SlideShare a Scribd company logo
InterCon Vegas 2019
InterCon Vegas 2019
KEYNOTE SESSION IV:
SOFTWARE SECURITY FOR DEVOPS AND
CONTINUOUS DEPLOYMENT IN THE CLOUD
SPEAKER: THOMAS R. TRUITT
FOUNDER/PRESIDENT/CEO
19 JUNE 2019
2
InterCon Vegas 2019
InterCon Vegas 2019
Background of Speaker
• Involved in Systems / Software Development for Large Scale
Systems Since 1990
• Educated as Electrical Engineer at Virginia Tech in Blacksburg,
Virginia. Studied Digital Signal Processing at Johns Hopkins
University in Laurel, Maryland.
• Works with large government and Fortune 500 organizations
on building Enterprise Level software development “best-
practices” to promote the use of Open Source software
• Most recent focus is migrating from on-premise to cloud
solutions using public/private clouds such as AWS, Azure,
Google, and RedHat/OpenShift Container Platform
3
InterCon Vegas 2019
InterCon Vegas 2019
History of Security in Software Development
• Coding 101 Security and the emergence of open
source security standards
• For more information review (OWASP) at
https://www.owasp.org/
4
InterCon Vegas 2019
InterCon Vegas 2019
The Need for Software Security
• Insider and External Threats
• Authentication [Basic, Federation, Multi-Factor,
Bio-Security]
• Authorization [Attribute Based Access Control
(ABAC), Role Based Access Control (RBAC)]
5
InterCon Vegas 2019
InterCon Vegas 2019
Security Breach Examples
• Breach From Internet:
– Office of Personnel Management (OPM) Security Breach
Affecting Millions
• Insider Security Breach:
– Federal Bureau of Investigation (FBI) - Robert Hanssen
– America Online Insider Threat
• Visit List of Breaches at:
https://en.wikipedia.org/wiki/List_of_data_breaches
6
InterCon Vegas 2019
InterCon Vegas 2019
Security – In the Beginning
• On-Premise Security
– Agile
– Open Source
– Patching
– Log Monitoring/Analysis, SIEM Tools
– Application Performance Management (APM)
– Network Device Monitoring
– Release/Build Process
– Continuous Integration
7
InterCon Vegas 2019
InterCon Vegas 2019
Security – Today and Beyond
• Continuous Deployment/Continuous Integration
– DevOps, DevSecOps
• Modern Software Tools
– Maven,
– GIT,
– Atlassian Suite,
– Jenkins,
– Code Quality,
– Puppet,
– Chef
• Security Standards (FedRAMP, FISMA, FIPS, PKI)
8
InterCon Vegas 2019
InterCon Vegas 2019
Challenges In the Cloud
• Cross Domain Security
• Single-Sign-On
• Continuous Software Updates
9
InterCon Vegas 2019
InterCon Vegas 2019
Looking Forward: Cloud Computing Security
• Cloud Computing to be more Security Provider
Agnostic regardless of Cloud Server Provider
• Example of Moving Security to the Cloud Edge with
Akamai
10
InterCon Vegas 2019
InterCon Vegas 2019
Question and Answers
• Speaker Contact Information
– Thomas R. Truitt
– 301-305-3116 cell
– tom@ostcorp.net
– http://www.ostcorp.net

More Related Content

PPT
Cyberterrorism final
PPTX
Beyond The Dark Hacking Screen
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PPTX
Cyber terrorism by_Ali_Fahad
PPTX
Keeping up with the Revolution in IT Security
PDF
Ransomware ly
PPTX
Cyberthreats: causes, consequences, prevention
PPTX
Mobile Security Research Projects Help
Cyberterrorism final
Beyond The Dark Hacking Screen
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber terrorism by_Ali_Fahad
Keeping up with the Revolution in IT Security
Ransomware ly
Cyberthreats: causes, consequences, prevention
Mobile Security Research Projects Help

What's hot (20)

PDF
Covid 19, How A Pandemic Situation Shapes Cyber Threats
PPTX
Cyber Security
PDF
CybersecurityTFReport2016 PRINT
PPTX
2015: The year-ahead-in-cyber-security
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
PPTX
Information Security Engineering
PPT
28658043 cyber-terrorism
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PPTX
Cyber terrorism
PPTX
Mobile security
PDF
Cyber Security and the National Central Banks
PDF
Cybersecurity concepts & Defense best practises
PPTX
Cybersecurity Risks In the Mobile Environment
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PPTX
Securing the Cloud
PDF
Cyber security-briefing-presentation
PPTX
Cyber terrorism
PDF
ICANN Security, Stability and Resiliency Plans & Framework
PPTX
The Future of Cybersecurity - October 2015
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Cyber Security
CybersecurityTFReport2016 PRINT
2015: The year-ahead-in-cyber-security
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Information Security Engineering
28658043 cyber-terrorism
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Cyber terrorism
Mobile security
Cyber Security and the National Central Banks
Cybersecurity concepts & Defense best practises
Cybersecurity Risks In the Mobile Environment
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Securing the Cloud
Cyber security-briefing-presentation
Cyber terrorism
ICANN Security, Stability and Resiliency Plans & Framework
The Future of Cybersecurity - October 2015
Ad

Similar to Software Security For DevOps And Continuous Deployment In The Cloud (20)

PDF
Shift Left Security
PDF
Coding Secure Infrastructure in the Cloud using the PIE framework
PPTX
Security on AWS, 2021 Edition Meetup
PPTX
Security on AWS, 2021 Edition Meetup
PDF
Pulse 2013 Session Roadmap for Financial Services
PDF
Pulse 2013 Financial Services Sector Industry Roaadmap
PPTX
Top Application Security Trends of 2012
PDF
Why AppSec Matters
PPT
Mr. desmond cloud security_format
PPTX
Cloud Security vs Security in the Cloud
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
The Future of Software Security Assurance
PDF
Trend Micro - Virtualization and Security Compliance
PPTX
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PDF
Practical Security for Agile and DevOps 1st Edition Mark S Merkow
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PPTX
Security on AWS
PDF
Who Owns Software Security?
PDF
Who owns Software Security
Shift Left Security
Coding Secure Infrastructure in the Cloud using the PIE framework
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
Pulse 2013 Session Roadmap for Financial Services
Pulse 2013 Financial Services Sector Industry Roaadmap
Top Application Security Trends of 2012
Why AppSec Matters
Mr. desmond cloud security_format
Cloud Security vs Security in the Cloud
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Future of Software Security Assurance
Trend Micro - Virtualization and Security Compliance
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
talk6securingcloudamarprusty-191030091632.pptx
Practical Security for Agile and DevOps 1st Edition Mark S Merkow
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Security on AWS
Who Owns Software Security?
Who owns Software Security
Ad

More from InterCon (18)

PDF
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
PDF
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
PPTX
Transitioning Your Business Model - From Services To Subscriptions: Presented...
PPTX
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
PPTX
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
PDF
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
PDF
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
PDF
5G Technology - The Future of Internet
PDF
Transitioning Your Business Model - From Services To SaaS
PPTX
ML Will Redesign, Not Replace, Jobs
PPTX
Blockchain Applications Transforming Society
PPTX
How Are AI And ML Transforming Decision Making?
PPTX
Boosting App Installs
PPTX
Blockchain, Smart Contracts & IoT
PPTX
Deep Reinforcement Leaning In Machine Learning
PPTX
Phishing Attacks and Trends in Cloud Computing
PPTX
IoT - Understanding The Shift To Edge Computing
PPTX
IoT Data - Like No Data We have Ever Seen
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
Transitioning Your Business Model - From Services To Subscriptions: Presented...
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
5G Technology - The Future of Internet
Transitioning Your Business Model - From Services To SaaS
ML Will Redesign, Not Replace, Jobs
Blockchain Applications Transforming Society
How Are AI And ML Transforming Decision Making?
Boosting App Installs
Blockchain, Smart Contracts & IoT
Deep Reinforcement Leaning In Machine Learning
Phishing Attacks and Trends in Cloud Computing
IoT - Understanding The Shift To Edge Computing
IoT Data - Like No Data We have Ever Seen

Recently uploaded (20)

PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
artificial intelligence overview of it and more
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Introduction to Information and Communication Technology
PPTX
Internet___Basics___Styled_ presentation
PDF
The Internet -By the Numbers, Sri Lanka Edition
DOCX
Unit-3 cyber security network security of internet system
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Introuction about WHO-FIC in ICD-10.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Design_with_Watersergyerge45hrbgre4top (1).ppt
PptxGenJS_Demo_Chart_20250317130215833.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
SAP Ariba Sourcing PPT for learning material
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
artificial intelligence overview of it and more
Slides PPTX World Game (s) Eco Economic Epochs.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
tcp ip networks nd ip layering assotred slides
WebRTC in SignalWire - troubleshooting media negotiation
Introduction to Information and Communication Technology
Internet___Basics___Styled_ presentation
The Internet -By the Numbers, Sri Lanka Edition
Unit-3 cyber security network security of internet system
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION

Software Security For DevOps And Continuous Deployment In The Cloud

  • 1. InterCon Vegas 2019 InterCon Vegas 2019 KEYNOTE SESSION IV: SOFTWARE SECURITY FOR DEVOPS AND CONTINUOUS DEPLOYMENT IN THE CLOUD SPEAKER: THOMAS R. TRUITT FOUNDER/PRESIDENT/CEO 19 JUNE 2019
  • 2. 2 InterCon Vegas 2019 InterCon Vegas 2019 Background of Speaker • Involved in Systems / Software Development for Large Scale Systems Since 1990 • Educated as Electrical Engineer at Virginia Tech in Blacksburg, Virginia. Studied Digital Signal Processing at Johns Hopkins University in Laurel, Maryland. • Works with large government and Fortune 500 organizations on building Enterprise Level software development “best- practices” to promote the use of Open Source software • Most recent focus is migrating from on-premise to cloud solutions using public/private clouds such as AWS, Azure, Google, and RedHat/OpenShift Container Platform
  • 3. 3 InterCon Vegas 2019 InterCon Vegas 2019 History of Security in Software Development • Coding 101 Security and the emergence of open source security standards • For more information review (OWASP) at https://www.owasp.org/
  • 4. 4 InterCon Vegas 2019 InterCon Vegas 2019 The Need for Software Security • Insider and External Threats • Authentication [Basic, Federation, Multi-Factor, Bio-Security] • Authorization [Attribute Based Access Control (ABAC), Role Based Access Control (RBAC)]
  • 5. 5 InterCon Vegas 2019 InterCon Vegas 2019 Security Breach Examples • Breach From Internet: – Office of Personnel Management (OPM) Security Breach Affecting Millions • Insider Security Breach: – Federal Bureau of Investigation (FBI) - Robert Hanssen – America Online Insider Threat • Visit List of Breaches at: https://en.wikipedia.org/wiki/List_of_data_breaches
  • 6. 6 InterCon Vegas 2019 InterCon Vegas 2019 Security – In the Beginning • On-Premise Security – Agile – Open Source – Patching – Log Monitoring/Analysis, SIEM Tools – Application Performance Management (APM) – Network Device Monitoring – Release/Build Process – Continuous Integration
  • 7. 7 InterCon Vegas 2019 InterCon Vegas 2019 Security – Today and Beyond • Continuous Deployment/Continuous Integration – DevOps, DevSecOps • Modern Software Tools – Maven, – GIT, – Atlassian Suite, – Jenkins, – Code Quality, – Puppet, – Chef • Security Standards (FedRAMP, FISMA, FIPS, PKI)
  • 8. 8 InterCon Vegas 2019 InterCon Vegas 2019 Challenges In the Cloud • Cross Domain Security • Single-Sign-On • Continuous Software Updates
  • 9. 9 InterCon Vegas 2019 InterCon Vegas 2019 Looking Forward: Cloud Computing Security • Cloud Computing to be more Security Provider Agnostic regardless of Cloud Server Provider • Example of Moving Security to the Cloud Edge with Akamai
  • 10. 10 InterCon Vegas 2019 InterCon Vegas 2019 Question and Answers • Speaker Contact Information – Thomas R. Truitt – 301-305-3116 cell – tom@ostcorp.net – http://www.ostcorp.net