SlideShare ist ein Scribd-Unternehmen logo
1 von 82
Downloaden Sie, um offline zu lesen
DW4
DevOps Design & Architecture
6/7/2017 1:30:00 PM
DW4 Integrate Security into DevOps
Presented by:
Hasan Yasar
Software Engineering Institute
Brought to you by:
350 Corporate Way, Suite 400, Orange Park, FL 32073
888-­‐268-­‐8770 ·∙ 904-­‐278-­‐0524 - info@techwell.com - https://www.techwell.com/
Hasan Yasar
Software Engineering Institute
Hasan Yasar is the technical manager of the secure lifecycle solutions group at
the Software Engineering Institute (SEI). Hasan leads an engineering group tasked
with developing prototype solutions with associated DevOps processes while
providing expertise and guidance to SEI's clients. He has more than twenty-five
years' experience as senior security engineer, software architect, and manager in
all phases of secure software development. Hasan specializes in secure software
solutions design and development in the cyber security domain including data-
driven investigation and collaborative incident management, network security
assessment, and automated large-scale malware analysis. He is an adjunct faculty
member at CMU Heinz College and Institute of Software Research.
1
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213
Integrate Security into DevOps
Hasan Yasar
Technical Manager
CERT | Secure Lifecycle Solutions Group
2017
2
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Notices
Copyright 2017 Carnegie Mellon University. All Rights Reserved.
This material is based upon work funded and supported by the Department of Defense under Contract
No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering
Institute, a federally funded research and development center.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING
INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY
MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER
INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR
MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL.
CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH
RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited
distribution. Please see Copyright notice for non-US Government use and distribution.
This material may be reproduced in its entirety, without modification, and freely distributed in written or
electronic form without requesting formal permission. Permission is required for any other use. Requests
for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu.
Carnegie Mellon® and CERT® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon
University.
DM17-0273
3
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Agenda - Content
• DevOps p3
• DevOps and Security
• Platform Security
• AppSec - Secure DevOps
• DevOps Anti-Patterns
4
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Last Minute Security..
https://dzone.com/articles/last-minute-security-comic
5
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps p3
Integrate Security into DevOps
6
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
People
Heavy collaboration between all stakeholders
• Secure Design / Architecture decisions
• Secure Environment / Network configuration
• Secure Deployment planning
• Secure Code Review
Constantly available open communication channels:
• Dev and OpSec together in all project decision
meeting
• Chat/e-mail/Wiki services available to all team
members
7
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Process
Establish a process to enable people to succeed
using the platform to develop secure
application
Such that;
• Constant communication and visible to all
• Ensures that tasks are testable and
repeatable
• Frees up human experts to do challenging,
creative work
• Allows tasks to be performed with minimal
effort or cost
• Creates confidence in task success, after
past repetitions
• Faster deployment , frequent quality
release
8
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Platform
Where people use process to build
secure software
• Automated environment creation and
provisioning
• Automated infrastructure testing
• Parity between Development, QA, Staging,
and Production environments
• Sharing and versioning of environmental
configurations
• Collaborative environment between all
stakeholders
9
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
• Release configuration and release software (e.g., Puppet, Chef)
• Scripts and code used to release software (e.g., Python scripts)
• Servers, network or other infrastructure that support release tools
• Software and tools to support developer self-service operations
• External test frameworks (e.g., Jersey Test Framework)
• External operational monitoring and log mining tools (e.g., Splunk)
• Source code repositories (e.g., Git)
• Issue tracking systems (e.g., JIRA)
• Container driven tools (e.g., Docker)
• Rqmts mgmt. (Doors, Blueprint)
• Infrastructure and cloud providers
• IDEs integrated DevOps process
DevOps Pipeline Tool Landscape Complexity
(~180 tools)
Traceability(issuetracking)
Infrastructure
Version Control
Continous
Integration
Testing and
Metrics
RapidDeployment
Operations
Supports
10
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Engineering the Deployment Pipeline is a challenge
• If pipeline is not engineered, it may require extensive effort
integrate tools and share data across the pipeline
• Key questions related to designing the integrated pipeline
include:
- Who owns the integrated deployment pipeline?
- How/what to measure/monitor to assess pipeline health?
- What are the key qualities attributes teams should look
for as they select tools for pipeline integration?
• Whether designing or buying it is important to understand
the end-to-end requirements (e.g., workflow visibility)
11
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Integrated Pipeline Key Quality Attributes
Discussion Question: Which of these qualities do you think
might be important when selecting tools for the continuous
delivery pipeline?
• Integrate-ability
• Interoperability
• Usability
• Portability
• Resilience
• Security/Permissions
• Availability (Error handling)
• Scalability
• Performance
• Modifiability
• Configurability
• “Automate-ability” (of manual tasks)
• “Approvability” (allows for manual
approval)
• Measurability?
• Other?
12
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Integrated Pipeline - General
13
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Integrated Pipeline – With Tooling
14
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
15
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Human actions/inputs to
the software
development process
16
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Actions
performed by
autonomous
systems
17
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps and Security
Secure DevOps Process & Implementation
18
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps and Security
19
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps and Security
20
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Rugged{Secure}Dev{Sec}Ops
• DevOps is a Risk Mitigation strategy, built on Situational
Awareness, Automation, and Repetition
• But security is where a lot of DevOps implementations fall
down
• Goal:
• Protecting private user data
• Restricting access to data / systems
• Protecting company data / IP
• Standards compliance
• Safeguarding disposition / transition
21
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
The Rugged Manifesto
I am rugged and, more importantly, my code is rugged.
I recognize that software has become a foundation of our modern world.
I recognize the awesome responsibility that comes with this foundational role.
I recognize that my code will be used in ways I cannot anticipate, in ways it was
not designed, and for longer than it was ever intended.
I recognize that my code will be attacked by talented and persistent adversaries
who threaten our physical, economic and national security.
I recognize these things – and I choose to be rugged.
I am rugged because I refuse to be a source of vulnerability or weakness.
I am rugged because I assure my code will support its mission.
I am rugged because my code can face these challenges and persist in spite of
them.
I am rugged, not because it is easy, but because it is necessary and I am up for
the challenge.
22
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Rugged Continued …
Culture – NOT a tool, SDLC, or org structure
Rugged != Secure - secure is only an instant in time
Proactive security is better than reactive – Reactive
will fail eventually
23
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Team Composition
Developers
• Features
• Quality Attributes
• Efficiency
• Performance
• Users
• Authentication
• Authorization
IT Ops
• Deployment
• Maintenance
• Updates
• Change policy
• Failure
• Data loss
• Risk prevention
QA
• Testable
• Issue tracking
• Bug Reports
• Usability
• Help Desk
Security Team
• Data Privacy
• Intrusion
detection
• Threat vectors
• CVEs
• Package
security
• Authentication
• Authorization
• Security
Standards
Compliance
24
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps: Multiple Team Integrations
25
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps: Multiple Team Integrations + With Security
Team
26
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps: Multiple Team Integrations + With Security Team
27
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Platform Security in DevOps
Integrate Security into DevOps
28
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Deployment Pipeline & Dependencies
• Deployment Pipeline
• Development Environment
• Scripting/ Automation
• Integration and
configuration
• Build Servers
• Monitoring
• Code Repositories
• Container Security
• Supply Chain/Dependencies
• 3rd party libraries
• Vulnerability analysis
• Trusted sources
• Open source software
• Code Snippets
• Application ready
frameworks
29
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Evolution of software development
Custom development – context:
• Software was limited
 Size
 Function
 Audience
• Each organization employed developers
• Each organization created their own
software
Shared development – ISVs (COTS) –
context:
• Function largely understood
 Automating existing processes
• Grown beyond ability for using
organization to develop economically
• Outside of core competitiveness by
acquirers
Supply chain: practically none Supply chain: software supplier
30
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Development is now assembly
General
Ledger
SQL Server WebSphere
HTTP server
XML Parser
Oracle DB
SIP servlet
container
GIF library
Note: hypothetical application composition
Collective development – context:
• Too large for single
organization
• Too much specialization
• Too little value in individual
components
Supply chain: long
31
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Software supply chain for assembled software
Expanding the scope and complexity of acquisition and
deployment
Visibility and direct controls are limited (only in shaded area)
Source: “Scope of Supplier Expansion and Foreign Involvement”
graphic in DACS www.softwaretechnews.com Secure Software
Engineering, July 2005 article “Software Development Security: A
Risk Management Perspective” synopsis of May 2004 GAO-04-678
report “Defense Acquisition: Knowledge of Software Suppliers
Needed to Manage Risks”
32
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Substantial open source and 3rd party apps contained
in supply chain
• 90% of modern applications are
assembled from 3rd party components
• At least 75% of organizations rely on open source
as the foundation of their applications
• Most applications are now assembled
from hundreds of open source
components, often reflecting as much
as 90% of an application
Distributed development –
context:
• Amortize expense
• Outsource non-differential
features
• Lower acquisition (CapEx)
expense
Sources: Geer and Corman, “Almost Too Big To Fail,” ;login: (Usenix), Aug 2014; Sonatype, 2014 open source development and application security
survey
Supply chain: opaque
33
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Reducing the Supply Chain Risk
• Open source software usage policy
• Supplier resource management
• Apply policy and management through DevOps pipeline
• Automate and monitor dependencies management
• Track build and deploy decencies list
• Apply discovered(new) vulnerabilities and deployment process
• Continues training and monitoring developers activities
34
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Supply Chain Hygiene: Recommendations
• Supplier security commitment evidence
• Supplier employees are educated as to security engineering practices
• Supplier follows suitable security design practices
• Evaluate a product’s threat resistance
• What product characteristics minimize opportunities to enter and change the
product’s security characteristics?
• Create a centralized private repositories of vetted 3rd party components for all
developers
• Establish good product distribution practices
• Recognize that supply chain risks are accumulated
• Monitor for new vulnerabilities and know where they are in the enterprise to fix
• Minimize variation of components to make things easier (multiple versions,
duplicated utility)
35
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
AppSec and DevOps
Integrate Security into DevOps
36
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
37
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Microsoft Secure Development Lifecycle (SDL)
38
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Development Lifecycle
39
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Dev Lifecycle
+ Business
Enhancing the SDLC
40
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Enhancing the SDLC
41
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Where are opportunities for security processes?
42
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Threat Modeling,
Security as a quality attribute
Enhancing SDLC Security
43
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Secure / hardened
environments
Enhancing SDLC Security
44
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Security-focused code review
Enhancing SDLC Security
45
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Automated Security
Testing (Static analysis, etc)
Enhancing SDLC Security
46
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
More Security Testing (Pen
Testing, Fuzz Testing)
Enhancing SDLC Security
47
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Lifecycle
Security review /
acceptance testing
Enhancing SDLC Security
48
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Enhancing SDLC Security
Secure
DevOps Lifecycle
49
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Security must be addressed without breaking the
rapid delivery, continuous feedback model
50
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
51
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
52
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
53
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
54
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
55
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Enhancing SDLC Security
56
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Devs
Constant
Feedback to Dev
Enhancing SDLC Security
57
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
Enhancing SDLC Security
58
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Secure
DevOps
Lifecycle
• Pausing for
manual steps is
typical
• Optimize the
manual work!
• Persist the
output of any
tools / work
Enhancing SDLC Security
59
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Post-Production Monitoring
• Monitor audit logs produced by CI/CD for anomalies
• Monitor production applications to assure nothing changes
outside of the normal change process
• Monitor for new vulnerabilities / threats (a catalog of running
components helps!)
60
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Automation (CI/CD) and Security
Not everything can be, needs to be, or should be, automated
• Draw perimeters around things you trust and let that guide
where human interaction and verification is needed
Keep track of security assessments
Regimented code management
• Know what source code contributed to a build that’s in
production so patches are fast and confident
Perform static analysis where possible
61
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Security Overview
Development, operations, teams engineer infrastructure and
application
Operations maintains continuous delivery process
Developers write and push code
Continuous integration server internally deploys code
• Docker run / VM provision
• Build
• Test
QA team evaluates the application for correctness
Continuous delivery process deploys code to production servers
Operations maintains production servers
62
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Security Overview with Security Highlights
Development, operations, and security teams engineer infrastructure and
application
Operations maintains continuous delivery process
Developers write and push code
Continuous integration server internally deploys code
• Docker run / VM provision
• Build
• Test
QA team evaluates the application for correctness
Continuous delivery process deploys code to production servers
Operations maintains production servers
63
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Security Overview with Security Highlights
Development, operations, and security teams engineer infrastructure and
application
Operations maintains continuous delivery process
Developers write and push code
Code push triggers security analysis via security controller
Continuous integration server internally deploys code
• Docker run / VM provision
• Build
• Test
QA team evaluates the application for correctness
Continuous delivery process deploys code to production servers
Operations maintains production servers
64
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Security Overview with Security Highlights
Development, operations, and security teams engineer infrastructure and
application
Operations maintains continuous delivery process
Developers write and push code
Code push triggers security analysis via security controller
Continuous integration server internally deploys code
• Docker run / VM provision
• Build
• Test
• Automated security scan
QA team evaluates the application for correctness
Continuous delivery process deploys code to production servers
Operations maintains production servers
65
Secure DevOps Process & Implementation
© 2017 Carnegie Mellon University
[Distribution Statement A] This material has been approved for public release and unlimited
distribution. Please see Copyright notice for non-US Government use and distribution.
Secure DevOps Anti-Patterns
Integrate Security into DevOps
66
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: TheException-1
You automate…
…builds
…functional tests
…deployment
…reporting
…the coffee machine
67
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: TheException-2
But security testing is still
manual pen testing,
done only on release.
Recommendations:
• Don’t leave security automation out of your DevOps automation
strategy
- Automated security testing removes human error, infrequent,
execution, and excuses
• Don’t try to avoid open source with policies, it is coming whether you
like it or not!
• InfoSec must maintain awareness of open source vulnerabilities and
continuously check for them
68
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: TheException-3
OWASP ZAP
https://www.owasp.org/index.php/OWAS
P_Zed_Attack_Proxy_Project
http://gauntlt.org/
GAUNTLT
BE MEAN TO YOUR CODE AND LIKE IT
There are great projects out there…
69
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Multiverse
When environments are not the same,
your app may never
behave predictably.
Environment parity (between dev, test, prod) is critical for
controlling opportunity for security gaps
70
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Multiverse
Recommendations:
• Automate manual steps to the extent possible
• Make development environment parity a priority
• Get Ops involved in creating all environments, including
Dev
• Focus on providing fast easy-to-use automation tools for
developers everyone to keep environments in synch
71
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Configurator
• Uncontrolled configuration changes will
lead to an unmanageable, unpredictable,
and unrepeatable solution
• Easy for info security to get out of synch;
For example, change in DNS and you
have security hole.
Recommendations:
• Avoid the manual quick fix particularly for
configuration changes
• Put configuration files under configuration
controls
72
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Infiltrator
He sneaks in…
…and alters production …but he works
for you!
Recommendations:
• Set up roles and revoke administrative
access to manually edit production
• Configure prod environment to alert the
entire team when manually accessed.
Transparency is key.
73
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Survivor
We have all been there…
Intrusions overnight…
…cascading system failures…
…it’s all crashing…
…help…me..…
74
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Survivor-2
But you survive…
Glad its over. Going to go sleep for 18 hours…and then back to the
normal cycle.
When do we analyze what went wrong?
How do we prevent similar failures in the future?
All failures must result in codified change to DevOps process
Recommendations:
• Understand exactly what went wrong
• Never let the same failure happen twice
• Propagate fixes across the enterprise
• Ensure that you teach the next generation
75
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: College Party
99% of Global 2000 companies will be using open source code in
mission-critical apps by 2016
Do you know
what’s in your app?
Code we wrote
Code someone
else wrote
76
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: College Party-2
Recommendations:
• Infosec must enable constant (read: automated) checking for
open source vulnerabilities
Ways to fail:
• Place infosec outside of the dev workflow
• When UI/UX, infosec and accessibility requirements conflict
and never get resolved
• Dictate policy to not use open source
• Document-driven checking is not going catch
Prepare for what is coming….
77
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
DevOps Security Anti-Pattern: Skydiver
Once you jump, you can’t return to the plane.
You are committed. Permanently.
This is not how we should model our
deployments
Recommendations:
• Rollback is essential; Never be left
without an escape route to completely
working software
• Strive for approaches that support “one
button” rollback (e.g, feature flags or A/B)
78
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
SLS team GitHub Projects
• Once Click DevOps deployment
https://github.com/SLS-ALL/devops-voltron
• Sample app with DevOps Process
https://github.com/SLS-ALL/flask_api_sample
• Tagged checkpoints
• v0.1.0: base Flask project
• v0.2.0: Vagrant development configuration
• v0.3.0: Test environment and Fabric deployment
• v0.4.0: Upstart services, external configuration files
• v0.5.0: Production environment
• On YouTube:
https://www.youtube.com/watch?v=5nQlJ-FWA5A
79
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
For more information…
SEI DevOps Blog
https://insights.sei.cmu.edu/devops
80
Integrate Security into DevOps
June 7th 2017
© 2017 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
Contact Information
Hasan Yasar
Technical Manager,
Secure Lifecycle Solutions
hyasar@sei.cmu.edu
@securelifecycle
Web Resources (CERT/SEI)
http://www.cert.org/
http://www.sei.cmu.edu/

Weitere ähnliche Inhalte

Was ist angesagt?

Zero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsZero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsDevSecOps Days
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOpsSetu Parimi
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018Sonatype
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityKevin Fealey
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSAChris Downey
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introductionStefan Streichsbier
 
DevSecOps: essential tooling to enable continuous security 2019-09-16
DevSecOps: essential tooling to enable continuous security 2019-09-16DevSecOps: essential tooling to enable continuous security 2019-09-16
DevSecOps: essential tooling to enable continuous security 2019-09-16Rich Mills
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Erkang Zheng
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudBlack Duck by Synopsys
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...Mohamed Nizzad
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsDeborah Schalm
 
Microsoft DevOps Forum 2021 – DevOps & Security
 Microsoft DevOps Forum 2021 – DevOps & Security Microsoft DevOps Forum 2021 – DevOps & Security
Microsoft DevOps Forum 2021 – DevOps & SecurityNico Meisenzahl
 

Was ist angesagt? (20)

Zero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsZero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOps
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just Security
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introduction
 
DevSecOps: essential tooling to enable continuous security 2019-09-16
DevSecOps: essential tooling to enable continuous security 2019-09-16DevSecOps: essential tooling to enable continuous security 2019-09-16
DevSecOps: essential tooling to enable continuous security 2019-09-16
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
Microsoft DevOps Forum 2021 – DevOps & Security
 Microsoft DevOps Forum 2021 – DevOps & Security Microsoft DevOps Forum 2021 – DevOps & Security
Microsoft DevOps Forum 2021 – DevOps & Security
 

Ähnlich wie Integrate Security into DevOps

Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsTechWell
 
170330 cognitive systems institute speaker series mark sherman - watson pr...
170330 cognitive systems institute speaker series    mark sherman - watson pr...170330 cognitive systems institute speaker series    mark sherman - watson pr...
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through EducationGrant Ongers
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!TechWell
 
Mobile Applications Testing: From Concepts to Practice
Mobile Applications Testing: From Concepts to PracticeMobile Applications Testing: From Concepts to Practice
Mobile Applications Testing: From Concepts to PracticeTechWell
 
Implementing policy @ WSSSPE
Implementing policy @ WSSSPEImplementing policy @ WSSSPE
Implementing policy @ WSSSPEDaisie Huang
 
12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready SolutionsKashif Ali Siddiqui
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesDevOps.com
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesDeborah Schalm
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycleEnov8
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxUsamaAli119043
 
Enabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOpsEnabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOpsJosh Boyd
 
Choosing the Right Framework for Your Web Development Project.pdf
Choosing the Right Framework for Your Web Development Project.pdfChoosing the Right Framework for Your Web Development Project.pdf
Choosing the Right Framework for Your Web Development Project.pdfMPIRIC Software
 
The Journey to DevOps #MFSummit2017
The Journey to DevOps #MFSummit2017The Journey to DevOps #MFSummit2017
The Journey to DevOps #MFSummit2017Micro Focus
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...NowSecure
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017Madhu Akula
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNowSecure
 

Ähnlich wie Integrate Security into DevOps (20)

Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOps
 
170330 cognitive systems institute speaker series mark sherman - watson pr...
170330 cognitive systems institute speaker series    mark sherman - watson pr...170330 cognitive systems institute speaker series    mark sherman - watson pr...
170330 cognitive systems institute speaker series mark sherman - watson pr...
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!
 
Mobile Applications Testing: From Concepts to Practice
Mobile Applications Testing: From Concepts to PracticeMobile Applications Testing: From Concepts to Practice
Mobile Applications Testing: From Concepts to Practice
 
Implementing policy @ WSSSPE
Implementing policy @ WSSSPEImplementing policy @ WSSSPE
Implementing policy @ WSSSPE
 
12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions
 
USTGlobal madrid devops
USTGlobal madrid devopsUSTGlobal madrid devops
USTGlobal madrid devops
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptx
 
Enabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOpsEnabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOps
 
Choosing the Right Framework for Your Web Development Project.pdf
Choosing the Right Framework for Your Web Development Project.pdfChoosing the Right Framework for Your Web Development Project.pdf
Choosing the Right Framework for Your Web Development Project.pdf
 
The Journey to DevOps #MFSummit2017
The Journey to DevOps #MFSummit2017The Journey to DevOps #MFSummit2017
The Journey to DevOps #MFSummit2017
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 

Mehr von TechWell

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and RecoveringTechWell
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization TechWell
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTechWell
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartTechWell
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyTechWell
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTechWell
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowTechWell
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityTechWell
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyTechWell
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTechWell
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipTechWell
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsTechWell
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GameTechWell
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsTechWell
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationTechWell
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessTechWell
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateTechWell
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessTechWell
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTechWell
 

Mehr von TechWell (20)

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and Recovering
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build Architecture
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good Start
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test Strategy
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for Success
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlow
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your Sanity
 
Ma 15
Ma 15Ma 15
Ma 15
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps Strategy
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOps
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—Leadership
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile Teams
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile Game
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps Implementation
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery Process
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to Automate
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for Success
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile Transformation
 

Kürzlich hochgeladen

Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxSasikiranMarri
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...kalichargn70th171
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfkalichargn70th171
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxRTS corp
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 

Kürzlich hochgeladen (20)

Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptx
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 

Integrate Security into DevOps

  • 1. DW4 DevOps Design & Architecture 6/7/2017 1:30:00 PM DW4 Integrate Security into DevOps Presented by: Hasan Yasar Software Engineering Institute Brought to you by: 350 Corporate Way, Suite 400, Orange Park, FL 32073 888-­‐268-­‐8770 ·∙ 904-­‐278-­‐0524 - info@techwell.com - https://www.techwell.com/
  • 2. Hasan Yasar Software Engineering Institute Hasan Yasar is the technical manager of the secure lifecycle solutions group at the Software Engineering Institute (SEI). Hasan leads an engineering group tasked with developing prototype solutions with associated DevOps processes while providing expertise and guidance to SEI's clients. He has more than twenty-five years' experience as senior security engineer, software architect, and manager in all phases of secure software development. Hasan specializes in secure software solutions design and development in the cyber security domain including data- driven investigation and collaborative incident management, network security assessment, and automated large-scale malware analysis. He is an adjunct faculty member at CMU Heinz College and Institute of Software Research.
  • 3. 1 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Integrate Security into DevOps Hasan Yasar Technical Manager CERT | Secure Lifecycle Solutions Group 2017
  • 4. 2 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Notices Copyright 2017 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. Carnegie Mellon® and CERT® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM17-0273
  • 5. 3 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Agenda - Content • DevOps p3 • DevOps and Security • Platform Security • AppSec - Secure DevOps • DevOps Anti-Patterns
  • 6. 4 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Last Minute Security.. https://dzone.com/articles/last-minute-security-comic
  • 7. 5 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps p3 Integrate Security into DevOps
  • 8. 6 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. People Heavy collaboration between all stakeholders • Secure Design / Architecture decisions • Secure Environment / Network configuration • Secure Deployment planning • Secure Code Review Constantly available open communication channels: • Dev and OpSec together in all project decision meeting • Chat/e-mail/Wiki services available to all team members
  • 9. 7 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Process Establish a process to enable people to succeed using the platform to develop secure application Such that; • Constant communication and visible to all • Ensures that tasks are testable and repeatable • Frees up human experts to do challenging, creative work • Allows tasks to be performed with minimal effort or cost • Creates confidence in task success, after past repetitions • Faster deployment , frequent quality release
  • 10. 8 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Platform Where people use process to build secure software • Automated environment creation and provisioning • Automated infrastructure testing • Parity between Development, QA, Staging, and Production environments • Sharing and versioning of environmental configurations • Collaborative environment between all stakeholders
  • 11. 9 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. • Release configuration and release software (e.g., Puppet, Chef) • Scripts and code used to release software (e.g., Python scripts) • Servers, network or other infrastructure that support release tools • Software and tools to support developer self-service operations • External test frameworks (e.g., Jersey Test Framework) • External operational monitoring and log mining tools (e.g., Splunk) • Source code repositories (e.g., Git) • Issue tracking systems (e.g., JIRA) • Container driven tools (e.g., Docker) • Rqmts mgmt. (Doors, Blueprint) • Infrastructure and cloud providers • IDEs integrated DevOps process DevOps Pipeline Tool Landscape Complexity (~180 tools) Traceability(issuetracking) Infrastructure Version Control Continous Integration Testing and Metrics RapidDeployment Operations Supports
  • 12. 10 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Engineering the Deployment Pipeline is a challenge • If pipeline is not engineered, it may require extensive effort integrate tools and share data across the pipeline • Key questions related to designing the integrated pipeline include: - Who owns the integrated deployment pipeline? - How/what to measure/monitor to assess pipeline health? - What are the key qualities attributes teams should look for as they select tools for pipeline integration? • Whether designing or buying it is important to understand the end-to-end requirements (e.g., workflow visibility)
  • 13. 11 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Integrated Pipeline Key Quality Attributes Discussion Question: Which of these qualities do you think might be important when selecting tools for the continuous delivery pipeline? • Integrate-ability • Interoperability • Usability • Portability • Resilience • Security/Permissions • Availability (Error handling) • Scalability • Performance • Modifiability • Configurability • “Automate-ability” (of manual tasks) • “Approvability” (allows for manual approval) • Measurability? • Other?
  • 14. 12 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Integrated Pipeline - General
  • 15. 13 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Integrated Pipeline – With Tooling
  • 16. 14 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
  • 17. 15 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Human actions/inputs to the software development process
  • 18. 16 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Actions performed by autonomous systems
  • 19. 17 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps and Security Secure DevOps Process & Implementation
  • 20. 18 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps and Security
  • 21. 19 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps and Security
  • 22. 20 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Rugged{Secure}Dev{Sec}Ops • DevOps is a Risk Mitigation strategy, built on Situational Awareness, Automation, and Repetition • But security is where a lot of DevOps implementations fall down • Goal: • Protecting private user data • Restricting access to data / systems • Protecting company data / IP • Standards compliance • Safeguarding disposition / transition
  • 23. 21 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. The Rugged Manifesto I am rugged and, more importantly, my code is rugged. I recognize that software has become a foundation of our modern world. I recognize the awesome responsibility that comes with this foundational role. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended. I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security. I recognize these things – and I choose to be rugged. I am rugged because I refuse to be a source of vulnerability or weakness. I am rugged because I assure my code will support its mission. I am rugged because my code can face these challenges and persist in spite of them. I am rugged, not because it is easy, but because it is necessary and I am up for the challenge.
  • 24. 22 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Rugged Continued … Culture – NOT a tool, SDLC, or org structure Rugged != Secure - secure is only an instant in time Proactive security is better than reactive – Reactive will fail eventually
  • 25. 23 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Team Composition Developers • Features • Quality Attributes • Efficiency • Performance • Users • Authentication • Authorization IT Ops • Deployment • Maintenance • Updates • Change policy • Failure • Data loss • Risk prevention QA • Testable • Issue tracking • Bug Reports • Usability • Help Desk Security Team • Data Privacy • Intrusion detection • Threat vectors • CVEs • Package security • Authentication • Authorization • Security Standards Compliance
  • 26. 24 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps: Multiple Team Integrations
  • 27. 25 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps: Multiple Team Integrations + With Security Team
  • 28. 26 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps: Multiple Team Integrations + With Security Team
  • 29. 27 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Platform Security in DevOps Integrate Security into DevOps
  • 30. 28 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Deployment Pipeline & Dependencies • Deployment Pipeline • Development Environment • Scripting/ Automation • Integration and configuration • Build Servers • Monitoring • Code Repositories • Container Security • Supply Chain/Dependencies • 3rd party libraries • Vulnerability analysis • Trusted sources • Open source software • Code Snippets • Application ready frameworks
  • 31. 29 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Evolution of software development Custom development – context: • Software was limited  Size  Function  Audience • Each organization employed developers • Each organization created their own software Shared development – ISVs (COTS) – context: • Function largely understood  Automating existing processes • Grown beyond ability for using organization to develop economically • Outside of core competitiveness by acquirers Supply chain: practically none Supply chain: software supplier
  • 32. 30 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Development is now assembly General Ledger SQL Server WebSphere HTTP server XML Parser Oracle DB SIP servlet container GIF library Note: hypothetical application composition Collective development – context: • Too large for single organization • Too much specialization • Too little value in individual components Supply chain: long
  • 33. 31 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Software supply chain for assembled software Expanding the scope and complexity of acquisition and deployment Visibility and direct controls are limited (only in shaded area) Source: “Scope of Supplier Expansion and Foreign Involvement” graphic in DACS www.softwaretechnews.com Secure Software Engineering, July 2005 article “Software Development Security: A Risk Management Perspective” synopsis of May 2004 GAO-04-678 report “Defense Acquisition: Knowledge of Software Suppliers Needed to Manage Risks”
  • 34. 32 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Substantial open source and 3rd party apps contained in supply chain • 90% of modern applications are assembled from 3rd party components • At least 75% of organizations rely on open source as the foundation of their applications • Most applications are now assembled from hundreds of open source components, often reflecting as much as 90% of an application Distributed development – context: • Amortize expense • Outsource non-differential features • Lower acquisition (CapEx) expense Sources: Geer and Corman, “Almost Too Big To Fail,” ;login: (Usenix), Aug 2014; Sonatype, 2014 open source development and application security survey Supply chain: opaque
  • 35. 33 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Reducing the Supply Chain Risk • Open source software usage policy • Supplier resource management • Apply policy and management through DevOps pipeline • Automate and monitor dependencies management • Track build and deploy decencies list • Apply discovered(new) vulnerabilities and deployment process • Continues training and monitoring developers activities
  • 36. 34 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Supply Chain Hygiene: Recommendations • Supplier security commitment evidence • Supplier employees are educated as to security engineering practices • Supplier follows suitable security design practices • Evaluate a product’s threat resistance • What product characteristics minimize opportunities to enter and change the product’s security characteristics? • Create a centralized private repositories of vetted 3rd party components for all developers • Establish good product distribution practices • Recognize that supply chain risks are accumulated • Monitor for new vulnerabilities and know where they are in the enterprise to fix • Minimize variation of components to make things easier (multiple versions, duplicated utility)
  • 37. 35 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. AppSec and DevOps Integrate Security into DevOps
  • 38. 36 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution.
  • 39. 37 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Microsoft Secure Development Lifecycle (SDL)
  • 40. 38 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Development Lifecycle
  • 41. 39 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Dev Lifecycle + Business Enhancing the SDLC
  • 42. 40 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Enhancing the SDLC
  • 43. 41 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Where are opportunities for security processes?
  • 44. 42 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Threat Modeling, Security as a quality attribute Enhancing SDLC Security
  • 45. 43 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Secure / hardened environments Enhancing SDLC Security
  • 46. 44 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Security-focused code review Enhancing SDLC Security
  • 47. 45 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Automated Security Testing (Static analysis, etc) Enhancing SDLC Security
  • 48. 46 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle More Security Testing (Pen Testing, Fuzz Testing) Enhancing SDLC Security
  • 49. 47 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Lifecycle Security review / acceptance testing Enhancing SDLC Security
  • 50. 48 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Enhancing SDLC Security Secure DevOps Lifecycle
  • 51. 49 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Security must be addressed without breaking the rapid delivery, continuous feedback model
  • 52. 50 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 53. 51 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 54. 52 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 55. 53 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 56. 54 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 57. 55 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Enhancing SDLC Security
  • 58. 56 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Devs Constant Feedback to Dev Enhancing SDLC Security
  • 59. 57 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle Enhancing SDLC Security
  • 60. 58 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Secure DevOps Lifecycle • Pausing for manual steps is typical • Optimize the manual work! • Persist the output of any tools / work Enhancing SDLC Security
  • 61. 59 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Post-Production Monitoring • Monitor audit logs produced by CI/CD for anomalies • Monitor production applications to assure nothing changes outside of the normal change process • Monitor for new vulnerabilities / threats (a catalog of running components helps!)
  • 62. 60 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Automation (CI/CD) and Security Not everything can be, needs to be, or should be, automated • Draw perimeters around things you trust and let that guide where human interaction and verification is needed Keep track of security assessments Regimented code management • Know what source code contributed to a build that’s in production so patches are fast and confident Perform static analysis where possible
  • 63. 61 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Security Overview Development, operations, teams engineer infrastructure and application Operations maintains continuous delivery process Developers write and push code Continuous integration server internally deploys code • Docker run / VM provision • Build • Test QA team evaluates the application for correctness Continuous delivery process deploys code to production servers Operations maintains production servers
  • 64. 62 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Security Overview with Security Highlights Development, operations, and security teams engineer infrastructure and application Operations maintains continuous delivery process Developers write and push code Continuous integration server internally deploys code • Docker run / VM provision • Build • Test QA team evaluates the application for correctness Continuous delivery process deploys code to production servers Operations maintains production servers
  • 65. 63 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Security Overview with Security Highlights Development, operations, and security teams engineer infrastructure and application Operations maintains continuous delivery process Developers write and push code Code push triggers security analysis via security controller Continuous integration server internally deploys code • Docker run / VM provision • Build • Test QA team evaluates the application for correctness Continuous delivery process deploys code to production servers Operations maintains production servers
  • 66. 64 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Security Overview with Security Highlights Development, operations, and security teams engineer infrastructure and application Operations maintains continuous delivery process Developers write and push code Code push triggers security analysis via security controller Continuous integration server internally deploys code • Docker run / VM provision • Build • Test • Automated security scan QA team evaluates the application for correctness Continuous delivery process deploys code to production servers Operations maintains production servers
  • 67. 65 Secure DevOps Process & Implementation © 2017 Carnegie Mellon University [Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. Secure DevOps Anti-Patterns Integrate Security into DevOps
  • 68. 66 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: TheException-1 You automate… …builds …functional tests …deployment …reporting …the coffee machine
  • 69. 67 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: TheException-2 But security testing is still manual pen testing, done only on release. Recommendations: • Don’t leave security automation out of your DevOps automation strategy - Automated security testing removes human error, infrequent, execution, and excuses • Don’t try to avoid open source with policies, it is coming whether you like it or not! • InfoSec must maintain awareness of open source vulnerabilities and continuously check for them
  • 70. 68 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: TheException-3 OWASP ZAP https://www.owasp.org/index.php/OWAS P_Zed_Attack_Proxy_Project http://gauntlt.org/ GAUNTLT BE MEAN TO YOUR CODE AND LIKE IT There are great projects out there…
  • 71. 69 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Multiverse When environments are not the same, your app may never behave predictably. Environment parity (between dev, test, prod) is critical for controlling opportunity for security gaps
  • 72. 70 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Multiverse Recommendations: • Automate manual steps to the extent possible • Make development environment parity a priority • Get Ops involved in creating all environments, including Dev • Focus on providing fast easy-to-use automation tools for developers everyone to keep environments in synch
  • 73. 71 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Configurator • Uncontrolled configuration changes will lead to an unmanageable, unpredictable, and unrepeatable solution • Easy for info security to get out of synch; For example, change in DNS and you have security hole. Recommendations: • Avoid the manual quick fix particularly for configuration changes • Put configuration files under configuration controls
  • 74. 72 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Infiltrator He sneaks in… …and alters production …but he works for you! Recommendations: • Set up roles and revoke administrative access to manually edit production • Configure prod environment to alert the entire team when manually accessed. Transparency is key.
  • 75. 73 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Survivor We have all been there… Intrusions overnight… …cascading system failures… …it’s all crashing… …help…me..…
  • 76. 74 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Survivor-2 But you survive… Glad its over. Going to go sleep for 18 hours…and then back to the normal cycle. When do we analyze what went wrong? How do we prevent similar failures in the future? All failures must result in codified change to DevOps process Recommendations: • Understand exactly what went wrong • Never let the same failure happen twice • Propagate fixes across the enterprise • Ensure that you teach the next generation
  • 77. 75 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: College Party 99% of Global 2000 companies will be using open source code in mission-critical apps by 2016 Do you know what’s in your app? Code we wrote Code someone else wrote
  • 78. 76 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: College Party-2 Recommendations: • Infosec must enable constant (read: automated) checking for open source vulnerabilities Ways to fail: • Place infosec outside of the dev workflow • When UI/UX, infosec and accessibility requirements conflict and never get resolved • Dictate policy to not use open source • Document-driven checking is not going catch Prepare for what is coming….
  • 79. 77 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. DevOps Security Anti-Pattern: Skydiver Once you jump, you can’t return to the plane. You are committed. Permanently. This is not how we should model our deployments Recommendations: • Rollback is essential; Never be left without an escape route to completely working software • Strive for approaches that support “one button” rollback (e.g, feature flags or A/B)
  • 80. 78 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. SLS team GitHub Projects • Once Click DevOps deployment https://github.com/SLS-ALL/devops-voltron • Sample app with DevOps Process https://github.com/SLS-ALL/flask_api_sample • Tagged checkpoints • v0.1.0: base Flask project • v0.2.0: Vagrant development configuration • v0.3.0: Test environment and Fabric deployment • v0.4.0: Upstart services, external configuration files • v0.5.0: Production environment • On YouTube: https://www.youtube.com/watch?v=5nQlJ-FWA5A
  • 81. 79 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. For more information… SEI DevOps Blog https://insights.sei.cmu.edu/devops
  • 82. 80 Integrate Security into DevOps June 7th 2017 © 2017 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimiteddistribution. Please see Copyright notice for non-US Governmentuse and distribution. Contact Information Hasan Yasar Technical Manager, Secure Lifecycle Solutions hyasar@sei.cmu.edu @securelifecycle Web Resources (CERT/SEI) http://www.cert.org/ http://www.sei.cmu.edu/