devsecops
play

DevSecOps An Implementation Strategy With a Focus on Cultural - PowerPoint PPT Presentation

DevSecOps An Implementation Strategy With a Focus on Cultural Implications 6 th Annual COV Information Security Conference Richmond, Virginia April 12, 2019 Presenters Eddie McAndrew Barry Davis COO CISSO AIS Network Virginia Dept. of


  1. DevSecOps An Implementation Strategy With a Focus on Cultural Implications 6 th Annual COV Information Security Conference Richmond, Virginia April 12, 2019

  2. Presenters Eddie McAndrew Barry Davis COO CISSO AIS Network Virginia Dept. of Social Services (804) 239-5185 (804) 726-7153 Email: Email: eddie.mcandrew@aisn.net barry.davis@dss.virginia.gov

  3. Agenda • Introduction • DevOps • DevSecOps & Process • DevSecOps Tools • Summary • Q&A

  4. “DevOps is a set of software development practices that What Is combines software development and information technology operations DevOps? to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.” (Wikipedia)

  5. Tools and practices employed to drive high velocity deployment of applications Key component of value proposition behind What Is going to the cloud DevOps? Drives Continuous Integration/Continuous Deployment (CI/CD) Intended to drive innovation/continuous learning, high-quality applications through flexibility and enhanced competitiveness

  6. Infrastructure as Code Defining and managing system configuration through code that can be versioned and tested in advance, to increase the speed of building systems and offering efficiencies at scale. Key Continuous Delivery Elements Using Continuous Integration and test automation to build pipelines from development to test and then to production. Continuous Monitoring and Measurement Creating feedback loops from production back to engineering, collecting metrics and making them visible to everyone to understand how the system is actually used, and using this data to learn and improve. Ref: ISC2 -DevSecOps – Integrating Security into DevOps

  7. Continuous Integration ̶ DevOps CI/CD Continuous Delivery Driving Innovation Integrating at the end of the life cycle is no longer sufficient!

  8. Continuous Integration Continuous Delivery Ref: ISC2 -DevSecOps – Integrating Security into DevOps

  9. Comparing Development Models

  10. Hurdles to Using DevOps in Regulated Situations

  11. • More potential vulnerabilities DevSecOps: Faster deployment, rapid • Greater potential risk and continuous updates The Why • So, to drive speed, flexibility & innovation and rollout lead to what? securely -> DevSecOps and the What DevSecOps – Bridging Agility & Security DevSecOps consists of the tools, frameworks • Driving enabled innovation, flexibility and and principles for competitiveness securely … adapting to a high velocity environment

  12. Key Elements of DevSecOps Culture Process Technologie s

  13. Traditional Security v . DevSecOps Traditional DevSecOps To embrace In the traditional view DevSecOps, of security, operations and engineering must security must be yield to avoid risk. A communicated as view might be that of: a core value – and as a critical • Development enabler. • Security • Operations Collaboration is key!

  14. Communication Is Critical to the Cultural Change Ref: ISC2 -DevSecOps – Integrating Security into DevOps

  15. Ref: ISC2 -DevSecOps – Integrating Security into DevOps

  16. Acting as the voice of Security Security Acting as an on-site advisors Champions Anticipating potential design or Facilitate a implementation problems Scalable Deciding when to engage the security team DevSecOps Program Participating in code reviews and threat modeling Troubleshooting security bugs AND MORE!

  17. DevSecOps & Process Cultural change Security tools must Processes must: Continual learning must be supported be tightly and improvement is • Incorporate continuous by process change integrated key monitoring and remediation throughout the of security defects • DevOps pipeline Continuously test code throughout the life cycle • Incorporate automated testing • Support Test Driven Security (TDS) • Support continuous & open communications Recommended Reading: “Where Security Meets DevOps: Test Driven Security,” https://freecontent.manning.com/where-security-meets-devops-test-driven-security/

  18. Ref: ISC2 -DevSecOps – Integrating Security into DevOps

  19. Secure Development as a Continuous Improvement Process

  20. Gartner’s Ten Things to Get Right…. 1 2 3 4 Adapt your security testing Quit trying to eliminate all Focus first on identifying and Don’t expect to use tools and processes to the vulnerabilities during removing the known critical traditional dynamic or static developers, not the other development. vulnerabilities. app security testing without way around. changes. 5 6 7 8 Train all developers on the Adopt a security champion Eliminate the use of known Secure and apply operational basics of secure coding, but model and implement a vulnerable components at discipline to automation don’t expect them to simple security requirements the source. scripts. become security experts. gathering tool. 9 10 Implement strong version Adopt an immutable control on all code and infrastructure mindset. components.

  21. 5 Principles for DevSecOps • Automate security into the process • Integrate to fail quickly • No false alarms • Build security champions • Keep operational visibility

  22. The Security Professional’s Role • Enable developers to find and fix security-related code defects • Govern the use of open source components • Implement developer training on secure coding • Manage and report on application security policy, KPIs and metrics • Understand the requirements for security testing solutions in a Recommended reading: “The Security Professional’s Role DevSecOps environment in a DevSecOps World,” https://info.veracode.com/guide- the-security-professionals-role-in-devops-world.html • Create developer security champions

  23. Automated testing is key to driving the DevOps pipeline As noted - Security tools must be tightly DevSecOps integrated throughout the DevOps pipeline Tools – The Testing using tools should be metric driven a few key metrics include: Third Leg • Availability: Amount of uptime/downtime in a given time period, in accordance with the SLA. of the Stool • Change Failure: Percentage of production deployments that failed. • Change Lead Time: Time between a code commit and production deployment of that code. • Mean Time to Failure (MTTF): Time that a system is online between outages or failures. • Mean Time to Recovery (MTTR): Time between a failed production deployment to full restoration of production operations. • Number of False Positives: The number of mistakenly flagged vulnerabilities for an application. • ISC2 list in appendix.

  24. DevSecOps Tools Drive the DevOps Pipeline Via Logging

  25. The Case for DevSecOps This drives the need to:

  26. A Security Strategy for Implementing DevSecOps Keys to Successful Implementation Culture of Collaboration and Contribution • Everyone has something to offer • Tools & Frameworks Everyone is responsible for security • Goal = safely distributing security decisions •  Culture Process – signification changes to existing processes •  Process Need mechanisms for communications, measurement, reporting • Need to establish a group including Security, Development and  Technology • Operations This group is responsible for end-to-end security: • App development • Implementing changes • A continuous loop – CI/CD • Tools – required to automate processes for: • Managing code repositories • Testing – attacking surface analysis, threat modeling, penn & fuzz testing, • etc.

  27. Thank You Eddie McAndrew Barry Davis COO CISSO AIS Network Virginia Dept. of Social Services (804) 239-5185 (804) 726-7153 Email: Email: eddie.mcandrew@aisn.net barry.davis@dss.virginia.gov

  28. Appendix 1 – ISC2 DevSecOps KPIs

  29. Appendix 2 – ISC2

  30. DevSecOps Tooling

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend