Shannon Lietz
The Journey to DevSecOps^
@devsecops
Always an Early Adopter
Google Trends
• DevOps.com was bought in
2004
• Google searches for “DevOps”
started to rise in 2010
• Major influences:
– Saving your Infrastructure from
DevOps / Chicago Tribune
– DevOps: A Culture Shift, Not a
Technology / Information Week
– DevOps: A Sharder’s Tale from
Etsy
– DevOps.com articles
• RuggedSoftware.org was
bought in 2010
https://www.google.com/trends/
Chasing Innovation…
Which means, spending most of your
career doing this…
Bang
Head
Here
This is the End of Security as We Know It…
Say what?!??!
6+ years later, it’s hard to believe
we’re still shocked by this quote!
This talk will provide you with a
path forward…
And a survival kit...
-Josh Corman
An Ugly Little Secret
• DevOps teams make security
decisions… several times,
everyday!
• Hackers find security issues and
exploit them... several times,
everday!
• Security teams hardly ever make
security decisions... and really only
when risks need to be officially
authorized!
https://www.flickr.com/photos/denise_rowlands
In a Deming World…
• Most decisions are made within the
software supply chain by engineering
teams
• Security decisions are usually made as a
result of attempting to balance design
constraints
• Gating processes are not Deming-like; but
it is hard to avoid business catastrophes by
applying measure ahead strategies for
security
• Most security defects are identified during
a major event triggering the equivalent of
a security “recall”
design build deploy operate
How do I
secure my
app?
What
component
is secure
enough?
How do I
secure
secrets for
the app?
Is my app
getting
attacked?
How?
Typical gates for security
checks & balances
Mistakes and drift often happen
after design and build phases
Most costly mistakes
Happen during design
Missing and much-needed feedback loop
Hackers have lots of opportunities…
People
• Susceptible to phishing and email scams
• Can be social engineered
Process
• Humans make mistakes, because they are human (6 Sigma)
• Process gaps provide room for fraud
Technology
• Software complexity increases with reusable components
• Technology providers have to do their part, or everyone fails!
Get Grounded in Reality
• Secure business is the new black! KTLO!
• Everyone must be responsible for security!
• Perfection is over-rated… Mistakes are
inevitable.
• Reacting can be costly… build security in.
• Compliance is important but it’s not security!
• A blaming culture is dangerous, avoid it!
• Continuously test, detect, measure and
incrementally improve.
Keep The Lights On!
• Keeping the Lights on includes
Security…
• 66% of companies adopting
DevOps
• DevOps teams need guardrails
and guidelines to move fast
• Security decisions that haven’t
been made before likely
require escalation
https://www.flickr.com/photos/darwinbell
http://www.rightscale.com/blog/cloud-industry-insights/cloud-
computing-trends-2015-state-cloud-survey
Enlist Everyone!
• Common ratio for Dev, Ops
and Sec => 100, 10, 1
• Numbers matter against
attackers!
• Skills help, but anyone can
identify an anomaly.
• Everyone needs to help
with security; everyone has
a role to play. And this is hard to find...
Mistakes happen…
• DevOps utilize customer-driven
development processes with
incremental changes…Mistakes
just happen.
• But because of frequent
changes, teams have more
opportunities to correct
defects, on average 30x more
• Teams need help deciphering
how to self-correct
https://www.flickr.com/photos/doobybrain
Protection is ideal; Detection is a must!
• The faster a defect is
discovered, the faster it can
be dealt with.
• DevOps has 50% faster MTTR
• Transforming security events
into incidents and problems
helps with resolution rates https://www.flickr.com/photos/daoro
Compliance Programs won’t stop a breach
• Point in time assessments
don’t go far enough
• 0 companies (in 10 years)
have been found compliant
after a breach
• Compliance needs to be
paired with rugged security
http://www.slideshare.net/VerizonEnterpriseSolutions/webinar-new-
insights-to-simplify-pci-compliance-and-manage-risk
High Performing is where it’s at!
• High performing teams that
focus on a blameless culture
improve on average 50% better
• Blaming cultures create less
engagement, 30% less efficient
• MTTR is 5x faster in blameless
teams that focus on
opportunities first
#1
Continuous Improvement
• Continuous improvement has
been a goal for an endless
amount of years
• Teams that focus on testing,
early detection, and measuring
progress have 30% fewer
defects in production
• Tests are often added to
continuous delivery to achieve
better results throughout the
continuous delivery pipeline
https://www.flickr.com/photos/deniscollette
Great! What does this look like in practice for a
security professional?
Leaning in over Always Saying “No”
Data & Security Science over Fear, Uncertainty and Doubt
Open Contribution & Collaboration over Security-Only Requirements
Consumable Security Services with APIs over Mandated Security Controls & Paperwork
Business Driven Security Scores over Rubber Stamp Security
Red & Blue Team Exploit Testing over Relying on Scans & Theoretical Vulnerabilities
24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident
Shared Threat Intelligence over Keeping Info to Ourselves
Compliance Operations over Clipboards & Checklists
Use Security Skills to Build Tools
Migrate to Security as Code
Get Involved and Join the Community
• devsecops.org
• @devsecops on Twitter
• DevSecOps on LinkedIn
• DevSecOps on Github
• RuggedSoftware.org
• Compliance at Velocity
• Join Us !!!
• Spread the word!!!
#RuggedDevOps
If you see something cool…
Thank You to Our Sponsors
Get today’s Rugged DevOps presentations in your inbox
mmiller@sonatype.com

More Related Content

PPTX
ISACA Ireland Keynote 2015
PPTX
Finding Security a Home in a DevOps World
PPTX
Security as Code owasp
PPTX
S360 2015 dev_secops_program
PPTX
DevSecCon KeyNote London 2015
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
PPTX
Cloud Security Essentials 2.0 at RSA
PPTX
Security and DevOps Overview
ISACA Ireland Keynote 2015
Finding Security a Home in a DevOps World
Security as Code owasp
S360 2015 dev_secops_program
DevSecCon KeyNote London 2015
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Cloud Security Essentials 2.0 at RSA
Security and DevOps Overview

What's hot (15)

PDF
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
PDF
Take Control: Design a Complete DevSecOps Program
PPTX
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
PDF
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
PPTX
The Teams Behind DevSecOps
 
PDF
DevSecOps - The big picture
PPTX
Overcoming Security Challenges in DevOps
PDF
DevOps and DevSecOps, Incident Management
PDF
2019 DevSecOps Reference Architectures
PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PPTX
451 AppSense Webinar - Why blame the user?
PDF
DevSecOps: Minimizing Risk, Improving Security
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
Take Control: Design a Complete DevSecOps Program
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
The Teams Behind DevSecOps
 
DevSecOps - The big picture
Overcoming Security Challenges in DevOps
DevOps and DevSecOps, Incident Management
2019 DevSecOps Reference Architectures
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
The End of Security as We Know It - Shannon Lietz
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
451 AppSense Webinar - Why blame the user?
DevSecOps: Minimizing Risk, Improving Security
Ad

Viewers also liked (17)

PPTX
DEVSECOPS: Coding DevSecOps journey
PPTX
DevSecCon Keynote
PDF
Gartner Top 10 Strategic Technology Trends 2016
PPT
DevSecOps Singapore introduction
PDF
Jakob Holderbaum - Managing Shared secrets using basic Unix tools
PPT
DevSecOps SG Introduction - August Meetup
PDF
Dev seccon london 2016 intelliment security
PDF
RoboCop: Bringing Law and Order to CI/CD
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PDF
Vulnerability Advisor Deep Dive (Dec 2016)
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PPTX
Rugged DevOps: Aligning Your Team and Your Powers for Success
PDF
Dom & Tom NYC Healthcare Cloud Meetup Case Study (5/4)
PDF
The Art of Identifying Vulnerabilities - CascadiaFest 2015
PDF
Continuous Security - Thunderplains 2016
PDF
Evident io Continuous Compliance - Mar 2017
PDF
How can i find my security blind spots ulf mattsson - aug 2016
DEVSECOPS: Coding DevSecOps journey
DevSecCon Keynote
Gartner Top 10 Strategic Technology Trends 2016
DevSecOps Singapore introduction
Jakob Holderbaum - Managing Shared secrets using basic Unix tools
DevSecOps SG Introduction - August Meetup
Dev seccon london 2016 intelliment security
RoboCop: Bringing Law and Order to CI/CD
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Vulnerability Advisor Deep Dive (Dec 2016)
Safely Removing the Last Roadblock to Continuous Delivery
Rugged DevOps: Aligning Your Team and Your Powers for Success
Dom & Tom NYC Healthcare Cloud Meetup Case Study (5/4)
The Art of Identifying Vulnerabilities - CascadiaFest 2015
Continuous Security - Thunderplains 2016
Evident io Continuous Compliance - Mar 2017
How can i find my security blind spots ulf mattsson - aug 2016
Ad

Similar to The Journey to DevSecOps (20)

PDF
Just4Meeting 2012 - How to protect your web applications
PPTX
2016 - Safely Removing the Last Roadblock to Continuous Delivery
PDF
Hacking hired [Forecasting 2021] Jan 2021
PPTX
Intro to INFOSEC
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PPTX
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
PDF
Security Training: Making your weakest link the strongest - CircleCityCon 2017
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
Implementing Technology in Your Agency - Laird Rixford, ITC
PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
PDF
The State of DevSecOps
PDF
Sprint with Agile, Deliver With DevOps
PPTX
DevSecOps with Microsoft Tech
PDF
Lean Security
PPTX
DevOps and the Future of Information Security
PPTX
DevOps and the Future of InfoSec
PPTX
State of DevSecOps - DevSecOpsDays 2019
PDF
Modeling and Measuring DevOps Culture
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
Just4Meeting 2012 - How to protect your web applications
2016 - Safely Removing the Last Roadblock to Continuous Delivery
Hacking hired [Forecasting 2021] Jan 2021
Intro to INFOSEC
Outpost24 webinar: Turning DevOps and security into DevSecOps
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Security Training: Making your weakest link the strongest - CircleCityCon 2017
Secure DevOps - Evolution or Revolution?
Implementing Technology in Your Agency - Laird Rixford, ITC
State of DevSecOps - DevOpsDays Jakarta 2019
The State of DevSecOps
Sprint with Agile, Deliver With DevOps
DevSecOps with Microsoft Tech
Lean Security
DevOps and the Future of Information Security
DevOps and the Future of InfoSec
State of DevSecOps - DevSecOpsDays 2019
Modeling and Measuring DevOps Culture
Succeeding-Marriage-Cybersecurity-DevOps final

Recently uploaded (20)

PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Produktkatalog fĂĽr HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Architecture types and enterprise applications.pdf
Comparative analysis of machine learning models for fake news detection in so...
Improvisation in detection of pomegranate leaf disease using transfer learni...
A review of recent deep learning applications in wood surface defect identifi...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
UiPath Agentic Automation session 1: RPA to Agents
Developing a website for English-speaking practice to English as a foreign la...
CloudStack 4.21: First Look Webinar slides
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
TEXTILE technology diploma scope and career opportunities
Custom Battery Pack Design Considerations for Performance and Safety
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Excel 365/2024 Beginner's training
Convolutional neural network based encoder-decoder for efficient real-time ob...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Consumable AI The What, Why & How for Small Teams.pdf
Produktkatalog fĂĽr HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
The influence of sentiment analysis in enhancing early warning system model f...
Benefits of Physical activity for teenagers.pptx
Architecture types and enterprise applications.pdf

The Journey to DevSecOps

  • 1. Shannon Lietz The Journey to DevSecOps^ @devsecops
  • 2. Always an Early Adopter Google Trends • DevOps.com was bought in 2004 • Google searches for “DevOps” started to rise in 2010 • Major influences: – Saving your Infrastructure from DevOps / Chicago Tribune – DevOps: A Culture Shift, Not a Technology / Information Week – DevOps: A Sharder’s Tale from Etsy – DevOps.com articles • RuggedSoftware.org was bought in 2010 https://www.google.com/trends/
  • 4. Which means, spending most of your career doing this… Bang Head Here
  • 5. This is the End of Security as We Know It… Say what?!??! 6+ years later, it’s hard to believe we’re still shocked by this quote! This talk will provide you with a path forward… And a survival kit... -Josh Corman
  • 6. An Ugly Little Secret • DevOps teams make security decisions… several times, everyday! • Hackers find security issues and exploit them... several times, everday! • Security teams hardly ever make security decisions... and really only when risks need to be officially authorized! https://www.flickr.com/photos/denise_rowlands
  • 7. In a Deming World… • Most decisions are made within the software supply chain by engineering teams • Security decisions are usually made as a result of attempting to balance design constraints • Gating processes are not Deming-like; but it is hard to avoid business catastrophes by applying measure ahead strategies for security • Most security defects are identified during a major event triggering the equivalent of a security “recall” design build deploy operate How do I secure my app? What component is secure enough? How do I secure secrets for the app? Is my app getting attacked? How? Typical gates for security checks & balances Mistakes and drift often happen after design and build phases Most costly mistakes Happen during design Missing and much-needed feedback loop
  • 8. Hackers have lots of opportunities… People • Susceptible to phishing and email scams • Can be social engineered Process • Humans make mistakes, because they are human (6 Sigma) • Process gaps provide room for fraud Technology • Software complexity increases with reusable components • Technology providers have to do their part, or everyone fails!
  • 9. Get Grounded in Reality • Secure business is the new black! KTLO! • Everyone must be responsible for security! • Perfection is over-rated… Mistakes are inevitable. • Reacting can be costly… build security in. • Compliance is important but it’s not security! • A blaming culture is dangerous, avoid it! • Continuously test, detect, measure and incrementally improve.
  • 10. Keep The Lights On! • Keeping the Lights on includes Security… • 66% of companies adopting DevOps • DevOps teams need guardrails and guidelines to move fast • Security decisions that haven’t been made before likely require escalation https://www.flickr.com/photos/darwinbell http://www.rightscale.com/blog/cloud-industry-insights/cloud- computing-trends-2015-state-cloud-survey
  • 11. Enlist Everyone! • Common ratio for Dev, Ops and Sec => 100, 10, 1 • Numbers matter against attackers! • Skills help, but anyone can identify an anomaly. • Everyone needs to help with security; everyone has a role to play. And this is hard to find...
  • 12. Mistakes happen… • DevOps utilize customer-driven development processes with incremental changes…Mistakes just happen. • But because of frequent changes, teams have more opportunities to correct defects, on average 30x more • Teams need help deciphering how to self-correct https://www.flickr.com/photos/doobybrain
  • 13. Protection is ideal; Detection is a must! • The faster a defect is discovered, the faster it can be dealt with. • DevOps has 50% faster MTTR • Transforming security events into incidents and problems helps with resolution rates https://www.flickr.com/photos/daoro
  • 14. Compliance Programs won’t stop a breach • Point in time assessments don’t go far enough • 0 companies (in 10 years) have been found compliant after a breach • Compliance needs to be paired with rugged security http://www.slideshare.net/VerizonEnterpriseSolutions/webinar-new- insights-to-simplify-pci-compliance-and-manage-risk
  • 15. High Performing is where it’s at! • High performing teams that focus on a blameless culture improve on average 50% better • Blaming cultures create less engagement, 30% less efficient • MTTR is 5x faster in blameless teams that focus on opportunities first #1
  • 16. Continuous Improvement • Continuous improvement has been a goal for an endless amount of years • Teams that focus on testing, early detection, and measuring progress have 30% fewer defects in production • Tests are often added to continuous delivery to achieve better results throughout the continuous delivery pipeline https://www.flickr.com/photos/deniscollette
  • 17. Great! What does this look like in practice for a security professional? Leaning in over Always Saying “No” Data & Security Science over Fear, Uncertainty and Doubt Open Contribution & Collaboration over Security-Only Requirements Consumable Security Services with APIs over Mandated Security Controls & Paperwork Business Driven Security Scores over Rubber Stamp Security Red & Blue Team Exploit Testing over Relying on Scans & Theoretical Vulnerabilities 24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident Shared Threat Intelligence over Keeping Info to Ourselves Compliance Operations over Clipboards & Checklists
  • 18. Use Security Skills to Build Tools
  • 20. Get Involved and Join the Community • devsecops.org • @devsecops on Twitter • DevSecOps on LinkedIn • DevSecOps on Github • RuggedSoftware.org • Compliance at Velocity • Join Us !!! • Spread the word!!!
  • 21. #RuggedDevOps If you see something cool…
  • 22. Thank You to Our Sponsors
  • 23. Get today’s Rugged DevOps presentations in your inbox mmiller@sonatype.com