Accelerating Development with Continuous Integration
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
The Unicorn Project and the Five Ideals.pdf
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Divine and felonios cyber security devopsdays austin 2018
Ad

More from DJ Schleen (6)

PDF
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
PDF
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
PDF
Why happier developers create more secure code
PPTX
Blue is the new green
PPTX
CVS Health Automating Security with DevSecOps
PDF
Don't Fear the Four Horsemen of the DevSecOpalypse
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Why happier developers create more secure code
Blue is the new green
CVS Health Automating Security with DevSecOps
Don't Fear the Four Horsemen of the DevSecOpalypse

Recently uploaded (20)

PPTX
Workshop introduction and objectives. SK.pptx
PDF
Item # 1a - August 11, 2025 Meeting Minutes
PPTX
CHS rollout Presentation by Abraham Lebeza.pptx
PDF
The Landscape Observatory of Catalonia. A Journey of Fifteen Years
PDF
The GDP double bind- Anders Wijkman Honorary President Club of Rome
PDF
MC No. 08 s. 2025 of the CSC Omnibus Rules on Appointments and Other HR Actions
PDF
RBI-FORM-A-By Household_Revised 2024.pdf
PDF
Abhay Bhutada Foundation’s Commitment to ESG Compliance
PPTX
International Tracking Project Unloading Guidance Manual V1 (1) 1.pptx
PDF
ACHO's Six WEEK UPDATE REPORT ON WATER SACHETS DISTRIBUTION IN RENK COUNTY - ...
PPTX
Robotics_Presentation.pptxdhdrhdrrhdrhdrhdrrh
PDF
Item # 10 -- Set Proposed 2025 Tax Rate
PDF
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
PPTX
2019.05.19.AMS_.Sermonsssssssssssss.pptx
PDF
Dean, Jodi: Concept Paper - Multi Family Lot
PPTX
Key Points of 2025 ORAOHRA of the CSC from CSI
PDF
PPT Item # 10 -- Proposed 2025 Tax Rate
PPTX
Community Contracting Protocol, DLG, MOHCA
PPTX
Parliamentary procedure in meeting that can be use
PPTX
Local Govt Code Review Roadmap_Oct2024.pptx
Workshop introduction and objectives. SK.pptx
Item # 1a - August 11, 2025 Meeting Minutes
CHS rollout Presentation by Abraham Lebeza.pptx
The Landscape Observatory of Catalonia. A Journey of Fifteen Years
The GDP double bind- Anders Wijkman Honorary President Club of Rome
MC No. 08 s. 2025 of the CSC Omnibus Rules on Appointments and Other HR Actions
RBI-FORM-A-By Household_Revised 2024.pdf
Abhay Bhutada Foundation’s Commitment to ESG Compliance
International Tracking Project Unloading Guidance Manual V1 (1) 1.pptx
ACHO's Six WEEK UPDATE REPORT ON WATER SACHETS DISTRIBUTION IN RENK COUNTY - ...
Robotics_Presentation.pptxdhdrhdrrhdrhdrhdrrh
Item # 10 -- Set Proposed 2025 Tax Rate
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
2019.05.19.AMS_.Sermonsssssssssssss.pptx
Dean, Jodi: Concept Paper - Multi Family Lot
Key Points of 2025 ORAOHRA of the CSC from CSI
PPT Item # 10 -- Proposed 2025 Tax Rate
Community Contracting Protocol, DLG, MOHCA
Parliamentary procedure in meeting that can be use
Local Govt Code Review Roadmap_Oct2024.pptx

Embracing DevSecOps: A Changing Security Landscape for the US Government

  • 1. DJ Schleen Embracing DevSecOps A Changing Security Landscape for the US Government @djschleen
  • 3. 3 not just for hipsters
  • 6. Photos courtesy of Pixabay and Pexels. the three ways
  • 7. 7 AUTOMATE Automate security toolsets by integrating them into your SDLC in an unobtrusive and transparent way. DISSEMINATE Collect information from your toolsets, aggregate them into actionable KPI’s, and deliver them to the appropriate stakeholders. INVESTIGATE Establish baselines that define normal operating behavior and investigate abnormalities that appear EFFICIENCY @djschleen
  • 10. The faster a team can deploy to production, the quicker an organization can remediate critical vulnerabilities and zero days 10 Cycle Time: Weeks - Months Cycle Time: Minutes - Hours 10 – 20 Releases Your imagination is the limit... Plan Deploy Operate Agile DevSecOps … Design Build Test Deploy Operate Design Build TestDesign Build Test Plan Design Build Test Deploy Operate Design Build Test Deploy Operate Observation @dschleen Increased Flow can reduce the risk of outdated software stagnating in production When change is normal and expected, fire-drills become a thing of the past Learn Learn LearnLearn AGILE ISN’T AGILE ENOUGH
  • 11. Large Scale Exploit March 10 Equifax applications breached through Struts2 vulnerability AprMar May Jun Jul Aug Sept March 7 Apache Struts releases updated version to thwart vulnerability CVE-2017-5638 July 29 Breach is discovered by Equifax. Probe Crisis Management 11 @dschleen TIMELINE OF AN ATTACK
  • 13. March 7 Apache Struts releases updated version to thwart vulnerability CVE-2017-5638 Today 8,780 continue to download vulnerable versions of Struts 57% of the Fortune 100 3 Days in March March 8 NSA reveals Pentagon servers scanned by nation-states for vulnerable Struts instances Struts exploit published to Exploit-DB. March 10 Equifax Canada Revenue Agency Canada Statistics GMO Payment Gateway The Rest of the Story March 13 Okinawa Power Japan Post March 9 Cisco observes "a high number of exploitation events." March ’18 India’s AADHAAR EQUIFAX WAS NOT ALONE April 13 India Post December ’17 Monero Cryptomining 13
  • 14. AVERAGE DAYS BEFORE VULNERABILITY IS EXPLOITED
  • 19. @dschleen SAY HELLO TO YOUR SOFTWARE SUPPLY CHAIN
  • 20. NOT ALL PARTS ARE CREATED EQUAL @devstefop s
  • 22. 1,096 new projects per day 10,000 new versions per day 14x releases per year • 3M npm components • 2M Java components • 900K NuGet components • 870K PyPI components
  • 24. 24 DEFECT PERCENTAGES FOR JAVASCRIPT @djschleen
  • 25. 85% to 97% of modern apps consist of assembled components. 25
  • 26. 80% to 90% of modern operations consist of assembled containers. 26 Containers Hand-built applications and infrastructure
  • 27. PULLS FROM DOCKER HUB @djschleen
  • 28. time
  • 29. 233 days MeanTTR 119 days MedianTTR 122,802 components with known vulnerabilities 19,445 15.8% fixed the vulnerability TIME TO REPAIR OSS COMPONENTS @djschleen
  • 30. 0 days MeanTTR CVE ID: CVE-2017-5638 March 7 Apache fixed the vulnerability March 7 APACHE STRUTS2 MEAN TIME TO REPAIR @djschleen
  • 31. 170,000 Java component downloads annually 3,500 unique 18,870 11.1% with known vulnerabilities 7,500 ORGANIZATIONS ANALYZED @djschleen
  • 34. A Shifting Battlefront of Attacks: Hackers Inject Malicious Code into Supply Chains March 2016 - August 2018 left-pad: Popular npm packages were removed from the repository, breaking thousands of websites and revealing how changes can immediately propagate to the real world. 1 npm credentials used by publishers of 79,000 packages were published online or easily compromised by dictionary attacks. 2 PyPI typosquat: The Slovak National Security Office (NBU) found 10 malicious PyPI packages. Evidence of the fake packages being downloaded and incorporated into software multiple times was noted between Jun '17 and Sept '17. 5 npm credentials: A core contributor to the conventional-changelog ecosystem had their npm credentials compromised and a malicious version of the package was published. Package was installed 28,000 times in 35 hours and executed a Monero crypto miner. 7 Backdoored npm: The npm security team responded to reports of a package that masqueraded as a cookie parsing library but contained a malicious backdoor. Published in March ’18 to introduce unauthorized publishing of mailparser; despite being deprecated, mailparser still received about 64,000 weekly downloads. 9 homebrew breach: Eric Holmes, an operations engineer at Remind, gained commit access to homebrew in under 30 minutes through an exposed GitHub API token. While he had no malicious intent, he gained access to components that are downloaded 500,000 times per month. 11 Mar 2016 July 2017 Sep 2017 Jan 2018 Feb 2018 May 2018 Aug 2018 Malicious npm: Gilbertson writes a fictional tale of creating a malicious npm packages to harvest credit card numbers from hundreds of websites. 6 3 npm typosquat: 40 intentionally malicious packages harvested credentials used to publish to the npm repository itself. 4 docker123321 images were created on Docker Hub. In Jan'18, it was accused of poisoning a Kubernetes honeypot, then in May’18 it was equated to a crypto mining botnet. 8go-bindata: after a developer deleted their GitHub account, someone immediately grabbed the ID — inheriting the karma instilled in that id, calling into question what packages and sources are canonical and immutable. 10 Backdoored PyPI: SSH Decorator (ssh-decorate), a library for handling SSH connections from Python code, was backdoored to enable stealing of private SSH credentials. 34 @djschleen
  • 35. Laurie Voss, npm and the furture of JavaScript, 2018-10-10 NPM AUDIT STATS
  • 36. 9 years later, vulnerable versions of Bouncy Castle were downloaded… 11M CVE-2007-6721 CVSS Base Score: 10.0 HIGH Exploitability Subscore: 10.0 23M 2007 2016 BOUNCY CASTLE
  • 37. Photo courtesy of Pixabay @djschleen do not boil
  • 40. THE REWARDS ARE IMPRESSIVE 90% improvement in time to deploy 34,000 hours saved in 90 days 48% increase in application quality @djschleen
  • 41. Image by DJ Schleen inevitable @djschleen