security and compliance theater the seventh deadly
play

Security and Compliance Theater The Seventh Deadly Disease John - PowerPoint PPT Presentation

Security and Compliance Theater The Seventh Deadly Disease John Willis @botchagalupe botchagalupe@gmail.com https://github.com/botchagalupe/my-presentations You cant Lean, Agile, SAFE, Devops or even SRE your way around a bad


  1. Security and Compliance Theater “The Seventh Deadly Disease”

  2. John Willis @botchagalupe botchagalupe@gmail.com

  3. https://github.com/botchagalupe/my-presentations

  4. You can’t Lean, Agile, SAFE, Devops or even SRE your way around a bad organizational culture.

  5. What We Did Organizational Anthropology

  6. Conway’s Law An adage named after computer programmer Melvin Conway, who introduced the idea in 1967. It states that. "organizations which design systems ... are constrained to produce designs which are copies of the communication structures of these organizations.”

  7. Organizational Anthropology • 10 to 20 Pre-Assessment Calls • 30 to 50 Assessment Meetings • Interview 150-200 People • Over 400 Pages of Notes • 300 Summarized Observations

  8. Two Days With Leadership

  9. Common Top Three • Toil • Risk • Inconsistency

  10. General Toil • Downstream Dependancies • ITIL Processing Toil • A Lot of Signoff’s • Only High Priority Get Fixed • High Technical Debt • Product and Team Silos

  11. General Risk • Permitter Based Risk Models • Subjective Governance Models • Inconsistent Policies for Dev/Test/QA • Low Attestation Efficacy • Configuration Blind Spots

  12. General Consistency • Inconsistent Environments • Unclear Roles and Responsibilities • CD Anti-Patterns • Cross Function Chaos

  13. The Deadliest Disease!

  14. Devops (Shift Left Auditors) • Review Boards (ARB, PRB,CAB) • Check Box Compliance • Workarounds and Hidden Work • Auditor Workarounds • Vulnerability Theater • Negative Risk RIO • Policy Theater

  15. DevSecOps Detective Preventative Interval Requirements Development CI Trigger Production & Design Assessment Perimeter SCM Application Risk Assessment Classification Dynamic Web Application Static Analysis/IDE Static Analysis (CI) Assessments Firewalls Security Requirement Definition Automated Attack/ Open Source Threat-Based Pen Secure Libraries Bot Defense Governance(CI) Test Container Security Threat modeling Secure Coding Container Security Management Standards Compliance (CI) Security Mavens (Security-Trained Developers and Operations) Role Based Software Security Training Continuous Monitoring, Analytics and KPI Gathering

  16. DevSecOps Operational Tips • Work with and educate your auditors • Move Subjective Attestation to Objective Attestation • Ruthlessly eliminate false positives to Developers • Explain the vulnerabilities in business impact terms • Devops the vulnerability (JIRA, backlog, Kanban) • Open the code base to everyone in the organization • Educate on how to fix

  17. Changing subjective attestation into objective attestation

  18. Devops Automated Governance • Attestation of the integrity of assets in the delivery pipeline • Automated Attestation in CI/ CD • Transform CAB (Change Advisory Board) • Reduce Effort w/ Compliance Activities - “Continuous Compliance”

  19. The Delivery Pipeline

  20. Constructing an Attestation

  21. Attestation Database

  22. Basic Governance Model

  23. Source Code Repository Stage

  24. Build Stage

  25. Dependency Management Stage

  26. Package Stage

  27. Artifact Stage

  28. Prod Stage

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend