SlideShare ist ein Scribd-Unternehmen logo
1 von 59
Downloaden Sie, um offline zu lesen
November	15,	2016
Multi	Security Checkpoints	on	
DevOps	platform
Hasan Yasar,
Technical Manager
Secure Lifecycle Solutions,
Software Engineering Institute, Carnegie Mellon University
November	15,	2016
Copyright	2016	Carnegie	Mellon	University
This	material	is	based	upon	work	funded	and	supported	by	the	Department	of	Defense	under	Contract	No.	FA8721-05-C-0003	with	
Carnegie	Mellon	University	for	the	operation	of	the	Software	Engineering	Institute,	a	federally	funded	research	and	development	
center.
Any	opinions,	findings	and	conclusions	or	recommendations	expressed	in	this	material	are	those	of	the	author(s)	and	do	not	
necessarily	reflect	the	views	of	the	United	States	Department	of	Defense.
NO	WARRANTY.	THIS	CARNEGIE	MELLON	UNIVERSITY	AND	SOFTWARE	ENGINEERING	INSTITUTE	MATERIAL	IS	FURNISHED	ON	AN	
“AS-IS”	BASIS.	CARNEGIE	MELLON	UNIVERSITY	MAKES	NO	WARRANTIES	OF	ANY	KIND,	EITHER	EXPRESSED	OR	IMPLIED,	AS	TO	ANY	
MATTER	INCLUDING,	BUT	NOT	LIMITED	TO,	WARRANTY	OF	FITNESS	FOR	PURPOSE	OR	MERCHANTABILITY,	EXCLUSIVITY,	OR	RESULTS	
OBTAINED	FROM	USE	OF	THE	MATERIAL.	CARNEGIE	MELLON	UNIVERSITY	DOES	NOT	MAKE	ANY	WARRANTY	OF	ANY	KIND	WITH	
RESPECT	TO	FREEDOM	FROM	PATENT,	TRADEMARK,	OR	COPYRIGHT	INFRINGEMENT.
[Distribution	Statement	A]	This	material	has	been	approved	for	public	release	and	unlimited	distribution.	Please	see	Copyright	
notice	for	non-US	Government	use	and	distribution.
This	material	may	be	reproduced	in	its	entirety,	without	modification,	and	freely	distributed	in	written	or	electronic	form	without	
requesting	formal	permission.	Permission	is	required	for	any	other	use.	Requests	for	permission	should	be	directed	to	the	Software	
Engineering	Institute	at	permission@sei.cmu.edu.
Carnegie	Mellon® and CERT® are	registered	marks	of	Carnegie	Mellon	University.
DM-0004210
November	15,	2016
Multi	Security Checkpoints
Fundamentals	- Process
November	15,	2016
What	Wikipedia	says…
• DevOps (a portmanteau of "development" and "operations”)
emphasizes communication, collaboration, and integration
between software developers and information technology
(IT) operations personnel. [1]
[1]	http://en.wikipedia.org/wiki/DevOps
November	15,	2016
Jez Humble,	https://youtu.be/L1w2_AY82WY
Dave	West,	http://sdtimes.com/analyst-watch-water-scrum-fall-is-the-reality-of-agile/
Business
Research
Budget
Document
Water
Development
Scrum
Integrate
Test
Release
QA
Operations	
Fall- -
November	15,	2016
DevOps is	an	Extension	of	Agile	Thinking
• Embrace constant	
change
• Embed	Customer in	
team	to	internalize	
expertise	on	
requirements	and	
domain
Agile
Embrace	constant	
testing,	delivery
Embed	Operations in	
team	to	internalize	
expertise	on	deployment	
and	maintenance
DevOps
November	15,	2016
Shared	Goals CollaborationBusiness	Needs
DevOps
November	15,	2016
Multiple Dimensions	of	DevOps	
Culture
• Developer and Ops collaborate
(Ops includes security)
• Developers and Operations
support releases beyond
deployment
• Dev and Ops have access to
stakeholders who understand
business and mission goals
Culture
Process	and	
Practices
System	and	Architecture
Automation	
and	
Measurement
Automation/
Measurement
• Automate		repetitive		and	error-
prone	tasks	(e.g.,	build,	testing,	and	
deployment	maintain	consistent	
environments)
• Static	analysis		automation	
(architecture	health)
• Performance	dashboards
Process and Practices
• Pipeline streamlining
• Continuous-delivery practices
(e.g., continuous integration; test
automation; script-driven,
automated deployment;
virtualized, self-service
environments)
System and Architecture
• Architected to support test
automation and continuous-
integration goals
• Applications that support
changes without release (e.g.,
late binding)
• Scalable, secure, reliable, etc.
November	15,	2016
Multi	Security Checkpoints
DevOps	Platform	- Platform
November	15,	2016
Continuous	Integration	(CI)	Model
November	15,	2016
Integration	and	
communication,	even	among	
tools,	is	the	key!
November	15,	2016
November	15,	2016
Human	actions/inputs	to	
the	software	
development	process
November	15,	2016
Actions	
performed	by	
autonomous	
systems
November	15,	2016
Multi	Security Checkpoints
Team	Integration	- People
November	15,	2016
DevOps	and	Security
November	15,	2016
DevOps	and	Security
November	15,	2016
Rugged{Secure}Dev{Sec}Ops
• DevOps	is	a		Risk	Mitigation		strategy,		built	on	Situational	
Awareness,	Automation,	and	 Repetition
• But	security	is	where	a	lot	of	DevOps	implementations	fall	down
• Goal:
– Protecting	private	user	data
– Restricting	access	to	data	/	systems
– Protecting	company	data	/	IP
– Standards	compliance
– Safeguarding	disposition	/	transition
November	15,	2016
Team	Composition
Developers
• Features
• Quality	
Attributes
• Efficiency
• Performance
• Users
• Authentication
• Authorization
IT	Ops
• Deployment
• Maintenance
• Updates
• Change	policy
• Failure
• Data	loss
• Risk	
prevention
QA
• Testable
• Issue	
tracking
• Bug	
Reports
• Usability
• Help	Desk
Security	Team
• Data	Privacy
• Intrusion	
detection
• Threat	vectors
• CVEs
• Package	
security
• Authentication
• Authorization
• Security	
Standards	
Compliance
November	15,	2016
DevOps:	Multiple	Team	Integrations
November	15,	2016
DevOps:	Multiple	Team	Integrations	+	With	Security	Team
November	15,	2016
DevOps:	Multiple	Team	Integrations	+	With	Security	Team
November	15,	2016
Multi	Security Checkpoints
Platform	Security	in	DevOps
November	15,	2016
Evolution	of	software	development
• Custom	development	– context:
• Software	was	limited
§ Size
§ Function
§ Audience
• Each	organization	employed	developers
• Each	organization	created	their	own	
software
• Shared	development	– ISVs	(COTS)	–
context:
• Function	largely	understood
§ Automating	existing	processes
• Grown	beyond	ability	for	using	organization	
to	develop	economically
• Outside	of	core	competitiveness	by	
acquirers
Supply	chain:	practically	none Supply	chain:	software	supplier
Old	days… In	these	days…
November	15,	2016
Development	is	now	assembly
General	
Ledger
SQL	Server WebSphere
HTTP	server
XML	Parser
Oracle	DB
SIP	servlet	
container
GIF	library
Like	“Plug	N	Play”	
Note:	hypothetical	application	composition
Collective	development	– context:
• Too	large	for	single	
organization
• Too	much	specialization
• Too	little	value	in	individual	
components
Supply	chain:	long
November	15,	2016
Software	supply	chain	for	assembled	software	
• Complexity	of	acquisition,	development	and	
deployment
• Visibility	&	awareness
Source:	“Scope	of	Supplier	Expansion	and	Foreign	Involvement”	graphic	in	DACS	www.softwaretechnews.com Secure	Software	Engineering,	July	2005	article	“Software	Development	Security:	A	Risk	Management	Perspective”	synopsis	of	May 2004	
GAO-04-678	report	“Defense	Acquisition:	Knowledge	of	Software	Suppliers	Needed	to	Manage	Risks”
November	15,	2016
Reducing	software	supply	chain	risk	factors
Software	supply	chain	risk	for	a	product	needs	to	be	reduced	to	acceptable	level
Supplier	follows	
practices	that	
reduce	supply	
chain	risks
Delivered	or	
updated	product	
is	acceptably	
secure
Product	
Distribution
Operational
Product Control
Product	is	used	in	a	
secure	manner
Methods	of	
transmitting	the	
product	to	the	
purchaser	guard	
again	tampering
Product	
Security
Supplier
Capability
November	15,	2016
Supply	Chain	Hygiene:	Recommendations
• Supplier	security	commitment	evidence
• Supplier	employees	are	educated	as	to	security	engineering	practices
• Supplier	follows	suitable	security	design	practices
• Evaluate	a	product’s	threat	resistance
• What	product	characteristics	minimize	opportunities	to	enter	and	change	the	
product’s	security	characteristics?
• Create	a	centralized	private	repositories	of	vetted	3rd party	components	for	
all		developers
• Establish	good	product	distribution	practices
• Recognize	that	supply	chain	risks	are	accumulated	
• Monitor	for	new	vulnerabilities	and	know	where	they	are	in	the	enterprise	to	fix
• Minimize	variation	of	components	to	make	things	easier	(multiple	versions,	
duplicated	utility)
November	15,	2016
• Development,	operations,	 teams	engineer	infrastructure	
and	application
• Operations	maintains	continuous	delivery	process
• Developers	write	and	push	code
• Continuous	integration	server	internally	deploys	code
• Docker run	/	VM	provision
• Build
• Test
• QA	team	evaluates	the	application	for	correctness
• Continuous	delivery	process	deploys	code	to	production	servers
• Operations	maintains	production	servers
Platform	Security	Overview
November	15,	2016
Platform	Security	Overview	with	Security	Highlights
• Development,	operations,	and	security	teams	engineer	
infrastructure	and	application
• Operations	maintains	continuous	delivery	process
• Developers	write	and	push	code
• Code	push	triggers	security	analysis	via	security	controller
• Continuous	integration	server	internally	deploys	code
• Docker run	/	VM	provision
• Build
• Test
• Automated	security	scan
• QA	team	evaluates	the	application	for	correctness
• Continuous	delivery	process	deploys	code	to	production	servers
• Operations	maintains	production	servers
November	15,	2016
Multi	Security Checkpoints
AppSec and	DevOps	- Integrating	Security	practices	into	DevOps
November	15,	2016
Dev
Lifecycle
November	15,	2016
Dev+Busines
Lifecycle
November	15,	2016
DevOps
Lifecycle
November	15,	2016
Where	are	opportunities	for	security
processes?
November	15,	2016
DevOps
Lifecycle
Threat	Modeling,		
Security	as	a	quality	attribute
November	15,	2016
DevOps
Lifecycle
Secure	/	hardened	
environments
November	15,	2016
DevOps
Lifecycle
Security-focused	code	review
November	15,	2016
DevOps
Lifecycle
Automated	Security	Testing	
(Static	analysis,	etc)
November	15,	2016
DevOps
Lifecycle
More	Security	Testing	(Pen	
Testing,	Fuzz	Testing)
November	15,	2016
DevOps
Lifecycle
Security	review	/	
acceptance	testing
November	15,	2016
Secure
DevOps
Lifecycle
November	15,	2016
Security	must	be	addressed	without	
breaking	the	rapid	delivery,	continuous	
feedback model
November	15,	2016
Secure
DevOps
Lifecycle
Devs
November	15,	2016
Secure
DevOps
Lifecycle
Devs
Constant	Feedback	to	Dev
November	15,	2016
Automation	(CI/CD)	and	Security
§ Not	everything	can	be,	needs	to	be,	or	should	be,	automated
§ Draw	perimeters	around	things	you	trust	and	let	that	guide	where	
human	interaction	and	verification	is	needed
§ Keep	track	of	security	assessments
§ Regimented	code	management
§ Know	what	source	code	contributed	to	a	build	that’s	in	
production	so	patches	are	fast	and	confident
§ Perform	manual	reviews		as	least	as	possible	(NOT	to	block	CD)
§ static	analysis	
§ (peer)	Code	review
§ Penn	testing	(or	any	security	testing	tools)
November	15,	2016
Post-Production	Monitoring		with	Security
Mindset
• Monitor	audit	logs	produced	by	CI/CD	for	
anomalies
• Monitor	production	applications	to	assure	
nothing	changes	outside	of	the	normal	change	
process
• Monitor	for	new	vulnerabilities	/	threats	(a	
catalog	of	running	components	helps!)
November	15,	2016
Multi	Security Checkpoints
Practical	Security	integration	Scenarios		CI/CD
November	15,	2016
Secure
DevOps
Lifecycle
• Pausing	for	manual	steps	is	
typical
• Optimize	the	manual	work!
• Persist	the	output	of	any	
tools	/	work
November	15,	2016
Scenario -1
November	15,	2016
Scenario -1
November	15,	2016
Scenario -2
November	15,	2016
Scenario -2
November	15,	2016
Scenario -3
November	15,	2016
Multi	Security Checkpoints
Demo
All	videos	are	in	SEI	YouTube	channel	
https://www.youtube.com/user/TheSEICMU/featured
Or	in	Secure	DevOps	section
https://www.youtube.com/playlist?list=PLSNlEg26NNpx3fYrfZokWuye9RVMCnCsc
November	15,	2016
Section (optional)
Picture
(optional)
More	on	SEI	DevOps	Blog
https://insights.sei.cmu.edu/devops
November	15,	2016
Contact	Information
Hasan	Yasar
Technical	Manager,	
Secure	Lifecycle	Solutions	
hyasar@sei.cmu.edu
@securelifecycle
Web	Resources	(CERT/SEI)
http://www.cert.org/
http://www.sei.cmu.edu/
November	15,	2016
November	15,	2016

Weitere ähnliche Inhalte

Mehr von Sonatype

The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
Sonatype
 
I, For One, Welcome Our New Robot Overlords
I, For One, Welcome Our New Robot OverlordsI, For One, Welcome Our New Robot Overlords
I, For One, Welcome Our New Robot Overlords
Sonatype
 

Mehr von Sonatype (20)

Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the Enterprise
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & Microservices
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen Beal
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way Forward
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward Ruiz
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris Swan
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin Collins
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with Jenkins
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure Automation
 
Continuous Everyone: Engaging People Across the Continuous Pipeline
Continuous Everyone: Engaging People Across the Continuous PipelineContinuous Everyone: Engaging People Across the Continuous Pipeline
Continuous Everyone: Engaging People Across the Continuous Pipeline
 
The Road to Continuous Deployment
The Road to Continuous Deployment The Road to Continuous Deployment
The Road to Continuous Deployment
 
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
 
I, For One, Welcome Our New Robot Overlords
I, For One, Welcome Our New Robot OverlordsI, For One, Welcome Our New Robot Overlords
I, For One, Welcome Our New Robot Overlords
 
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
 
Monitoring, Hold the Infrastructure
Monitoring, Hold the InfrastructureMonitoring, Hold the Infrastructure
Monitoring, Hold the Infrastructure
 

Kürzlich hochgeladen

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 

Multi Security Checkpoints on DevOps Platform