SlideShare a Scribd company logo
DevOps and Security: It’s Happening. Right Now.
Helen Bravo
Director of Product Management at Checkmarx
Helen.bravo@checkmarx.com
Agenda
• Intro to DevOps
• Integrating security within DevOps

– Problems with traditional controls
– Steps to DevOps security
What is DevOps About?
An unstoppable deployment process
… in small chunks of time
DevOps is Happening

Companies that have adopted DevOps
Can TRADITIONAL
web application
security controls fit
in…

… a DevOps environment?!
Traditional Web Application Security Controls
• Penetration Testing
• WAF (Web Application Firewall)

• Code Analysis
Penetration Testing- Takes Time!
Penetration Testing
– 300 pages report

– 3 weeks assessment time
– 2 weeks to get it into development
Web Application Firewall (WAF)
Thinking Continuous
Deployment?

Think Continuous
Configuration!
Code Analysis
• Setup time
• Running time
• Analysis time

… just too slow!
DevOps & Security: Here & Now
… Do Nothing?
Required: A New Secure SDLC Approach
Step by Step
Step 1: Plan for Security
Step 1: Plan for Security
• Identify unsecured APIs and frameworks
• Map security sensitive code portions. E.g. password
changes mechanism, user authentication
mechanism.
• Anticipate regulatory problems, plan for it.
Step 2: Engage the Developers.

And Be Engaged
Step 2: Engage the Developers. And Be Engaged
• Connect developers to security
– Going to OWASP? Bring a developer with you!

• Is your house on fire? Share the details with your
developers.
• Have an open door approach
• Set up an online collaboration platform E.g. Jive,
Confluence etc.
Step 3: Arm the Developers
Step 3: Arm the Developer
• Secure frameworks:
– Use a secure framework such as Spring Security, JAAS, Apache
Shiro, Symfony2

– ESAPI is a very useful OWASP security framework
• SCA tools that can provide security feedback on pre-commit stage.
– Rapid response

– Small chunks
Step 3: Automate the Process
Step 3: Automate the Process
• Integrate within your build (Jenkins, Bamboo,
TeamCity, etc.)
– SAST
– DAST

• Fail the build if security does not pass the bar.
Continuous Deployment
Unit Tests

Develop

Code
Commit

Source
Control

Build
Trigger

Deploy to
Test Env

Report
&
Notify

Publish to
release
repository

Deploy
to
Production
Security within Continuous Deployment

Tests

Develop

Code
Commit

Source
Control

Build
Trigger

Deploy
to Test
Env
SCA
Test

Publish to

Automatic Report release
security
repository
&
test
Notify

Deploy
to
Production
Step 5: Use Old Tools Wisely
Step 5: Use Old Tools Wisely
• Periodic pen testing
• WAF on main functions
• Code review for security sensitive code portions.
Summary
Summary
• DevOps is happening. Right Now.
– During the time of this talk, Amazon has released

75 features and bug fixes.
• Security should not be compromised
• Don’t be overwhelmed. Start small
The 3 Takeaways
1. Plan from the ground

2. Engage with your developers
3. Integrate security into automatic build
process.
Questions?
Thank you
Helen.bravo@checkmarx.com

More Related Content

PPTX
Platforms, Platform Engineering, & Platform as a Product
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PPTX
Software Composition Analysis Deep Dive
PDF
Introduction to DevSecOps
PDF
DevSecOps What Why and How
PDF
Scaling DevSecOps Culture for Enterprise
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
Practical DevSecOps Course - Part 1
Platforms, Platform Engineering, & Platform as a Product
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Software Composition Analysis Deep Dive
Introduction to DevSecOps
DevSecOps What Why and How
Scaling DevSecOps Culture for Enterprise
DevSecOps: What Why and How : Blackhat 2019
Practical DevSecOps Course - Part 1

What's hot (20)

PDF
Docker Introduction
PPTX
DevSecOps reference architectures 2018
PPTX
DevOps to DevSecOps Journey..
PDF
2019 DevSecOps Reference Architectures
PDF
Jenkins with SonarQube
PDF
DevSecOps - The big picture
PDF
Intro to DefectDojo at OWASP Switzerland
PPTX
Introduction to DevOps
DOCX
AWS | VPC Peering
PDF
DevSecOps Jenkins Pipeline -Security
PDF
DevSecOps Implementation Journey
PDF
DevOps for beginners
PPTX
Docker 101 : Introduction to Docker and Containers
PDF
The State of DevSecOps
PDF
CI/CD with Jenkins and Docker - DevOps Meetup Day Thailand
PDF
Practical DevSecOps - Arief Karfianto
PPTX
Introduction to DevOps on AWS
PPTX
WAF deployment
PDF
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
Docker Introduction
DevSecOps reference architectures 2018
DevOps to DevSecOps Journey..
2019 DevSecOps Reference Architectures
Jenkins with SonarQube
DevSecOps - The big picture
Intro to DefectDojo at OWASP Switzerland
Introduction to DevOps
AWS | VPC Peering
DevSecOps Jenkins Pipeline -Security
DevSecOps Implementation Journey
DevOps for beginners
Docker 101 : Introduction to Docker and Containers
The State of DevSecOps
CI/CD with Jenkins and Docker - DevOps Meetup Day Thailand
Practical DevSecOps - Arief Karfianto
Introduction to DevOps on AWS
WAF deployment
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
Ad

Viewers also liked (13)

PDF
Application Security Guide for Beginners
PPTX
Implementing an Application Security Pipeline in Jenkins
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
PDF
Devops security-An Insight into Secure-SDLC
PDF
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
PDF
A Successful SAST Tool Implementation
PDF
DevSecOps in Baby Steps
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Happy New Year!
PDF
Application Security Management with ThreadFix
PPTX
DEVSECOPS: Coding DevSecOps journey
PPTX
Graph Visualization - OWASP NYC Chapter
PDF
[ITAS.VN]CxSuite Enterprise Edition
Application Security Guide for Beginners
Implementing an Application Security Pipeline in Jenkins
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
Devops security-An Insight into Secure-SDLC
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
A Successful SAST Tool Implementation
DevSecOps in Baby Steps
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Happy New Year!
Application Security Management with ThreadFix
DEVSECOPS: Coding DevSecOps journey
Graph Visualization - OWASP NYC Chapter
[ITAS.VN]CxSuite Enterprise Edition
Ad

Similar to DevOps & Security: Here & Now (20)

PPTX
Dev opsandsecurity owasp
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PPTX
Secure DevOPS Implementation Guidance
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PDF
Scale security for a dollar or less
PDF
AppSec How-To: Achieving Security in DevOps
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
Strengthen and Scale Security for a dollar or less
PPTX
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
PPTX
DevSecOps and Drupal: Securing your applications in a modern IT landscape
PPTX
Introduction to DevSecOps
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
DevSecOps : an Introduction
PDF
You build it - Cyber Chicago Keynote
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PDF
DevOps or DevSecOps
PPTX
Introduction to DevSecOps OWASP Ahmedabad
PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Dev opsandsecurity owasp
You Build It, You Secure It: Introduction to DevSecOps
Secure DevOPS Implementation Guidance
The Rise of DevSecOps in CI_CD Workflows.pdf
Scale security for a dollar or less
AppSec How-To: Achieving Security in DevOps
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security for a dollar or less
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
DevSecOps and Drupal: Securing your applications in a modern IT landscape
Introduction to DevSecOps
Secure DevOps - Evolution or Revolution?
DevSecOps : an Introduction
You build it - Cyber Chicago Keynote
DevSecCon Keynote
DevSecCon KeyNote London 2015
DevOps or DevSecOps
Introduction to DevSecOps OWASP Ahmedabad
2021-10-14 The Critical Role of Security in DevOps.pdf
Why Security Engineer Need Shift-Left to DevSecOps?

More from Checkmarx (9)

PDF
The Web AppSec How-To: The Defender's Toolbox
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
PDF
The 5 Biggest Benefits of Source Code Analysis
PDF
A Platform for Application Risk Intelligence
PDF
How Virtual Compilation Transforms Static Code Analysis
PDF
Source Code vs. Binary Code Analysis
PDF
The App Sec How-To: Choosing a SAST Tool
PDF
The Security State of The Most Popular WordPress Plug-Ins
PDF
10 Steps To Secure Agile Development
The Web AppSec How-To: The Defender's Toolbox
10 Tips to Keep Your Software a Step Ahead of the Hackers
The 5 Biggest Benefits of Source Code Analysis
A Platform for Application Risk Intelligence
How Virtual Compilation Transforms Static Code Analysis
Source Code vs. Binary Code Analysis
The App Sec How-To: Choosing a SAST Tool
The Security State of The Most Popular WordPress Plug-Ins
10 Steps To Secure Agile Development

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks

DevOps & Security: Here & Now