SlideShare a Scribd company logo
Embracing the Rise of
SecDevOps
Tenable Research Engineers
Embracing the Rise of
SecDevOps
Thomas Cappetta
Tenable Research
Vulnerability Research Engineer
- Cyber Security, DevOps, Cloud Computing
- CISSP
- Constantly Studying DevOps & Offensive Security
- Mentoring & Leadership
• Active: 3yrs. Asst. Coaching Youth Sports (volunteer)
• Previous: Identifying, Leading, & Mentoring Organizational Talent within SecOps & Engineering.
• Previous: Eagle Scout
About Cappetta
2
● ... a set of business methodologies, operational procedures, &
cultural practices proven to increase security, improve software
quality, improve release frequency, & provide immediate
insight into organizational exposures…
SecDevOps Defined
3
“According to State of DevOps Reports by Puppet… ”
High-Performing organizations which implement DevOps practices:
• Deploy code 30 times more frequently
• Have 50 percent fewer failures
• Automated:
• 33 % more of their configuration management
• 27 % more of their testing
• 30 % more of their deployments
• 27 % more of their change approval processes
Benefits
5
6
Respondent Demographics
7
DevOps vs. Security Researchers
Goal:
§ Disposable infrastructure
§ Automated Application Deployments
§ Continuous Patch Updates
§ Automated Release Testing
§ Autonomous Customer Service
§ Great Organizational Culture
Best Practices
8
Barriers to Success
9
● “a median of five days to gain access to a functioning exploit. In contrast, we learned,
defenders take a median 12 days to assess for a vulnerability.” – Tenable Research
● “According to WhiteHat Security stats, the average time to fix a website vulnerability
after it has been reported is 150-180 days.” – Tenable Research 2015
Barriers To Success – Tenable Research
10
● EdgeScan-
● Layer 7 - Average time to close a discovered vulnerability is 67 Days
● Layer Network - Average time to close a discovered vulnerability is 62 Days
● Denim Group
● A 2013 industry study from White Hat Security revealed that the “Mean Time to Fix” for web
application flaws categorized as “serious” averaged 193 days across all industries.
● In the same study, for one industry (Education) the figure jumped to 342 days of exposure
Barriers To Success – Exposure Remediation
11
● “The most common code vulnerability evident in static security testing during the
software development process is Unpatched Libraries” - WhiteHatSec
• Cyber Security is often viewed as an expense
• Regular Code Deployments require Smaller Feature branches
• Retrofitting Tooling into Pre-existing Monolithic Applications
Barriers To Success – Generic
12
• Changes don’t meet expectations
• Insecure Configurations
• Unknown Assets & Exposures
• Complex business workflows & Technical Debt
Barriers To Success - Generic
13
• Automating the wrong things first
• Continuous Delivery != Continuous Deployment
• Lack of Metrics
• Stale Test Automation
• So Many Tools…
Barriers To Success - DevOps
14
What’s the Challenge?
15
Branching -
Simplified vs.
Complex
Features vs.
Epics
Barriers to Success – Git Workflow
16
• Constantly Evolving Exposures
• Unknown External / Environmental Threats
• Compartmentalized Organizations
• Remediation Delay
• Zero-Days
• Constantly Evolving Tooling
Barriers To Success – Threat Landscape
17
18
best practices
19
Cyber Exposure Life-Cycle
20
- Invest in Tooling & Processes
- Automate Repeatable Processes
Process / Procedure Changes
21
Tooling / Processes: synopsys.com
22
• SecDevOps – Process & Tooling automation providing early
detection/remediation of cyber exposure
• BDD / Gherkin – Functional / Behavioral Use-Cases
• Regular Code Deployments & smaller change sets
• Infra/App as Code - disposable infrastructure
Solution(s)
23
• Inspec – Configuration Mgmt. Verification
• BDD-Security – Behavioral Security Testing
• T-Pot – HoneyPot sensors to monitor threat landscape
• Automation Breaks – Audit, Monitor, & fix it
Solution(s)
24
• Collaboration / Prioritization – eg. JIRA / Slack / SalesForce
• Invest in Research & Training by looking ahead
• Inspire Innovation, accept failure w/o judgement, & celebrate
success
Culture
25
Technical References
26
Sans Secure DevOps Toolchain
Sample: Managing Credentials
27
● Willingness to embrace failure in conquest of Excellence
● Enormous Appetites for Technical Expertise & Depth
● Willingness to empower innovation & invest in Research
● Ability to Influence the passion of employees
Culture
28
29
Tooling Process Maps
30
xebialabs.com
HoneyPot Automation – T-Pot
31
- Inspec
infrastructure
Inspec Your Assets
32
https://blog.chef.io/2018/05/23/automatically-generating-
inspec-controls-from-terraform/
https://lollyrock.com/articles/inspec-terraform/
https://learn.chef.io/modules/try-inspec#/
Chef marketplace
https://kitchen.ci/
Inspect your AWS Cloud
33
Personal Toolkit
34
https://github.com/cappetta/SecDevOps-Toolkit
https://github.com/cappetta/circleci_terraform

More Related Content

PPTX
SecDevOps: The New Black of IT
PDF
we45 - SecDevOps Concept Presentation
PPTX
we45 SecDevOps Presentation - ISACA Chennai
PDF
Integrating DevOps and Security
PDF
Proactive Security AppSec Case Study
PPTX
Automating security tests for Continuous Integration
PDF
T23 HTML5 Security Testing at Spotify
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
SecDevOps: The New Black of IT
we45 - SecDevOps Concept Presentation
we45 SecDevOps Presentation - ISACA Chennai
Integrating DevOps and Security
Proactive Security AppSec Case Study
Automating security tests for Continuous Integration
T23 HTML5 Security Testing at Spotify
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012

What's hot (20)

PDF
Continuous Security Testing - DevSecCon
PDF
Enforce compliance policy with model-driven automation
PDF
Vulnerabilities are bugs, Let's Test For Them!
PPTX
Continuous Security Testing with Devops - OWASP EU 2014
ODP
Making security-agile matt-tesauro
PPT
Code Quality - Security
PPTX
Integrating security into Continuous Delivery
PPTX
Continuous Security Testing in a Devops World #OWASPHelsinki
PPTX
Dev opsandsecurity owasp
PPTX
DevOps & Security: Here & Now
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Taking AppSec to 11 - BSides Austin 2016
PPTX
PPTX
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
PDF
DevOps - Right Tool for Right Phase
PDF
Flight East 2018 Presentation–Continuous Integration––An Overview
PDF
No Devops Without Continuous Testing
PDF
Why source control your Oracle Database?
PDF
Quickstart for continuous integration
PPTX
Insurance for your Assurance Team
Continuous Security Testing - DevSecCon
Enforce compliance policy with model-driven automation
Vulnerabilities are bugs, Let's Test For Them!
Continuous Security Testing with Devops - OWASP EU 2014
Making security-agile matt-tesauro
Code Quality - Security
Integrating security into Continuous Delivery
Continuous Security Testing in a Devops World #OWASPHelsinki
Dev opsandsecurity owasp
DevOps & Security: Here & Now
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Taking AppSec to 11 - BSides Austin 2016
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevOps - Right Tool for Right Phase
Flight East 2018 Presentation–Continuous Integration––An Overview
No Devops Without Continuous Testing
Why source control your Oracle Database?
Quickstart for continuous integration
Insurance for your Assurance Team
Ad

Similar to Embracing the Rise of SecDevOps (20)

PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
PPTX
DevSecOps - It can change your life (cycle)
PPTX
Web Application Security: Beyond PEN Testing
PPTX
How To Avoid Continuously Delivering Faulty Software
PDF
Applicaiton Security - Building The Audit Program
PDF
Software Operation Knowledge
PPTX
ISACA Ireland Keynote 2015
PPTX
Cyber security - It starts with the embedded system
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PDF
Webinar: Demonstrating Business Value for DevOps & Continuous Delivery
PPTX
How to build app sec team & culture in your organization the hack summi...
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PPTX
Lecture 3 software_engineering
PPTX
The New Security Practitioner
PDF
Web Application Remediation - OWASP San Antonio March 2007
PDF
Vulnerability Management: A Comprehensive Overview
KEY
Application Security Done Right
PPTX
Recent and-future-trends spm
Succeeding-Marriage-Cybersecurity-DevOps final
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
DevSecOps - It can change your life (cycle)
Web Application Security: Beyond PEN Testing
How To Avoid Continuously Delivering Faulty Software
Applicaiton Security - Building The Audit Program
Software Operation Knowledge
ISACA Ireland Keynote 2015
Cyber security - It starts with the embedded system
DevSecCon Keynote
DevSecCon KeyNote London 2015
Webinar: Demonstrating Business Value for DevOps & Continuous Delivery
How to build app sec team & culture in your organization the hack summi...
Outpost24 webinar: Turning DevOps and security into DevSecOps
Lecture 3 software_engineering
The New Security Practitioner
Web Application Remediation - OWASP San Antonio March 2007
Vulnerability Management: A Comprehensive Overview
Application Security Done Right
Recent and-future-trends spm
Ad

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf

Embracing the Rise of SecDevOps