SlideShare a Scribd company logo
DevSecOps - Securing a great
Developer Experience
Stefan Streichsbier
NUMISEC International Indonesia
stefan@numisec.com
Version 1.3
05.12.2018
About me
Stefan Streichsbier
@s_streichsbier
GuardRails.io
Move fast, be safe.
Book and Kindle version now on Amazon!
What are we going to cover?
And also, how security and developer experience are related.
How security is
keeping up with it
How the tech
landscape changed
What mindset security
has to adopt
Some Statistics
As of June 2017,
51% of the world's population
has internet access.
That’s close to
4,000,000,000 people
As of October 2018,
there are 31,000,000
developers on Github alone.
Mark Andreessen
Renowned VC
Software is eating the world,
in all sectors.
In the future
every company will become
a software company
β€œThe Wall Street Journal” in 2011
With change comes complexity
It used to be so simple
Figure 1: Use an FTP Client
to Copy the Necessary Files
from Your Desktop to the
Web Server at the
Web Host Provider.
Source: https://docs.microsoft.com/en-us/aspnet/web-forms/overview/older-versions-getting-started/deploying-web-site-projects/deploying-your-site-using-an-ftp-client-cs
Pro Tip:
β€’ Add Google Analytics
(post November 2005)
Web masters
don’t need to
collaborate
Build?
I’m using PHP,
ASP, PERL, etc
Test locally,
As long as there
is no parsing
error, we’re all
good.
Drag and drop
files to Filezilla.
GoDaddy
It’s better now, but is it simpler?
https://gist.github.com/rasheedamir/7da0145ae1b5d9889e4085ded21d1acb
https://devopedia.org/devops
Web masters
don’t need to
collaborate
Build?
I’m using PHP,
ASP, PERL, etc
Test locally,
As long as there
is no parsing
error, we’re all
good.
Drag and drop
files to Filezilla.
GoDaddy
Complexity Is Increasing
Securing a great Developer Experience - v1.3
How does security fit into this?
AWS Security Primer
https://news.ycombinator.com/item?id=14628108
https://cloudonaut.io/aws-security-primer/
I have worked extensively with AWS over the last 4 years,
and I can barely wrap my head around the scope of
managing security in AWS.
We have an entire department dedicated to security in
our company, and none of them are remotely close to
being experts in AWS security either.
I’m starting to get curious if there even is an expert who
could set up and maintain a bulletproof AWS account.
https://devopedia.org/devops
The Evolution of Security
Secure SDLCPenetration Testing DevSecOps
https://devopedia.org/devops
Application
Vulnerability
Correlation &
Security
Workflows
Security tools
integrating with
Chat Bots
Security sections
on all major
social media
platforms
Security tools
integrating with
SCMs
Security tools
integrating with
pipelines
Custom security
linters, and
compiler flags
All the security
tools, we need a
bigger box!
Security/Complia
nce/Infrastructur
e as Code,
Secret
Management
Secure
Repositories,
golden images,
artefact security
scanning
Cloud Platform
security tools
RASP, NG WAF,
Micro-
segmentation
Automated Security Defense
Do you know if you are
under attack at this
current moment?
Can you automatically
defend against attacks?
Do you know what the
attackers are going after?
Automated Security Testing
SAST SCA DAST/IASTCCA
CommercialOpenSource
60+
Where do these tools live?
Source: https://twitter.com/djschleen
The vicious cycle
Tools compound
the issue.
There is too much
security debt
Developers β€œcomply”
β€œThe first rule of any technology used in a business is that
automation
applied to an efficient operation will magnify the efficiency.
Bill Gates
The second is that automation applied to an inefficient
operation
will magnify the inefficiency. ”
Security
Developers
Securing a great Developer Experience - v1.3
What has to change then?
Psst, this has happened before …
Quality used to face the same challenges
that security is facing now.
https://blog.sonarsource.com/kill-the-noise-to-change-gear-in-our-code-analyzers
Developer Experience, Finally!
User ExperienceUsability Developer Experience
Excellent, let’s do this for security!
Signals vs Noise
Focus on high-impact
issues
Don’t add to the noise Ensure the issues have
high accuracy
Security Trivia #213: What is the largest security tool report that has been recorded?
13,000 pages
Lost in Translation
Speak the same language
as developers
Issues are useless
until they are fixed
Leverage the right
communication channel
Security Trivia #937: What is the official CWE title for a SQL Injection?
Improper Neutralization of Special Elements used in an SQL Command
Make it easy
Tightly integratedAllow developers to
get started in minutes
Provide all the needed
functionality
Security Trivia #23: How many of the 12 leading AST companies - according to
the Gartner Magic Quadrant – have clear pricing information on their website?
1
Automated Security Testing - What is better?
Option A Option B
Ok, cool – Show me!
How can we get ahead for once?
Respect complexity,
but provide focus
Acknowledge that
developers are key
Security has to become
a commodity
Questions?

More Related Content

PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
PDF
Security Starts at the Endpoint
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PDF
Using security to drive chaos engineering - April 2018
PPTX
Cybersecurity: How to Use What We Already Know
Β 
PPTX
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
PDF
Why does security matter for devops by Caroline Wong
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Security Starts at the Endpoint
Elastic Security: Enterprise Protection Built on the Elastic Stack
Using security to drive chaos engineering - April 2018
Cybersecurity: How to Use What We Already Know
Β 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Why does security matter for devops by Caroline Wong
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...

What's hot (20)

PDF
October 2020 meetup
PPTX
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
PDF
Getting to Know Security and Devs: Keys to Successful DevSecOps
PPTX
Open Source Insight: Balancing Agility and Open Source Security for DevOps
PPTX
Software Security Assurance for DevOps
PPTX
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
PPTX
Philly ETE 2016: Securing Software by Construction
Β 
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PPTX
Threat Modeling with Threat Dragon
PPTX
Tenzin thiley bhutia
PDF
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
PDF
2015 August - Intel Security McAfee Labs Quarterly Threat Report
PDF
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
PDF
Kaspersky Lab’s Webinar β€˜Emerging Threats in the APT World: Predictions for 2...
PPTX
Shifting security all day dev ops
PPTX
Open Source: The Legal & Security Implications for the Connected Car
PDF
7 cloud security tips
PDF
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
PPTX
The Ugly Cost of Cyber Crime
PDF
The Intersection of Security & DevOps
October 2020 meetup
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Getting to Know Security and Devs: Keys to Successful DevSecOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Software Security Assurance for DevOps
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Philly ETE 2016: Securing Software by Construction
Β 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Threat Modeling with Threat Dragon
Tenzin thiley bhutia
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
2015 August - Intel Security McAfee Labs Quarterly Threat Report
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Kaspersky Lab’s Webinar β€˜Emerging Threats in the APT World: Predictions for 2...
Shifting security all day dev ops
Open Source: The Legal & Security Implications for the Connected Car
7 cloud security tips
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
The Ugly Cost of Cyber Crime
The Intersection of Security & DevOps
Ad

Similar to Securing a great Developer Experience - v1.3 (20)

PPTX
Securing a great DX - DevSecOps Days Singapore 2018
PDF
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
PPTX
Security and Mobility Co Create Week Jakarta
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PDF
DevSecOps in 2031: How robots and humans will secure apps together Log
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
PPTX
Security in the age of open source - Myths and misperceptions
PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
PPTX
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
DOCX
Hot Cyber Security Technologies
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
World of Watson 2016 - Information Insecurity
PDF
Security Analytics with OpenSearch
PDF
Asset Discovery in India – Redhunt Labs
PDF
5 benefits that ai gives to cloud security venkat k - medium
PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
PDF
10 Best DevSecOps Tools for 2023
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PPTX
Product security by Blockchain, AI and Security Certs
Securing a great DX - DevSecOps Days Singapore 2018
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Security and Mobility Co Create Week Jakarta
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
DevSecOps in 2031: How robots and humans will secure apps together Log
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Security in the age of open source - Myths and misperceptions
2021-10-14 The Critical Role of Security in DevOps.pdf
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Hot Cyber Security Technologies
SCS DevSecOps Seminar - State of DevSecOps
World of Watson 2016 - Information Insecurity
Security Analytics with OpenSearch
Asset Discovery in India – Redhunt Labs
5 benefits that ai gives to cloud security venkat k - medium
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
10 Best DevSecOps Tools for 2023
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Product security by Blockchain, AI and Security Certs
Ad

More from Stefan Streichsbier (11)

PDF
The Future of DevSecOps
PPTX
State of DevSecOps - DevSecOpsDays 2019
PPTX
State of DevSecOps - GTACS 2019
PPTX
Practical Secure Coding Workshop - {DECIPHER} Hackathon
PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
PDF
A Tale of Three Horses - RSAC 2017 APJ - DevOps Connect: DevSecOps Edition, S...
PPTX
Null application security in an agile world
PDF
DevSecOps - The big picture
PDF
Application Security in an Agile World - Agile Singapore 2016
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PPT
DevSecOps Singapore introduction
The Future of DevSecOps
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - GTACS 2019
Practical Secure Coding Workshop - {DECIPHER} Hackathon
State of DevSecOps - DevOpsDays Jakarta 2019
A Tale of Three Horses - RSAC 2017 APJ - DevOps Connect: DevSecOps Edition, S...
Null application security in an agile world
DevSecOps - The big picture
Application Security in an Agile World - Agile Singapore 2016
Application Security at DevOps Speed - DevOpsDays Singapore 2016
DevSecOps Singapore introduction

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
artificial intelligence overview of it and more
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPT
tcp ip networks nd ip layering assotred slides
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
innovation process that make everything different.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Internet___Basics___Styled_ presentation
WebRTC in SignalWire - troubleshooting media negotiation
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
international classification of diseases ICD-10 review PPT.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
presentation_pfe-universite-molay-seltan.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
artificial intelligence overview of it and more
Cloud-Scale Log Monitoring _ Datadog.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
QR Codes Qr codecodecodecodecocodedecodecode
tcp ip networks nd ip layering assotred slides
Tenda Login Guide: Access Your Router in 5 Easy Steps
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 

Securing a great Developer Experience - v1.3

Editor's Notes

  • #3: If you are passionate in ditching traditional security and helping companies in Asia getting into the age of DevSecOps then drop me a line. We are always looking for great people. At GuardRails we are working on a very different approach to security, which puts developers first and I’m excited to announce that we have launched last week.
  • #5: We gonna briefly discuss how the technology landscape has changed and what the implications are of that. How security is keeping up with the change, or rather how it isn’t. And what mindset shift security as an industry has to adopt to have a sustainable impact. We have a chance to be a part of development for the first time in a meaningful way. Let’s not blow it by adding the same old security toolchain to DevOps.
  • #6: Origin of Software and Development, how it is tied to the proliferation of computer systems.
  • #9: we are talking early 2000s here.
  • #11: This still looks fairly simple, you have git your scm, Jenkins your bukld system, docker as containers, and kubernetes as the orchestration layer. That’s not too bad, is it?
  • #12: This is just tools you have to use to get an application from an idea in someones head to code running in production. There are no security tools in that picture.
  • #13: Have you looged into AWS/Google cloud platform lately? This is the high level menu overview of the offered services respectively. These pics were taken on Sunday, I bet you if you log in today, there are more services already 
  • #14: Feels a little bit like this, doesn’t it.
  • #16: When googling security complexity to illustrate this problem, I stumbled over this little gem. We understand that it’s already too much to understand modern development workflows and tooling. Understanding the security implications is almost impossible. So what you see on this slide, is a AWS expert sitting down to understand the security areas they have to consider for their AWS account. This gentlemen is by no means a security expert, not even a self proclaimed one. The response he got on hackernews is a real eye opener.
  • #17: This is just tools you have to use to get an application from an idea in someones head to code running in production. There are no security tools in that picture.
  • #18: It used to be infrastructure, open ports, patch management, Then it was about building security in. And now it’s all about shifting left. We are getting closer to the developers and have more automation and give faster feedback. But I tell you one thing, developers probably liked it better when we only bothered them once at the end of every release, not now when it’s every time they are committing code. But has the quality improved? Or did we just get better at automating the nagging of developers.
  • #19: What ever happened to the KISS principle. How many people do you think understand that full end to end flow nowadays? Not specially from a security point of view, but from a general technology and process point of view? And yes besides DevSecOps and the wonderful things that we are trying to achieve and we are trying hard, what is really happening.
  • #20: Think Application Performance monitoring for security Understanding how your app is abused and misused helps with prioritization.
  • #23: Security Debt is huge Because security wasn’t a part of it and the tooling didn’t make it appealing for the reasons stated earlier. Tools compound the issue, because they just make devs fix the issues they get, without actually taking ownership. They point to the debt and show huge amounts of issues, over and over again. They don’t actually fix any issues, at all. Most of them have been developed For the wrong audience And boy does it show.They are not proactively doing these things, whatever gets put on their desks, they take care of it. Security tools should be made for developers. Yet, most of them are designed for security analysts. And it shows in many areas, such as setup, user experience, and workflow integration.
  • #25: This may sound mean, but I think realizing this is an important step in the evolution of our industry. But yeah to continue, with the advance of new technologies and automation the answer was as always more security tools. The most humbling experience was switching from an advisor/consultant to an implementer and being responsible for the Security of a high profile product (large team).
  • #26: That’s great, right? But is it really working well? And I don’t even mean as an organization, I mean as in reaching 28 Million developers on github. And even this is quite exclusive to certain organizations around the world. None of this is really available to the majority of the 28M devs on Github. And guess what, you are using the code of that majority in your production env.
  • #28: It’s the same audience. It’ hasn’t solved it fully yet, but quality is becoming more and more a first class citizen and the only reason it managed to do that Is because of developer experience.
  • #29: Another good example of a quality tool that has done a tremendous job is codecov. It made unit test coverage sexy, and that’s no easy feat :)
  • #30: Let’s explore the term developer experience. Usability can be modeled as the question β€œCan the user accomplish their goal?” whilst user experience can be phrased as β€œDid the user have as delightful an experience as possible?” Usability is concerned with the β€œeffectiveness, efficiency and satisfaction with which specified users achieve specified goals in particular environments Bring up the apple example, Apple is priding themselves with the high level of usability they have created for their devices. Using the iphone is supposed to be so simple and nice, and effective (your mileage may vary, but let’s just take this as an example, and not start an android vs ios war). User Experience on the other hand starts already in the apple store, when you look a the device that you fancy, when you open the box for the first time (there are thousands of hours of people unboxing their gadgets on youtube) and how much joy it brings you in your daily life. DX describes the experience developers have when they use your product, be it client libraries, SDKs, frameworks, open source code, tools, API, technology or service.
  • #31: Ok, I’m excited, I love this stuff. So let’s dive right into it, what are the three things that will help us secure a great Developer Experience.
  • #32: Nowadays, there are too many distractions that are fighting for our attention. That’s by design, product designers know how to addict us in the race to dominate the attention economy. Security tools only add to these distractions. They find everything that could be a possible issue. Most of the tools running against your codebase produce thousands of results. Security is already intimidating enough. Let’s not make it worse by flooding developers with lots of security issues. Security tools have to report issues that have a high impact if left unfixed. Less is more. Don’t give them 1000s of user input is printed in command. Maybe focus on only dependencies With a csvss score of 7 or higher. Ignore dev dependencies. Don’t value the devs time, lots of issues, vague descriptions and solutions (sad devs) Value the devs time -> relevant results -> actionable feedback (happy devs)
  • #33: Security experts have developed a very specific and unique language over the years. (XSS, CSRF, SAST) But if you haven’t spent a good part of your career in application security, these terms are confusing. Don’t try to sounds important Especially traditional security tools produce hundreds of pages of PDF reports. Have you ever been on the receiving end of one of those reports? Or even worse, the one responsible for fixing those issues? Imagine looking at hundreds of security issues with lots of cryptic details. Details about how attackers can abuse your app full of references that don’t make sense. But the key sections on how to fix the issues are thin. There is rarely any actionable, framework-specific contentβ€Šβ€”β€Šif there is anything at all. Let us use plain, easy language and give useful instructions on how to fix issues.
  • #34: Get started in minutes. Doesn’t matter if they are curious and want to try it out. Or if they want to deploy it for dozens of their apps. That means no scheduling of demos with sales reps. That means clear pricing on the website. If spacex can do it, so can you. (This includes clear pricing ) Typical Security Tools are clearly targeting enterprise sales, typically as part of the CISO organisation. If developers can’t easily take security software for a spin, then that’s a red flag already. No developer is going to click on that book a demo button. Workflow integration (understand your audience) Out of workflow (IDE plugins are not enforceable and manageable, plus too many IDEs out there) I don’t just mean make it part of the CI/CD pipelines, I’m not talking about IDE plugins. I’m talking about right there where the review happens in the PR comments. If you are doing it right, then no developer is ever going to look at your dashboards. All in one, Don’t make them look For tool a for this, tool b for that If it’s already hard to wrap your head around SASt, dAST iast, rasp, ngwaf, secret management and all of these things. Then nobody is going to have time for that.
  • #37: Ok, so we recognize that developers are key Therefore as the main audience for application/devops security tools should be developers, ensuring a great Developer Experience is and absolute must. These security tools must be designed for DX from day 1. Developer experience requires security to be a first class citizen that ideally is not differentiable from the other work tasks. There will always be complexity, our job is to provide focus. Also, most of the development is not happening in enterprises, security has to become a commodity, otherwise it’s going to be a battle that we can’t ever win. The goal should be that a bootstrapped startup, can and wants to use security tools from the beginning. If we can get closer to solving this, then we will be able to get developers to drive security themselves and ensure that the digital economy becomes a safer place for everyone.