This document discusses how cloud computing, hybrid architectures, and agile IT delivery are transforming infrastructure and application delivery. It notes that traditional, static IT approaches are being replaced by more dynamic, automated approaches enabled by cloud, software-defined data centers, and DevOps practices. This brings challenges for security, which must also become more dynamic, automated, and integrated with development workflows. The document introduces CloudPassage Halo as a security platform designed for these new approaches, with capabilities like vulnerability monitoring, integrity monitoring, and policy-based controls that can scale across cloud and data center infrastructure.
11. Transformation of Application Delivery
Jan DecFeb Mar Apr May Jun Jul Aug Sep Oct Nov
Q1 Q2 Q3 Q4
Mon Tue Wed Thu Fri Sat Sun
November
Plan Code DeployTest/QA
Waterfall (Mode 1) DevOps (Mode 2)
• 9-12 month cycle time
• Very large release size
• Manual deployment
• 1-day cycle time
• Frequent, small changes
• Automated deployment
13. Source: Puppet Labs 2016 State of DevOps Report
Speed Resilience Quality Efficiency
200x 24x 3x 2,555x
200x more
frequent
deployments
24x faster
recovery from
failures
3x lower
change failure
rate
2,555x shorter
lead times
Security
2x less time
on security
remediation
2x
Transformation of Application Delivery
200x more
frequent deployments
18. Release Process
Plan Code Build Test Release Deploy Operate
Agile Development
Continuous Integration
Continuous Delivery
DevOps
Value
Continuous Deployment
OpsDev
Collaboration
21. Yay! Security Guardrails!
Re-align Security To Modern IT Delivery
Plan Code Build Test Release Deploy Operate
• Plan – Define security policy and benchmarks for each type of workload
• Build & Test – Catch vulnerability & configuration issues, generate baselines
• Deploy – Apply production policies to systems automatically
• Operate – Continuously feed SecOps and Audit & Compliance systems
22. Re-align Security To Modern IT Delivery
• On-demand, self-service
• Automated, rapid expansion
• Measured or metered service
• Ubiquitous, convenient access
• Resource pooled grid
• Highly scalable
• Design-pattern based
• On-demand, Security-as-a-Service
• Automated, rapid expansion
• Metered licensing
• Ubiquitous, convenient access
• Resource pooled grid
• Highly scalable
• Design-pattern based
Agile IT Delivery Agile Security Delivery