SlideShare a Scribd company logo
THE CASE FOR
CONTINUOUS SECURITY
By Pete Cheslock 	

Senior Director of Ops and Support at Threat Stack	

@petecheslock
DevOps is a term that has absolutely 

blown up in the last 5 years.
However, many had an immediate adverse
reaction towards Yet Another Buzzword
…especially when the core concepts of
“DevOps” were things people 

had been doing for YEARS!
The Case For Continuous Security
To shorten the feedback loop 

in development cycles, 

allowing teams to iterate quickly on changes 

and ship features to customer sooner.
The Core Tenant of DevOps
Mainstream DevOps
=

Easily accessible cloud infrastructure

+

Maturity of operational tooling
For companies starting new 

product development initiatives, 

using Configuration Management 

is table stakes to iterate quickly!
IaaS providers today make it 

as easy as possible to provision systems 

to meet infrastructure needs — and quickly.
Physical Data Center

Public Compute Resources

for flexibility and accessibility
 provided by Amazon, Google, Microsoft
Companies leverage Infrastructure as Code 

for major speed to market benefits
The Competitive Advantage
Companies can now provision
hundreds (or thousands) of compute
instances in mere minutes.
!
This is an every day activity!
Continuous Integration

Continuous Deployment

But who (or what) is continually monitoring the state of your 

operational security?!
The Case For Continuous Security
Junior sysadmins can now make changes to:

!
• a Chef Recipe

• a Puppet Manifest

• an Ansible Playbook

!
!
…and deploy it to production — in minutes…
Today…
What is the scope of that change?
to be slowed down by the security team

!
or
!
configuration management changes to be
passed through a Change Control Board
Sysadmins DON’T Want:
to change a variable, open a pull request,
and once merged, their operational
tooling to do the rest!

!
They want their change 

to hit production servers ASAP.
Sysadmins Want:
This is where SecDevOps (or SecOps) comes in.
(ignore the fact that it’s a silly buzzword just like DevOps…)
If DevOps seeks to value empathy
between these two teams that traditionally
had different incentives for their positions…
Developers Operations
value constant change value stability
…then SecDevOps seeks to evoke the SAME outcome
with Security teams
(and the rest of the business)
If you’re continually deploying changes,

you must be continually monitoring
security implications for operational changes.
Often times there is no single person that is able
to say with absolute certainty which changes to
infrastructure have additional risks towards your
security posture.
And, if you have a
traditional network security organization
that manually reviews and approves changes to production…
!
!
You’ve introduced the newest bottleneck in your organization.
!
!
!
!
!
!
A SecDevOps methodology allows you to 

improve your security monitoring 

and response times, while maintaining 

your ability to continually 

deploy changes
SecDevOps is the answer to this discussion.
This is the most important (and exciting!) problem
to solve in many organizations!
But it is also one of the hardest problems to solve.
!
This is why at Threat Stack, we’re all excited
to be in a unique position to actively
help companies solve this.
Start Implementing
Continuous Security Today!
!
threatstack.com

More Related Content

PDF
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
PDF
4 Steps to Effectively Integrate DevOps Workflows With Cloud Security Practices
PPTX
Should You Use Security Point Solutions?
PDF
SHOWDOWN: Threat Stack vs. Red Hat AuditD
PPTX
It All Started With a Wager About System Upgrades
PDF
Using security to drive chaos engineering
PPTX
#ATAGTR2021 Presentation : "Chaos engineering: Break it to make it" by Anupa...
PDF
Chaos engineering intro
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
4 Steps to Effectively Integrate DevOps Workflows With Cloud Security Practices
Should You Use Security Point Solutions?
SHOWDOWN: Threat Stack vs. Red Hat AuditD
It All Started With a Wager About System Upgrades
Using security to drive chaos engineering
#ATAGTR2021 Presentation : "Chaos engineering: Break it to make it" by Anupa...
Chaos engineering intro

What's hot (20)

PPTX
Introduction to DevSecOps
PPTX
The R.O.A.D to DevOps
PPTX
The Journey to DevSecOps
PPTX
The Next Wave of Reliability Engineering
PPTX
Overcoming Security Challenges in DevOps
PDF
DevSecOps - The big picture
PDF
Chaos engineering for cloud native security
PPTX
Introduction to Chaos Engineering
PDF
Chaos Engineering and Systems Reliability
PDF
DevSecOps in Baby Steps
PPTX
DevSecCon KeyNote London 2015
PDF
Integrating DevOps and Security
PPTX
Introduction to Puppet Enterprise 2016.5
PDF
Chaos Engineering - The Art of Breaking Things in Production
PDF
Nick Drage & Fraser Scott - Epic battle devops vs security
PDF
SRE in Startup
PDF
Practical DevSecOps Course - Part 1
PDF
An Introduction to Chaos Engineering
PDF
Silver Lining for Miles: DevOps for Building Security Solutions
PPTX
Getting Started with Splunk Enterprise Hands-On Breakout Session
Introduction to DevSecOps
The R.O.A.D to DevOps
The Journey to DevSecOps
The Next Wave of Reliability Engineering
Overcoming Security Challenges in DevOps
DevSecOps - The big picture
Chaos engineering for cloud native security
Introduction to Chaos Engineering
Chaos Engineering and Systems Reliability
DevSecOps in Baby Steps
DevSecCon KeyNote London 2015
Integrating DevOps and Security
Introduction to Puppet Enterprise 2016.5
Chaos Engineering - The Art of Breaking Things in Production
Nick Drage & Fraser Scott - Epic battle devops vs security
SRE in Startup
Practical DevSecOps Course - Part 1
An Introduction to Chaos Engineering
Silver Lining for Miles: DevOps for Building Security Solutions
Getting Started with Splunk Enterprise Hands-On Breakout Session
Ad

Viewers also liked (12)

PDF
Cylance Protect-Next-Generation Antivirus-Overview
PDF
Robots are among us, but who takes responsibility?
PPTX
Exploring the Capabilities and Economics of Cybercrime
PDF
Cylance Information Security: Compromise Assessment Datasheet
PDF
You're Off the Hook: Blinding Security Software
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
PPTX
How to Close the SecOps Gap
PPTX
10 Hot Digital UK Start-ups To Watch In 2017
PDF
Corporations - the new victims of targeted ransomware
PDF
end-to-end service management with ServiceNow (English)
PPT
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
PDF
Hype vs. Reality: The AI Explainer
Cylance Protect-Next-Generation Antivirus-Overview
Robots are among us, but who takes responsibility?
Exploring the Capabilities and Economics of Cybercrime
Cylance Information Security: Compromise Assessment Datasheet
You're Off the Hook: Blinding Security Software
Embracing Threat Intelligence and Finding ROI in Your Decision
How to Close the SecOps Gap
10 Hot Digital UK Start-ups To Watch In 2017
Corporations - the new victims of targeted ransomware
end-to-end service management with ServiceNow (English)
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Hype vs. Reality: The AI Explainer
Ad

Similar to The Case For Continuous Security (20)

PDF
The What, Why, and How of DevSecOps
PPTX
Secure DevOPS Implementation Guidance
ODP
PDF
Dev secops opsec, devsec, devops ?
PDF
5 principles-securing-devops-veracode-whitepaper
PPTX
Is DevOps Braking Your Company?
PPTX
DevOps to DevSecOps Journey..
PPTX
DevOps and the Future of Information Security
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PPTX
DevSecCon Keynote
PDF
Devops, Secops, Opsec, DevSec *ops *.* ?
PPTX
ISACA Ireland Keynote 2015
PDF
Why DevSecOps Is Necessary For Your SDLC Pipeline?
PDF
DevOps: Lead, Follow or Get Out of the Way - A CISO Perspective
PDF
Strengthen and Scale Security for a dollar or less
PDF
DevSecOps and the CI/CD Pipeline
PDF
Devops (start walking in the same direction) by ops
PPTX
Shift Left for More Secure Apps with F5 NGINX
PDF
Continuous Security / DevSecOps- Why How and What
PDF
Bringing Infosec Into The Devops Tribe: Q&A With Gene Kim and Pete Cheslock
The What, Why, and How of DevSecOps
Secure DevOPS Implementation Guidance
Dev secops opsec, devsec, devops ?
5 principles-securing-devops-veracode-whitepaper
Is DevOps Braking Your Company?
DevOps to DevSecOps Journey..
DevOps and the Future of Information Security
The Rise of DevSecOps in CI_CD Workflows.pdf
DevSecCon Keynote
Devops, Secops, Opsec, DevSec *ops *.* ?
ISACA Ireland Keynote 2015
Why DevSecOps Is Necessary For Your SDLC Pipeline?
DevOps: Lead, Follow or Get Out of the Way - A CISO Perspective
Strengthen and Scale Security for a dollar or less
DevSecOps and the CI/CD Pipeline
Devops (start walking in the same direction) by ops
Shift Left for More Secure Apps with F5 NGINX
Continuous Security / DevSecOps- Why How and What
Bringing Infosec Into The Devops Tribe: Q&A With Gene Kim and Pete Cheslock

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks

The Case For Continuous Security

  • 1. THE CASE FOR CONTINUOUS SECURITY By Pete Cheslock Senior Director of Ops and Support at Threat Stack @petecheslock
  • 2. DevOps is a term that has absolutely blown up in the last 5 years.
  • 3. However, many had an immediate adverse reaction towards Yet Another Buzzword
  • 4. …especially when the core concepts of “DevOps” were things people had been doing for YEARS!
  • 6. To shorten the feedback loop in development cycles, allowing teams to iterate quickly on changes and ship features to customer sooner. The Core Tenant of DevOps
  • 7. Mainstream DevOps = Easily accessible cloud infrastructure + Maturity of operational tooling
  • 8. For companies starting new product development initiatives, using Configuration Management is table stakes to iterate quickly!
  • 9. IaaS providers today make it as easy as possible to provision systems to meet infrastructure needs — and quickly.
  • 10. Physical Data Center Public Compute Resources for flexibility and accessibility provided by Amazon, Google, Microsoft
  • 11. Companies leverage Infrastructure as Code for major speed to market benefits The Competitive Advantage
  • 12. Companies can now provision hundreds (or thousands) of compute instances in mere minutes. ! This is an every day activity!
  • 13. Continuous Integration Continuous Deployment But who (or what) is continually monitoring the state of your operational security?!
  • 15. Junior sysadmins can now make changes to: ! • a Chef Recipe • a Puppet Manifest • an Ansible Playbook ! ! …and deploy it to production — in minutes… Today…
  • 16. What is the scope of that change?
  • 17. to be slowed down by the security team ! or ! configuration management changes to be passed through a Change Control Board Sysadmins DON’T Want:
  • 18. to change a variable, open a pull request, and once merged, their operational tooling to do the rest! ! They want their change to hit production servers ASAP. Sysadmins Want:
  • 19. This is where SecDevOps (or SecOps) comes in. (ignore the fact that it’s a silly buzzword just like DevOps…)
  • 20. If DevOps seeks to value empathy between these two teams that traditionally had different incentives for their positions… Developers Operations value constant change value stability
  • 21. …then SecDevOps seeks to evoke the SAME outcome with Security teams (and the rest of the business)
  • 22. If you’re continually deploying changes, you must be continually monitoring security implications for operational changes.
  • 23. Often times there is no single person that is able to say with absolute certainty which changes to infrastructure have additional risks towards your security posture.
  • 24. And, if you have a traditional network security organization that manually reviews and approves changes to production… ! ! You’ve introduced the newest bottleneck in your organization. ! ! ! ! ! !
  • 25. A SecDevOps methodology allows you to improve your security monitoring and response times, while maintaining your ability to continually deploy changes SecDevOps is the answer to this discussion.
  • 26. This is the most important (and exciting!) problem to solve in many organizations!
  • 27. But it is also one of the hardest problems to solve. ! This is why at Threat Stack, we’re all excited to be in a unique position to actively help companies solve this.
  • 28. Start Implementing Continuous Security Today! ! threatstack.com