SlideShare a Scribd company logo
DevSecOpsIndonesia
Pain & Pleasure of doing AppSec
in
DevOps
Suman
Sourav
ABOUT ME
• 14+ Years of experience in Application Security
• Certified Secure Software Lifecycle Professional (CSSLP)
• Co-Leader of DevSecOps Singapore & Indonesia
• Community Ambassador – DevOps Institute
• Full time student – learning from people around me
DevSecOpsIndonesia
DevSecOpsIndonesia
Application Security-Non Functional Requirements ?
Security Team
Application
Security
DevOps Team
DevOps
Tools
DevSecOpsIndonesia
I am not kidding-No Offense !
Confluence
JIRA
BitBucket
Bamboo
Artifactory
Jenkins
(master)
Jenkins
(slave)
SonarQube
Selenium
Grids
Web Archive
Containerized
(Docker image)
Dev
(Docker)
App Server
Early scans during CI to ensure code quality
and coverage
Parallel execution of test
cases
Current
Recommended
Orchestrated
SIT, UAT, Prod
TDD/BDD
DevSecOpsIndonesia
This is same across all industries
Development Operations
QA
Customer
Centric
Immediate
Results
Automation
Scale
Agile
90%of surveyed
organizations are
implementing or
piloting DevOps
and
99%Agree DevOps is an opportunity to
improve application security
but only
20%Are doing application
security testing during
development
SecOps
SecOps Needs to Shift Left
DevSecOpsIndonesia
Moving From To
Waterfall Agile & DevOps
Physical or
Virtual Server
Cloud & Containers
Scalable
InstrumentedMonolithic
or N-Tier
APIs &
Micro services
Architecture
Deployment
Development
Process
Ideally
Continuous
Changing Landscape
DevSecOpsIndonesia
Reference: Cloud Security Alliance : Security Guidance for Early Adopters of the Internet of Things – April 2015
API is evolving fast
DevSecOpsIndonesia
Defensive security in era of DevOps
Organization fails to map the security threats to
the risk management process
• faster release cycles
• automated security testing
• tons of security results
• silo culture
Threat
Modeling
Attack Surface
areas
Risk
Analysis
DevSecOpsIndonesia
DevOps Approach
• People
 Collaboration
 Training
• Process
 Continuous Improvement
 Continuous Testing
• Technology
 Self Service
 Automation
DevSecOps Approach
3S Principles
TECHNOLOGY
Security Capabilities
DEVSECOPS
• Incorporate security capabilities in
DevOps collaborative technologies.
• Deploy security solutions to
support; security scanning, code
quality, reporting and data
dissemination capabilities.
• Institutionalize security
through standardization
and documented
business processes.
• Implement and prioritize
project methods and
roadmaps in alignment
with development &
security goals.
• Tie rules of engagement
to corporate security
mission, vision and
strategy.
• Provide clear goals,
metrics and KPI’s
aligned with security
strategy
• Establish training and
incentive programs to
modify or encourage
security-driven decisions.
• Align user needs and security
skills with compliance needs.
DevSecOpsIndonesia
DevSecOpsIndonesia
Secure Engineering Development Practice
DEVELOPMENT BUILD AND
DEPLOY
STAGINGREQUIREMENTS
External
Repositories
Common Components
DESIGN
Repository
DAST/SecurityQAThreat
Modeling
SAST
VS/PT/IAST/
Fuzzing
Components
Monitoring
Monitoring
SCM Tools
PRODUCTION
SAST : Static Application Security Testing
DAST : Dynamic Application Security Testing
IAST : Interactive Application Security Testing
VS : Vulnerability scanning
PT : Penetration Testing
DevSecOpsIndonesia
Does this make sense ?
Confluence
JIRA
BitBucket
Bamboo
Artifactory
Jenkins
(master)
Jenkins
(slave)
Web Archive
Containerized
(Docker image)
Dev
(Docker)
App Server
SonarQube
Selenium Grids
Parallel execution of test
cases
Orchestrated
SIT, UAT, Prod
TDD/BDD
Current
Recommended
Security
SAST
Security
Requirements
Early scans during CI to ensure code
quality and coverage
Early SAST and SCA scans to discovers security
issues
Container
Security
Regulatory Security requirements
Container Security Scanning and Monitoring
DevSecOpsIndonesia
Evaluate | security controls, integration and
adoption
Expose | threats, risks and scores
Encapsulate | what , when where and why
Efficient | decision making and investment
Data analytics in security
Contextual
decision
making
Seamless
design to
execution
Predictive
Analysis
Real time
collaboration
DevSecOpsIndonesia
Building analytics database
0
2
4
6
8
10
SAST
DAST
SecurityQA
VS/Fuzzing
IAST
Analytics
DB
SIEM
Security metrics
template
TM
DevSecOpsIndonesia
Master
Branch1
Compile Test Publish Deploy
Build
GitHub Build Tools Deploy Env
Open Source Libraries
DevSecOps Orchestration Platform
• Sec Requirements
• Design Review
• Threat Modelling
• Security Unit Tests
• SAST
• SCA
• DAST
• IAST
• VA
• Security as Code
• RASP
• NG WAF
Security As a service
Vulnerability
Normalization &
Analytics
Feedback Loop
DevSecOpsIndonesia
OWASP DevSecOps Maturity Model
Reference : https://docs.google.com/presentation/d/1rrbyXqxy3LXAJNPFrVH99mj_BNaJKymMsXZItYArWEM/edit#slide=id.g1560ae0085_5_74
Continuous Security Testing
Reference: https://docs.google.com/presentation/d/1dAewXIHgBEKHKwBPpM5N_G2eM6PRpduoGJrp6R6pNUI/edit#slide=id.p
DevSecOpsIndonesia
All the app will be
analyzed for RA levels
based on their Risk
Assessment Score
Risk Assessment DevOps SMM3 SMM2 SMM1
RA2RA1
METRICS
Baseline RequirementsBaseline RequirementsBaseline Requirements
Additional Requirements Additional Requirements
Architecture Risk Analysis
Application ThreatModeling
SCORESCORE
Automated scanning
SCORE
Risk Assessment
SECURITY MATURITY SCORE
MATURITY
RA3
Architecture Risk Analysis
• All the app will go
through the baseline
assessment as per
current assessment
process
• Automated assessment
will be done based on
Maturity Requirements
• Architecture Risk
Analysis will be required
for RA 2 & RA 1 Apps
• Applicartion
Threatmodeling will be
done only for RA 1 Apps
• Security Maturity Score
will be calculated after
each assessment
Setting up priorities
DevSecOpsIndonesia
We can eliminate and minimize the threats if
we change our engineering development
practice
○ Incorporate security as culture
○ Investment in the right directions
○ Innovate the processes that suits our
organization
Are we ready for change ?
DevSecOpsIndonesia
Connecting
Teams
Connecting
Insight
Connecting
Outcomes
Connecting
Delivery
Welcome to the Era of Connection. Are you ready?
Bid data analytics can change
the state of security in an
organization and can offer
valuable insights into business
risks far beyond IT
technologies are available to
take a look in much more detail
around machine-generated data
and user-generated data to
understand what is happening
inside of an organization
DevSecOpsIndonesia
“The challenge for security in DevOps is
not the technology but the people”

More Related Content

PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
Unit testing : what are you missing for security
PPTX
Open Source Libraries - Managing Risk in Cloud
PPTX
DevSecOps-OWASP Indonesia Day 2017
PDF
A Successful SAST Tool Implementation
PDF
Devops security-An Insight into Secure-SDLC
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Implementing an Application Security Pipeline in Jenkins
Unit testing : what are you missing for security
Open Source Libraries - Managing Risk in Cloud
DevSecOps-OWASP Indonesia Day 2017
A Successful SAST Tool Implementation
Devops security-An Insight into Secure-SDLC
Bringing Security Testing to Development: How to Enable Developers to Act as ...
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal

What's hot (20)

PPTX
Shifting the conversation from active interception to proactive neutralization
PPT
Introducing: Klocwork Insight Pro | November 2009
PPTX
How to Get Started with DevSecOps
PPTX
Integrating security into Continuous Delivery
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PPTX
Building a high quality+ products with SCA
PPTX
ABN AMRO DevSecOps Journey
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
PDF
A Secure DevOps Journey
PPTX
Agile and Secure Development
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PPTX
Continuous and Visible Security Testing with BDD-Security
PPTX
OWASP Top 10 practice workshop by Stanislav Breslavskyi
PPTX
Secure Software Development Life Cycle
PPTX
Programming languages and techniques for today’s embedded andIoT world
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PDF
Strengthen and Scale Security for a dollar or less
PDF
Open Source Security at Scale- The DevOps Challenge 
PPTX
Security as a new metric for Business, Product and Development Lifecycle
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Shifting the conversation from active interception to proactive neutralization
Introducing: Klocwork Insight Pro | November 2009
How to Get Started with DevSecOps
Integrating security into Continuous Delivery
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Building a high quality+ products with SCA
ABN AMRO DevSecOps Journey
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
A Secure DevOps Journey
Agile and Secure Development
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Continuous and Visible Security Testing with BDD-Security
OWASP Top 10 practice workshop by Stanislav Breslavskyi
Secure Software Development Life Cycle
Programming languages and techniques for today’s embedded andIoT world
Static Application Security Testing Strategies for Automation and Continuous ...
Strengthen and Scale Security for a dollar or less
Open Source Security at Scale- The DevOps Challenge 
Security as a new metric for Business, Product and Development Lifecycle
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Ad

Similar to DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps (20)

PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
PDF
The State of DevSecOps
PPTX
State of DevSecOps - GTACS 2019
PPTX
DevSecOps without DevOps is Just Security
PPTX
State of DevSecOps - DevSecOpsDays 2019
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
Security's DevOps Transformation
PDF
The What, Why, and How of DevSecOps
PDF
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
PDF
Application Security Testing for a DevOps Mindset
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PPTX
HouSecCon 2019: Offensive Security - Starting from Scratch
PPTX
DevSecOps Powerpoint Presentation for Students
DOCX
10 things to get right for successful dev secops
PPTX
Introduction to DevSecOps
PDF
Agile Relevance in the age of Continuous Everything ....
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
Tenants for Going at DevSecOps Speed - LASCON 2023
State of DevSecOps - DevOpsDays Jakarta 2019
The State of DevSecOps
State of DevSecOps - GTACS 2019
DevSecOps without DevOps is Just Security
State of DevSecOps - DevSecOpsDays 2019
Pentest is yesterday, DevSecOps is tomorrow
SCS DevSecOps Seminar - State of DevSecOps
Security's DevOps Transformation
The What, Why, and How of DevSecOps
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Application Security Testing for a DevOps Mindset
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
HouSecCon 2019: Offensive Security - Starting from Scratch
DevSecOps Powerpoint Presentation for Students
10 things to get right for successful dev secops
Introduction to DevSecOps
Agile Relevance in the age of Continuous Everything ....
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Tenants for Going at DevSecOps Speed - LASCON 2023
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps

  • 1. DevSecOpsIndonesia Pain & Pleasure of doing AppSec in DevOps Suman Sourav
  • 2. ABOUT ME • 14+ Years of experience in Application Security • Certified Secure Software Lifecycle Professional (CSSLP) • Co-Leader of DevSecOps Singapore & Indonesia • Community Ambassador – DevOps Institute • Full time student – learning from people around me DevSecOpsIndonesia
  • 3. DevSecOpsIndonesia Application Security-Non Functional Requirements ? Security Team Application Security DevOps Team DevOps Tools
  • 4. DevSecOpsIndonesia I am not kidding-No Offense ! Confluence JIRA BitBucket Bamboo Artifactory Jenkins (master) Jenkins (slave) SonarQube Selenium Grids Web Archive Containerized (Docker image) Dev (Docker) App Server Early scans during CI to ensure code quality and coverage Parallel execution of test cases Current Recommended Orchestrated SIT, UAT, Prod TDD/BDD
  • 5. DevSecOpsIndonesia This is same across all industries Development Operations QA Customer Centric Immediate Results Automation Scale Agile 90%of surveyed organizations are implementing or piloting DevOps and 99%Agree DevOps is an opportunity to improve application security but only 20%Are doing application security testing during development SecOps SecOps Needs to Shift Left
  • 6. DevSecOpsIndonesia Moving From To Waterfall Agile & DevOps Physical or Virtual Server Cloud & Containers Scalable InstrumentedMonolithic or N-Tier APIs & Micro services Architecture Deployment Development Process Ideally Continuous Changing Landscape
  • 7. DevSecOpsIndonesia Reference: Cloud Security Alliance : Security Guidance for Early Adopters of the Internet of Things – April 2015 API is evolving fast
  • 8. DevSecOpsIndonesia Defensive security in era of DevOps Organization fails to map the security threats to the risk management process • faster release cycles • automated security testing • tons of security results • silo culture Threat Modeling Attack Surface areas Risk Analysis
  • 9. DevSecOpsIndonesia DevOps Approach • People  Collaboration  Training • Process  Continuous Improvement  Continuous Testing • Technology  Self Service  Automation
  • 10. DevSecOps Approach 3S Principles TECHNOLOGY Security Capabilities DEVSECOPS • Incorporate security capabilities in DevOps collaborative technologies. • Deploy security solutions to support; security scanning, code quality, reporting and data dissemination capabilities. • Institutionalize security through standardization and documented business processes. • Implement and prioritize project methods and roadmaps in alignment with development & security goals. • Tie rules of engagement to corporate security mission, vision and strategy. • Provide clear goals, metrics and KPI’s aligned with security strategy • Establish training and incentive programs to modify or encourage security-driven decisions. • Align user needs and security skills with compliance needs. DevSecOpsIndonesia
  • 11. DevSecOpsIndonesia Secure Engineering Development Practice DEVELOPMENT BUILD AND DEPLOY STAGINGREQUIREMENTS External Repositories Common Components DESIGN Repository DAST/SecurityQAThreat Modeling SAST VS/PT/IAST/ Fuzzing Components Monitoring Monitoring SCM Tools PRODUCTION SAST : Static Application Security Testing DAST : Dynamic Application Security Testing IAST : Interactive Application Security Testing VS : Vulnerability scanning PT : Penetration Testing
  • 12. DevSecOpsIndonesia Does this make sense ? Confluence JIRA BitBucket Bamboo Artifactory Jenkins (master) Jenkins (slave) Web Archive Containerized (Docker image) Dev (Docker) App Server SonarQube Selenium Grids Parallel execution of test cases Orchestrated SIT, UAT, Prod TDD/BDD Current Recommended Security SAST Security Requirements Early scans during CI to ensure code quality and coverage Early SAST and SCA scans to discovers security issues Container Security Regulatory Security requirements Container Security Scanning and Monitoring
  • 13. DevSecOpsIndonesia Evaluate | security controls, integration and adoption Expose | threats, risks and scores Encapsulate | what , when where and why Efficient | decision making and investment Data analytics in security Contextual decision making Seamless design to execution Predictive Analysis Real time collaboration
  • 15. DevSecOpsIndonesia Master Branch1 Compile Test Publish Deploy Build GitHub Build Tools Deploy Env Open Source Libraries DevSecOps Orchestration Platform • Sec Requirements • Design Review • Threat Modelling • Security Unit Tests • SAST • SCA • DAST • IAST • VA • Security as Code • RASP • NG WAF Security As a service Vulnerability Normalization & Analytics Feedback Loop
  • 16. DevSecOpsIndonesia OWASP DevSecOps Maturity Model Reference : https://docs.google.com/presentation/d/1rrbyXqxy3LXAJNPFrVH99mj_BNaJKymMsXZItYArWEM/edit#slide=id.g1560ae0085_5_74
  • 17. Continuous Security Testing Reference: https://docs.google.com/presentation/d/1dAewXIHgBEKHKwBPpM5N_G2eM6PRpduoGJrp6R6pNUI/edit#slide=id.p
  • 18. DevSecOpsIndonesia All the app will be analyzed for RA levels based on their Risk Assessment Score Risk Assessment DevOps SMM3 SMM2 SMM1 RA2RA1 METRICS Baseline RequirementsBaseline RequirementsBaseline Requirements Additional Requirements Additional Requirements Architecture Risk Analysis Application ThreatModeling SCORESCORE Automated scanning SCORE Risk Assessment SECURITY MATURITY SCORE MATURITY RA3 Architecture Risk Analysis • All the app will go through the baseline assessment as per current assessment process • Automated assessment will be done based on Maturity Requirements • Architecture Risk Analysis will be required for RA 2 & RA 1 Apps • Applicartion Threatmodeling will be done only for RA 1 Apps • Security Maturity Score will be calculated after each assessment Setting up priorities
  • 19. DevSecOpsIndonesia We can eliminate and minimize the threats if we change our engineering development practice ○ Incorporate security as culture ○ Investment in the right directions ○ Innovate the processes that suits our organization Are we ready for change ?
  • 20. DevSecOpsIndonesia Connecting Teams Connecting Insight Connecting Outcomes Connecting Delivery Welcome to the Era of Connection. Are you ready? Bid data analytics can change the state of security in an organization and can offer valuable insights into business risks far beyond IT technologies are available to take a look in much more detail around machine-generated data and user-generated data to understand what is happening inside of an organization
  • 21. DevSecOpsIndonesia “The challenge for security in DevOps is not the technology but the people”