SlideShare a Scribd company logo
© 2017 VERACODE INC. 1© 2017 VERACODE INC.
How to Get the Best Out
Of DevSecOps
The Operations Perspective
© 2017 VERACODE INC. 2© 2017 VERACODE INC.
Introduction
© 2017 VERACODE INC. 3
About This Webinar
https://www.brighttalk.com/webcast/12807/252395
Colin Domoney
Senior Product Innovation Manager
@colindomoney
© 2017 VERACODE INC. 4
Further Reading
Kim, Gene, Kevin Behr,
and George Spafford.
2013. The Phoenix Project:
A Novel About IT, DevOps,
and Helping Your Business
Win.
Kim, Gene, Patrick
Debois, and John Willis.
2016. The Devops
Handbook: How to
Create World-Class
Agility, Reliability, and
Security in Technology
Organizations
Beyer, Betsy, Jennifer
Petoff, Chris Jones, and
Niall Richard Murphy.
Site Reliability
Engineering: How
Google Runs
Production Systems. 1
edition. O′Reilly, 2016.
Humble, Jez, and David
Farley. 2010. Continuous
Delivery: Reliable
Software Releases
Through Build, Test, and
Deployment Automation.
‘2016 State of DevOps Report’. 2017.
Puppet. Accessed January 23.
https://puppet.com/resources/white-
paper/2016-state-of-devops-report.
© 2017 VERACODE INC. 6© 2017 VERACODE INC.
What is Dev(Sec)Ops
© 2017 VERACODE INC. 7
A Cultural Clash
© 2017 VERACODE INC. 8
What is Dev(Sec) Ops?
“DevOps is the practice of operations and development engineers
participating together in the entire service lifecycle,
from design through the development process to production support.”
“DevOps is also characterized by operations staff making
use many of the same techniques as developers for their
systems work.”
Source : ‘What Is DevOps?’ 2010. The Agile Admin. August 2.
https://theagileadmin.com/what-is-devops/.
© 2017 VERACODE INC. 9
The First Way : Systems Thinking
Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning
DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways-
principles-underpinning-devops/.
• Never pass a known defect to downstream work centre
• Never allow local optimization to create global degradation
• Always seek to increase flow
• Always seek to achieve profound understanding of the system (per Deming)
The First Way emphasizes the performance of the entire system, as opposed to the
performance of a specific silo of work or department
© 2017 VERACODE INC. 10
The Second Way : Amplify Feedback Loops
Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning
DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways-
principles-underpinning-devops/.
The Second Way is about creating the right to left feedback loops.
• Understand and respond to all customers, internal and external
• Shorten and amplify all feedback loops
• Embed knowledge where you need it
© 2017 VERACODE INC. 11
The Third Way : Continual Experimentation
and Learning
Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning
DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways-
principles-underpinning-devops/.
• Allocate time for the improvement of daily work
• Create rituals that reward the team for taking risks
• Introduce faults into the system to increase resilience
The Third Way is about creating a culture that fosters two things: continual
experimentation, taking risks and learning from failure; and understanding that
repetition and practice is the prerequisite to mastery.
© 2017 VERACODE INC. 12
The Benefits of DevOps
• High-performing organizations are decisively outperforming their
lower-performing peers in terms of throughput.
• High performers have better employee loyalty,
as measured by employee Net Promoter Score (eNPS).
• Improving quality is everyone’s job.
• High performers spend 50 percent less time remediating security
issues than low performers.
• Taking an experimental approach to product development can
improve your IT and organizational performance.
• Undertaking a technology transformation initiative can produce
sizeable cost savings for any organization.
Source : ‘2016 State of DevOps Report’. 2017. Puppet. Accessed January
23. https://puppet.com/resources/white-paper/2016-state-of-devops-report.
© 2017 VERACODE INC. 13
DevOps Maturity Model
Initial
• Poor, ad hoc communication
• No automation
• Unpredictable, uncontrolled reactive process
Managed
• Managed communication, some shared decision making
• Siloed automation, no central infrastructure
• Processes are managed but not standardised
Defined
• Collaboration, shared decision making and accountability
• Central automated processes across the application lifecycle
• Processes are standardised across the organisation
Measured
• Collaboration-based processes are measured to identify inefficiencies and bottlenecks
• Collect and analyse metrics of the automated processes and measure against the business goals
• Visibility and predictability of entire process quality and performance
Optimised
• Effective knowledge sharing and individual empowerment
• Self-service automation, self-learning using analytics and self-remediation
• Process risk and cost optimisation
© 2017 VERACODE INC. 14© 2017 VERACODE INC.
The Move to
DevOps
Market trends and enabling technologies
© 2017 VERACODE INC. 15
Before We Had DevOps
© 2017 VERACODE INC. 16
Cloud Technology and CI/CD Platforms
Cloud Technology CI/CD Platforms
© 2017 VERACODE INC. 17
Configuration Management Tools
© 2017 VERACODE INC. 18
What Makes a Good DevSecOps Solution?
•Provide security feedback as early as possible, in DevOps tools
Fail quickly, through automation
•Ease of use, actionable findings, speed, low FPs
Limit time-to-market impact
•Provide privacy early in SDLC, measure and assess teams, compliance and risk later
Support team autonomy with enterprise orchestration
•Microservices, Infrastructure as Code, leading edge languages and frameworks, Containerization
Adapt to latest practices & technologies
•Developer communities, small, consumable courses, open documentation, integrations in marketplaces
Support culture of learning & openness
•Provide feedback from Ops (Prod & QA) about risks/attacks in a way that is consumable by development
Provide operational visibility
© 2017 VERACODE INC. 19© 2017 VERACODE INC.
The Impact to
Operations
© 2017 VERACODE INC. 20
Three Cornerstones
• Collaboration
– Very little crossover between teams, specific roles and responsibilities
– Collaborate flexibly through flexible tools (i.e.. Slack)
• Flexibility
– Previously focused on stability over everything else
– Modern organisations need to be flexible and responsive
• Automation
– Manual changes cannot keep pace with rapid turnaround times required
– Frees up resources for critical thinking tasks and problem solving
© 2017 VERACODE INC. 21
“Infrastructure as Code”
https://puppet.com/blog/what-is-infrastructure-as-code
© 2017 VERACODE INC. 22
Site Reliability Engineering - It’s all Software
Now
• Defined by Ben Treynor: "what happens when a software
engineer is tasked with what used to be called operations.
• The ideal SRE candidate is a coder who also has operational
and systems knowledge and likes to whittle down complex
tasks.
• Typically spend their time as follows:
– up to 50% of their time doing "ops" related work
– up to 50% of their time on development tasks such as new
features, scaling or automation
https://en.wikipedia.org/wiki/Site_reliability_engineering
© 2017 VERACODE INC. 23© 2017 VERACODE INC.
Best Practices
for Securing
Operations
© 2017 VERACODE INC. 24
Control Your Source Code Repositories
• Continuous Deployment means any code checked in can
potentially reach production within minutes
• Best practices include:
– Splitting repositories
– Using Perforce for fine grained control
– Performing peer reviews on ‘pull requests’ to critical code
© 2017 VERACODE INC. 25
Protect Your Deployment Pipeline
• Continuous Deployment means that your pipeline is a critical piece of
infrastructure
• Best practices include:
– Hardening CI/CD systems to prevent compromise
– Review changes to prevent execution of unwanted code
– Test for suspicious API calls in unit tests or scripts
– Ensure CI/CD runs in isolated containers
– Ensure VCS credentials are ‘read only’
© 2017 VERACODE INC. 26
Using Security Testing Tools
Behavioural Driven Development
Security Testing
IDE Integrations for
Security Testing
© 2017 VERACODE INC. 27
Integrate Security Into Your Deployment
Pipeline – VSTS/TFS
© 2017 VERACODE INC. 28
Integrate Security Into Your Deployment
Pipeline - Jenkins
© 2017 VERACODE INC. 29
Security Telemetry in Applications
• Record all security relevant events such as:
– Successful and unsuccessful logins
– User password resets
– User e-mail address resets
– User credit card changes
• Monitor changes in ratios of success to failures
• Alert on events such as:
– Anomalous behaviour
– Sudden changes in values
© 2017 VERACODE INC. 30
Security Telemetry in the Environment
• Monitor environmental items and events such as:
– OS changes
– Security group changes
– Changes to configurations
– Cloud infrastructure changes
– Web server errors
© 2017 VERACODE INC. 31
Use the Right Tool for Job
https://www.slideshare.net/YuryChemerkin/zane-lackey-security-at-scale-web-application-security-in-a-
continuous-deployment-environment
© 2017 VERACODE INC. 32
Use the Right Tool for Job
https://www.slideshare.net/YuryChemerkin/zane-lackey-security-at-scale-web-application-security-in-a-
continuous-deployment-environment
© 2017 VERACODE INC. 33
Case Study : Security Telemetry at Etsy
• Nick Galbreath (Director of Engineering at Etsy, 2010):
– No dedicated fraud control or Infosec team
– Embedded telemetry with entire DevOps value stream
– Everyone was responsible for monitoring and alerting
• Example events:
– Abnormal program termination (segfaults)
– Database syntax error
– Indications of SQL attack
© 2017 VERACODE INC. 34
Automated Dashboards – “Measure All The
Things”
© 2017 VERACODE INC. 35
“Security Is Not A Binary Event”
https://www.slideshare.net/nickgsuperstar/devopssec-apply-devops-
principles-to-security
© 2017 VERACODE INC. 36
Logging for Security
• Logs are the ‘bread and butter’ of an IT Operations team
• Challenges when used in a security context:
– Delayed response to identity issues (delays in alerting)
– Limited data (no POST body, no header data)
– Limited context (disparate events in several locations)
Phillip Maddux, https://medium.com/@foospidy
© 2017 VERACODE INC. 37
Destructive Testing / Chaos Engineering
Chaos Engineering is the discipline of experimenting on a distributed system in order to
build confidence in the system’s capability to withstand turbulent conditions in production.
Four steps as follows:
• Build a hypothesis around steady-state behaviour.
• Vary real-world events.
• Run experiments in production.
• Automate experiments to run continuously.
“The best way to avoid failure is to fail constantly.”
- Jeff Atwood
© 2017 VERACODE INC. 38
Case Study : Netflix
© 2017 VERACODE INC. 40
Operating System Hardening
• Disable unused and/or guest accounts
• Run at level of least privilege
• Disable unused services
• Ensure automatic updates are enabled
• Ensure strong passwords are used
• Disable overly verbose logging
• Ensure backups are performed
© 2017 VERACODE INC. 41
Runtime Application Self Protection
• Very low false positives and false negatives.
• Requires no modification to application source code.
• Can report attack information into SIEM.
• Can be deployed onto legacy applications and platforms.
• Can execute in ‘monitor’ or ‘alert’ mode to identify attacks
without protecting the application (IAST)
Benefits of RASP
• An ‘agent’ that executes in parallel with an application and
provides run-time protection by monitoring traffic through the
application.
• Data propagation through the application to determine
whether input data is ‘tainted’ in its lifetime.
• If data is tainted then it is possible that the application is
under attack and the agent can then protect the application at
run-time.
What is RASP?
© 2017 VERACODE INC. 42
Change Management Process
• ITIL change management process defines three types of change:
– Standard (low-risk, follow standard process, can be automated)
– Normal (require approval by CAB, manual process)
– Emergency (high priority CAB)
• Too many changes are classified as ‘normal’
• DevOps best practice suggests:
– Try and make as much as possible ‘standard’ and auto-approve
– Optimise the CAB process for requests that remain as ‘normal’
© 2017 VERACODE INC. 43
Make a Commitment
• Learn how to code!
• Learn the ‘tools of the trade’ (Git, Ansible, etc.)
• Learn the basics with a test application i.e. WebGoat.Net
• Learn how a Version Control System works
• Automate a repetitive task
• Experience a ‘Day in the Life’ of a Developer
Security is Everyone’s Responsibility
© 2017 VERACODE INC. 45
Thank You!
© 2017 VERACODE INC.

More Related Content

PDF
DevSecOps at Agile 2019
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
The New Security Playbook: DevSecOps
PDF
2019 DevSecOps Reference Architectures
PDF
DevSecOps and the CI/CD Pipeline
PDF
DevSecOps: Bringing security to the DevOps pipeline
PDF
DevOps or DevSecOps
DevSecOps at Agile 2019
Maturing DevSecOps: From Easy to High Impact
The New Security Playbook: DevSecOps
2019 DevSecOps Reference Architectures
DevSecOps and the CI/CD Pipeline
DevSecOps: Bringing security to the DevOps pipeline
DevOps or DevSecOps

What's hot (20)

PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
PDF
DevSecOps: A New Hope for Security in CI/CD
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PDF
Adversary Driven Defense in the Real World
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Dos and Don'ts of DevSecOps
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
DevSecCon London 2018: Open DevSecOps
PDF
Hacker Games & DevSecOps
PDF
The State of DevSecOps
PPTX
ABN AMRO DevSecOps Journey
PDF
DevSecOps What Why and How
PDF
The New Ways of DevSecOps - The Secure Dev 2019
PDF
Zero to Ninety in Securing DevOps
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
Building a DevSecOps Pipeline Around Your Spring Boot Application
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: essential tooling to enable continuous security 2019-09-16
Adversary Driven Defense in the Real World
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
Devops Indonesia - DevSecOps - The Open Source Way
Dos and Don'ts of DevSecOps
Pentest is yesterday, DevSecOps is tomorrow
DevSecCon London 2018: Open DevSecOps
Hacker Games & DevSecOps
The State of DevSecOps
ABN AMRO DevSecOps Journey
DevSecOps What Why and How
The New Ways of DevSecOps - The Secure Dev 2019
Zero to Ninety in Securing DevOps
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
DevSecCon London 2017: when good containers go bad by Tim Mackey
RSAC DevSecOpsDays 2018 - We are all Equifax
Ad

Similar to How to get the best out of DevSecOps - an operations perspective (20)

PPTX
How to get the best out of DevSecOps - a security perspective
PPTX
How to apply DevOps in a regulated organisation
PPTX
DevOps: Security's Big Opportunity
PPTX
How to get the best out of DevSecOps - a developers perspective
PPTX
Enterprise DevOps and the Modern Mainframe Webcast Presentation
PDF
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
PDF
Your Resolution for 2018: Five Principles For Securing DevOps
PDF
Scale Continuous Deployment to Production with DeployHub and CloudBees
PDF
Scale Continuous Deployment to Production with DeployHub and CloudBees
PPTX
DevOps introduction
PDF
Industry Perspective: DevOps - What it Means for the Average Business
PPTX
Introduction to DevOps slides-converted (1).pptx
PDF
DevOps: What, who, why and how?
PDF
DevOps culture, concepte , philosophie and practices
PDF
Introduction to DevOps slides.pdf
PDF
IBM Innovate - Uderstanding DevOps
PDF
screenshoHow Web App Development Companies Are Embracing DevOps for Speed and...
PDF
DevOps for Enterprise Systems : Innovate like a Startup
PDF
intro to DevOps
PDF
Deliver on the Promise of Agile and DevOps Transformations
How to get the best out of DevSecOps - a security perspective
How to apply DevOps in a regulated organisation
DevOps: Security's Big Opportunity
How to get the best out of DevSecOps - a developers perspective
Enterprise DevOps and the Modern Mainframe Webcast Presentation
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
Your Resolution for 2018: Five Principles For Securing DevOps
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
DevOps introduction
Industry Perspective: DevOps - What it Means for the Average Business
Introduction to DevOps slides-converted (1).pptx
DevOps: What, who, why and how?
DevOps culture, concepte , philosophie and practices
Introduction to DevOps slides.pdf
IBM Innovate - Uderstanding DevOps
screenshoHow Web App Development Companies Are Embracing DevOps for Speed and...
DevOps for Enterprise Systems : Innovate like a Startup
intro to DevOps
Deliver on the Promise of Agile and DevOps Transformations
Ad

Recently uploaded (20)

PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
ai tools demonstartion for schools and inter college
PDF
System and Network Administration Chapter 2
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Introduction to Artificial Intelligence
PPTX
Essential Infomation Tech presentation.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
top salesforce developer skills in 2025.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
AI in Product Development-omnex systems
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
ai tools demonstartion for schools and inter college
System and Network Administration Chapter 2
Navsoft: AI-Powered Business Solutions & Custom Software Development
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Understanding Forklifts - TECH EHS Solution
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Introduction to Artificial Intelligence
Essential Infomation Tech presentation.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Odoo POS Development Services by CandidRoot Solutions
Softaken Excel to vCard Converter Software.pdf
top salesforce developer skills in 2025.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Reimagine Home Health with the Power of Agentic AI​
Which alternative to Crystal Reports is best for small or large businesses.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
How to Choose the Right IT Partner for Your Business in Malaysia
AI in Product Development-omnex systems

How to get the best out of DevSecOps - an operations perspective

  • 1. © 2017 VERACODE INC. 1© 2017 VERACODE INC. How to Get the Best Out Of DevSecOps The Operations Perspective
  • 2. © 2017 VERACODE INC. 2© 2017 VERACODE INC. Introduction
  • 3. © 2017 VERACODE INC. 3 About This Webinar https://www.brighttalk.com/webcast/12807/252395 Colin Domoney Senior Product Innovation Manager @colindomoney
  • 4. © 2017 VERACODE INC. 4 Further Reading Kim, Gene, Kevin Behr, and George Spafford. 2013. The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. Kim, Gene, Patrick Debois, and John Willis. 2016. The Devops Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations Beyer, Betsy, Jennifer Petoff, Chris Jones, and Niall Richard Murphy. Site Reliability Engineering: How Google Runs Production Systems. 1 edition. O′Reilly, 2016. Humble, Jez, and David Farley. 2010. Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation. ‘2016 State of DevOps Report’. 2017. Puppet. Accessed January 23. https://puppet.com/resources/white- paper/2016-state-of-devops-report.
  • 5. © 2017 VERACODE INC. 6© 2017 VERACODE INC. What is Dev(Sec)Ops
  • 6. © 2017 VERACODE INC. 7 A Cultural Clash
  • 7. © 2017 VERACODE INC. 8 What is Dev(Sec) Ops? “DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support.” “DevOps is also characterized by operations staff making use many of the same techniques as developers for their systems work.” Source : ‘What Is DevOps?’ 2010. The Agile Admin. August 2. https://theagileadmin.com/what-is-devops/.
  • 8. © 2017 VERACODE INC. 9 The First Way : Systems Thinking Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways- principles-underpinning-devops/. • Never pass a known defect to downstream work centre • Never allow local optimization to create global degradation • Always seek to increase flow • Always seek to achieve profound understanding of the system (per Deming) The First Way emphasizes the performance of the entire system, as opposed to the performance of a specific silo of work or department
  • 9. © 2017 VERACODE INC. 10 The Second Way : Amplify Feedback Loops Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways- principles-underpinning-devops/. The Second Way is about creating the right to left feedback loops. • Understand and respond to all customers, internal and external • Shorten and amplify all feedback loops • Embed knowledge where you need it
  • 10. © 2017 VERACODE INC. 11 The Third Way : Continual Experimentation and Learning Source : Kim, Gene. 2012. ‘The Three Ways: The Principles Underpinning DevOps’. IT Revolution. August 22. http://itrevolution.com/the-three-ways- principles-underpinning-devops/. • Allocate time for the improvement of daily work • Create rituals that reward the team for taking risks • Introduce faults into the system to increase resilience The Third Way is about creating a culture that fosters two things: continual experimentation, taking risks and learning from failure; and understanding that repetition and practice is the prerequisite to mastery.
  • 11. © 2017 VERACODE INC. 12 The Benefits of DevOps • High-performing organizations are decisively outperforming their lower-performing peers in terms of throughput. • High performers have better employee loyalty, as measured by employee Net Promoter Score (eNPS). • Improving quality is everyone’s job. • High performers spend 50 percent less time remediating security issues than low performers. • Taking an experimental approach to product development can improve your IT and organizational performance. • Undertaking a technology transformation initiative can produce sizeable cost savings for any organization. Source : ‘2016 State of DevOps Report’. 2017. Puppet. Accessed January 23. https://puppet.com/resources/white-paper/2016-state-of-devops-report.
  • 12. © 2017 VERACODE INC. 13 DevOps Maturity Model Initial • Poor, ad hoc communication • No automation • Unpredictable, uncontrolled reactive process Managed • Managed communication, some shared decision making • Siloed automation, no central infrastructure • Processes are managed but not standardised Defined • Collaboration, shared decision making and accountability • Central automated processes across the application lifecycle • Processes are standardised across the organisation Measured • Collaboration-based processes are measured to identify inefficiencies and bottlenecks • Collect and analyse metrics of the automated processes and measure against the business goals • Visibility and predictability of entire process quality and performance Optimised • Effective knowledge sharing and individual empowerment • Self-service automation, self-learning using analytics and self-remediation • Process risk and cost optimisation
  • 13. © 2017 VERACODE INC. 14© 2017 VERACODE INC. The Move to DevOps Market trends and enabling technologies
  • 14. © 2017 VERACODE INC. 15 Before We Had DevOps
  • 15. © 2017 VERACODE INC. 16 Cloud Technology and CI/CD Platforms Cloud Technology CI/CD Platforms
  • 16. © 2017 VERACODE INC. 17 Configuration Management Tools
  • 17. © 2017 VERACODE INC. 18 What Makes a Good DevSecOps Solution? •Provide security feedback as early as possible, in DevOps tools Fail quickly, through automation •Ease of use, actionable findings, speed, low FPs Limit time-to-market impact •Provide privacy early in SDLC, measure and assess teams, compliance and risk later Support team autonomy with enterprise orchestration •Microservices, Infrastructure as Code, leading edge languages and frameworks, Containerization Adapt to latest practices & technologies •Developer communities, small, consumable courses, open documentation, integrations in marketplaces Support culture of learning & openness •Provide feedback from Ops (Prod & QA) about risks/attacks in a way that is consumable by development Provide operational visibility
  • 18. © 2017 VERACODE INC. 19© 2017 VERACODE INC. The Impact to Operations
  • 19. © 2017 VERACODE INC. 20 Three Cornerstones • Collaboration – Very little crossover between teams, specific roles and responsibilities – Collaborate flexibly through flexible tools (i.e.. Slack) • Flexibility – Previously focused on stability over everything else – Modern organisations need to be flexible and responsive • Automation – Manual changes cannot keep pace with rapid turnaround times required – Frees up resources for critical thinking tasks and problem solving
  • 20. © 2017 VERACODE INC. 21 “Infrastructure as Code” https://puppet.com/blog/what-is-infrastructure-as-code
  • 21. © 2017 VERACODE INC. 22 Site Reliability Engineering - It’s all Software Now • Defined by Ben Treynor: "what happens when a software engineer is tasked with what used to be called operations. • The ideal SRE candidate is a coder who also has operational and systems knowledge and likes to whittle down complex tasks. • Typically spend their time as follows: – up to 50% of their time doing "ops" related work – up to 50% of their time on development tasks such as new features, scaling or automation https://en.wikipedia.org/wiki/Site_reliability_engineering
  • 22. © 2017 VERACODE INC. 23© 2017 VERACODE INC. Best Practices for Securing Operations
  • 23. © 2017 VERACODE INC. 24 Control Your Source Code Repositories • Continuous Deployment means any code checked in can potentially reach production within minutes • Best practices include: – Splitting repositories – Using Perforce for fine grained control – Performing peer reviews on ‘pull requests’ to critical code
  • 24. © 2017 VERACODE INC. 25 Protect Your Deployment Pipeline • Continuous Deployment means that your pipeline is a critical piece of infrastructure • Best practices include: – Hardening CI/CD systems to prevent compromise – Review changes to prevent execution of unwanted code – Test for suspicious API calls in unit tests or scripts – Ensure CI/CD runs in isolated containers – Ensure VCS credentials are ‘read only’
  • 25. © 2017 VERACODE INC. 26 Using Security Testing Tools Behavioural Driven Development Security Testing IDE Integrations for Security Testing
  • 26. © 2017 VERACODE INC. 27 Integrate Security Into Your Deployment Pipeline – VSTS/TFS
  • 27. © 2017 VERACODE INC. 28 Integrate Security Into Your Deployment Pipeline - Jenkins
  • 28. © 2017 VERACODE INC. 29 Security Telemetry in Applications • Record all security relevant events such as: – Successful and unsuccessful logins – User password resets – User e-mail address resets – User credit card changes • Monitor changes in ratios of success to failures • Alert on events such as: – Anomalous behaviour – Sudden changes in values
  • 29. © 2017 VERACODE INC. 30 Security Telemetry in the Environment • Monitor environmental items and events such as: – OS changes – Security group changes – Changes to configurations – Cloud infrastructure changes – Web server errors
  • 30. © 2017 VERACODE INC. 31 Use the Right Tool for Job https://www.slideshare.net/YuryChemerkin/zane-lackey-security-at-scale-web-application-security-in-a- continuous-deployment-environment
  • 31. © 2017 VERACODE INC. 32 Use the Right Tool for Job https://www.slideshare.net/YuryChemerkin/zane-lackey-security-at-scale-web-application-security-in-a- continuous-deployment-environment
  • 32. © 2017 VERACODE INC. 33 Case Study : Security Telemetry at Etsy • Nick Galbreath (Director of Engineering at Etsy, 2010): – No dedicated fraud control or Infosec team – Embedded telemetry with entire DevOps value stream – Everyone was responsible for monitoring and alerting • Example events: – Abnormal program termination (segfaults) – Database syntax error – Indications of SQL attack
  • 33. © 2017 VERACODE INC. 34 Automated Dashboards – “Measure All The Things”
  • 34. © 2017 VERACODE INC. 35 “Security Is Not A Binary Event” https://www.slideshare.net/nickgsuperstar/devopssec-apply-devops- principles-to-security
  • 35. © 2017 VERACODE INC. 36 Logging for Security • Logs are the ‘bread and butter’ of an IT Operations team • Challenges when used in a security context: – Delayed response to identity issues (delays in alerting) – Limited data (no POST body, no header data) – Limited context (disparate events in several locations) Phillip Maddux, https://medium.com/@foospidy
  • 36. © 2017 VERACODE INC. 37 Destructive Testing / Chaos Engineering Chaos Engineering is the discipline of experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production. Four steps as follows: • Build a hypothesis around steady-state behaviour. • Vary real-world events. • Run experiments in production. • Automate experiments to run continuously. “The best way to avoid failure is to fail constantly.” - Jeff Atwood
  • 37. © 2017 VERACODE INC. 38 Case Study : Netflix
  • 38. © 2017 VERACODE INC. 40 Operating System Hardening • Disable unused and/or guest accounts • Run at level of least privilege • Disable unused services • Ensure automatic updates are enabled • Ensure strong passwords are used • Disable overly verbose logging • Ensure backups are performed
  • 39. © 2017 VERACODE INC. 41 Runtime Application Self Protection • Very low false positives and false negatives. • Requires no modification to application source code. • Can report attack information into SIEM. • Can be deployed onto legacy applications and platforms. • Can execute in ‘monitor’ or ‘alert’ mode to identify attacks without protecting the application (IAST) Benefits of RASP • An ‘agent’ that executes in parallel with an application and provides run-time protection by monitoring traffic through the application. • Data propagation through the application to determine whether input data is ‘tainted’ in its lifetime. • If data is tainted then it is possible that the application is under attack and the agent can then protect the application at run-time. What is RASP?
  • 40. © 2017 VERACODE INC. 42 Change Management Process • ITIL change management process defines three types of change: – Standard (low-risk, follow standard process, can be automated) – Normal (require approval by CAB, manual process) – Emergency (high priority CAB) • Too many changes are classified as ‘normal’ • DevOps best practice suggests: – Try and make as much as possible ‘standard’ and auto-approve – Optimise the CAB process for requests that remain as ‘normal’
  • 41. © 2017 VERACODE INC. 43 Make a Commitment • Learn how to code! • Learn the ‘tools of the trade’ (Git, Ansible, etc.) • Learn the basics with a test application i.e. WebGoat.Net • Learn how a Version Control System works • Automate a repetitive task • Experience a ‘Day in the Life’ of a Developer Security is Everyone’s Responsibility
  • 42. © 2017 VERACODE INC. 45 Thank You! © 2017 VERACODE INC.