SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Why Security Engineers Need to
Shift-Left to DevSecOps
Najib Radzuan
Agenda
○
○
About Me
Najib Radzuan
● He was a Developer
● He became IT Operations
● Finally become DevOps Engineer/ DevOps Leader /
DevOps Institute Ambassador
● He is also a certified DevOps Leader, DevSecOps
Professional , Azure DevOps Expert, & etc.
● Founder of DevOps4Me
@devops4me @najibradzuan blog.devops4me.com
The Pitfall: Security & Compliance
Company
● Failure to recognise
cybersecurity basics
● Lack of Cybersecurity
Policy
● Not enough IT Security
Management
Application Developer
● Uses Open-Source
library which has a lot
of security bug risks
● They don't have formal
Application security
training.
● Lacks a recovery plan
for vulnerability risks.
AppSec / InfoSec Eng.
● Not involved in product
design/development
● The last person to
handle security and
compliance issues
● Cannot compete with
Agility and Speed of
DevOps team.
● DevSecOps also
added to the pain due
lack of CI/CD
knowledge
Traditional Security Testing
Plan Code Build Test Release Deploy Operate Monitor
Security Testing
The Pitfall
● A code review or penetration test it's
conducted to find security flaws in the
application at last Stage/Production
environment. Your Developer might
redo to eliminate the vulnerability.
● Bug/issue found when the project
deadline is near or last-minute = project
delayed
● Sometimes a bug/vulnerability is found
by the client or external pentester
Question:
Do we expect all
Developers to do security
testing and do not make
mistakes?
Solution
DevSecOps & Shift-Left
Approach
● Shifting left lets us deal with
security issues early and often
● So shifting left reduces risk and
the costs of fixing security
issues.
DevSecOps
DevSecOps is a modern model that provides that
everyone in the team is responsible for security
implementation in the application, from planning ,
design , development, QA / Testing to release, and in a
production environment.
Development
Quality
Assurance
IT Operation
Security
DevSecOps
DevSecOps Benefit
● Cost-saving is accomplish by identifying and addressing security
vulnerabilities during the development process, which also improves the
speed of delivery.
● It Improved overall security by reducing vulnerabilities, reducing insecure
defaults and increasing code coverage and automation by the use of
Infrastructure as Code (IaC).
● Everyone is responsible for security. DevSecOps fosters a culture of
transparency and accountability from the earliest stages of development.
● With help of DevSecOps, we are keeping up-to-date with the rapid creativity
common to cybercrime by effectively managing security auditing, monitoring
and notification systems.
DevSecOps Practice
Practice Secure CodingEmbrace AutomationShift-LeftPeople Process
- Neutralize senior
management mindset in
order for DevSecOps'
strategy to be embraced.
- Security specialists or
“Security Champions” will
play a key role in getting
your DevSecOps journey
right.
- Training developers on how
to develop secure code are
important to note.
- Until now, developer teams
may have not prioritized this
because the coding is the
priority. However, security
needs to be made aware of
security-related facts in
DevOps culture.
- The obvious advantage of
doing this is that you can
recognise possible
vulnerabilities and work to fix
them faster.
- The faster you notice any
bugs, the cheaper it will be
for you to fix them.
- Automation is a key feature
of DevSecOps to match the
speed of security with your
product delivery in a CI / CD
environment, security
automation is a must.
- Choosing and continuing
learning with the right
security automation tool is
key to the success of your
company's products.
- In general, different teams
within an organization
execute various tasks, with
DevSecOps, everyone works
on commonly agreed-upon
processes and executing
them to strengthen the extent
of security in development.
DevSecOps Approach
Pre-Commit Hooks
IDE Plugin
Developer
Secrets
Management
Source Code
- Software
Composition Analysis
(SCA)
-Static Analysis
Security Test (SAST)
Pre-Build
-Dynamic Analysis
Security Test (DAST)
Post-Build
Continuous Integration (CI) Tool/Server
- Defect Management
- Security Metric
-Artifact Security
Scan
Artifact
-Compliance As a
Code (CaC) - Inspec
by Chef
- Alert & Monitoring
Production
Vulnerability Management
DevSecOps Tools of the Trade
Developer Source Code Pre-Build Post-Build
Continuous Integration (CI) Tool/Server
Vulnerability Management
Artifact Production
**Above just an example, we don’t endorse any tool.
Retire.js
Example of DevSecOps Workflow
Push
Code
Source Code
Management
Developer
Pull Request
Scan
Pull
Request
Creation
Complete
Branch Scan
Trigger Build
CI/CD Tool / Server
1
2
3
Build Solution
Software
Analysis
(SCA) & Static
Security Scan
(SAST)
Artifact /
Image
4
Test
Staging
ProductionTrigger
Release
Release
Management
Pre-Approval
Deployment to
Environment
5
6
Dynamic Security
Scan (DAST)
Dynamic Security
Scan (DAST)
Pull
Image
Deploy
Talisman
How To Start DevSecOps?
1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple
as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are
in doubt about the process or toolchain.
2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then
decide if the change is good or bad.
3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance,
including obtaining proof of compliance with GDPR, PCI, etc.).
4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly.
5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are
being responded to and patched.
6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other
security skills.
Conclusion
● I think that every company/Security Engineers must make an effort to
"Shift-Left" to a DevSecOps culture or methodologies and come up with a
multidisciplinary security team.
● Approaching "Security As a Code", moving security practices to the left and
educating software developers on critical testing and security practices are
essential aspects to engage security as part of the DevOps process.
● The key is to be ready to start, to encourage experimentation, to be willing
to fail, to learn and to move forward one step at a time.
Question &
Answer
“If you don’t ask, you will never get
the answer.”

Weitere ähnliche Inhalte

Was ist angesagt?

Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsSuman Sourav
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Dinis Cruz
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityStephen de Vries
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevOps Indonesia
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOpsArchana Joshi
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment securityDevSecCon
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017Suman Sourav
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsSuman Sourav
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpskieranjacobsen
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minuteskieranjacobsen
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 

Was ist angesagt? (20)

DevSecOps outline
DevSecOps outlineDevSecOps outline
DevSecOps outline
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
Application Security Logging with Splunk using Java
Application Security Logging with Splunk using JavaApplication Security Logging with Splunk using Java
Application Security Logging with Splunk using Java
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOps
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minutes
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 

Ähnlich wie Why Security Engineer Need Shift-Left to DevSecOps?

DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDev Software
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}Ajeet Singh
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineDevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineEnov8
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdfEnov8
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.Techugo
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.Techugo
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdfTechugo
 
How To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowHow To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowEnov8
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineCloudZenix LLC
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenNadira Bajrei
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfEnov8
 
Ensuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityEnsuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityDev Software
 
DevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDev Software
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?Enov8
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxDev Software
 

Ähnlich wie Why Security Engineer Need Shift-Left to DevSecOps? (20)

DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLC
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineDevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps Pipeline
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdf
 
How To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowHow To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps Workflow
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD Pipeline
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien Harisen
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
 
Ensuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityEnsuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps Security
 
DevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and Delivery
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
 

Kürzlich hochgeladen

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 

Kürzlich hochgeladen (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 

Why Security Engineer Need Shift-Left to DevSecOps?

  • 1. Why Security Engineers Need to Shift-Left to DevSecOps Najib Radzuan
  • 3. About Me Najib Radzuan ● He was a Developer ● He became IT Operations ● Finally become DevOps Engineer/ DevOps Leader / DevOps Institute Ambassador ● He is also a certified DevOps Leader, DevSecOps Professional , Azure DevOps Expert, & etc. ● Founder of DevOps4Me @devops4me @najibradzuan blog.devops4me.com
  • 4. The Pitfall: Security & Compliance Company ● Failure to recognise cybersecurity basics ● Lack of Cybersecurity Policy ● Not enough IT Security Management Application Developer ● Uses Open-Source library which has a lot of security bug risks ● They don't have formal Application security training. ● Lacks a recovery plan for vulnerability risks. AppSec / InfoSec Eng. ● Not involved in product design/development ● The last person to handle security and compliance issues ● Cannot compete with Agility and Speed of DevOps team. ● DevSecOps also added to the pain due lack of CI/CD knowledge
  • 5. Traditional Security Testing Plan Code Build Test Release Deploy Operate Monitor Security Testing The Pitfall ● A code review or penetration test it's conducted to find security flaws in the application at last Stage/Production environment. Your Developer might redo to eliminate the vulnerability. ● Bug/issue found when the project deadline is near or last-minute = project delayed ● Sometimes a bug/vulnerability is found by the client or external pentester Question: Do we expect all Developers to do security testing and do not make mistakes?
  • 6. Solution DevSecOps & Shift-Left Approach ● Shifting left lets us deal with security issues early and often ● So shifting left reduces risk and the costs of fixing security issues.
  • 7. DevSecOps DevSecOps is a modern model that provides that everyone in the team is responsible for security implementation in the application, from planning , design , development, QA / Testing to release, and in a production environment. Development Quality Assurance IT Operation Security DevSecOps
  • 8. DevSecOps Benefit ● Cost-saving is accomplish by identifying and addressing security vulnerabilities during the development process, which also improves the speed of delivery. ● It Improved overall security by reducing vulnerabilities, reducing insecure defaults and increasing code coverage and automation by the use of Infrastructure as Code (IaC). ● Everyone is responsible for security. DevSecOps fosters a culture of transparency and accountability from the earliest stages of development. ● With help of DevSecOps, we are keeping up-to-date with the rapid creativity common to cybercrime by effectively managing security auditing, monitoring and notification systems.
  • 9. DevSecOps Practice Practice Secure CodingEmbrace AutomationShift-LeftPeople Process - Neutralize senior management mindset in order for DevSecOps' strategy to be embraced. - Security specialists or “Security Champions” will play a key role in getting your DevSecOps journey right. - Training developers on how to develop secure code are important to note. - Until now, developer teams may have not prioritized this because the coding is the priority. However, security needs to be made aware of security-related facts in DevOps culture. - The obvious advantage of doing this is that you can recognise possible vulnerabilities and work to fix them faster. - The faster you notice any bugs, the cheaper it will be for you to fix them. - Automation is a key feature of DevSecOps to match the speed of security with your product delivery in a CI / CD environment, security automation is a must. - Choosing and continuing learning with the right security automation tool is key to the success of your company's products. - In general, different teams within an organization execute various tasks, with DevSecOps, everyone works on commonly agreed-upon processes and executing them to strengthen the extent of security in development.
  • 10. DevSecOps Approach Pre-Commit Hooks IDE Plugin Developer Secrets Management Source Code - Software Composition Analysis (SCA) -Static Analysis Security Test (SAST) Pre-Build -Dynamic Analysis Security Test (DAST) Post-Build Continuous Integration (CI) Tool/Server - Defect Management - Security Metric -Artifact Security Scan Artifact -Compliance As a Code (CaC) - Inspec by Chef - Alert & Monitoring Production Vulnerability Management
  • 11. DevSecOps Tools of the Trade Developer Source Code Pre-Build Post-Build Continuous Integration (CI) Tool/Server Vulnerability Management Artifact Production **Above just an example, we don’t endorse any tool. Retire.js
  • 12. Example of DevSecOps Workflow Push Code Source Code Management Developer Pull Request Scan Pull Request Creation Complete Branch Scan Trigger Build CI/CD Tool / Server 1 2 3 Build Solution Software Analysis (SCA) & Static Security Scan (SAST) Artifact / Image 4 Test Staging ProductionTrigger Release Release Management Pre-Approval Deployment to Environment 5 6 Dynamic Security Scan (DAST) Dynamic Security Scan (DAST) Pull Image Deploy Talisman
  • 13. How To Start DevSecOps? 1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are in doubt about the process or toolchain. 2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then decide if the change is good or bad. 3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance, including obtaining proof of compliance with GDPR, PCI, etc.). 4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly. 5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are being responded to and patched. 6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other security skills.
  • 14. Conclusion ● I think that every company/Security Engineers must make an effort to "Shift-Left" to a DevSecOps culture or methodologies and come up with a multidisciplinary security team. ● Approaching "Security As a Code", moving security practices to the left and educating software developers on critical testing and security practices are essential aspects to engage security as part of the DevOps process. ● The key is to be ready to start, to encourage experimentation, to be willing to fail, to learn and to move forward one step at a time.
  • 15. Question & Answer “If you don’t ask, you will never get the answer.”