SlideShare ist ein Scribd-Unternehmen logo
1 von 20
DEVSECOPS
PRESENTED BY:
VIPIN
ROLL NO.
200011029019
MCA 2ND SEM
SUBMITTED TO:
MR. SUDHIR
(ASSISTANT
PROFESSOR)
CONTENTS
• INTRODUCTION
• WHY WE NEED DEVSECOPS
• HOW DOES IT WORK
• IMPORTANCE OF DEVSECOPS
• DEVSECOPS PRACTICES
• PROS OF DEVSECOPS
• CONS OF DEVSECOPS
• LIMITATION OF DEVSECOPS
INTRODUCTION
● DevSecOps stands for development, security, and operations. It is about
implementing the security right from the initial stage of the application
development until the final product delivery.
● Its purpose is to ensure that every security breach is addressed and
vulnerabilities are reduced. During the process, everybody is accountable
for the security and actions from the developer to the operation
department. Whereas in the traditional practice, security was the least
concern of each department.
● Every organization that has DevOps should shift its gears towards the
DevSecOps to get a higher level of proficiency and more secure application
development experience. Instead of rushing at the last moment of a
hazardous situation, DevSecOps ensures security at each level of
development.
WHY WE NEED DEVSECOPS?
• Every day we come up with the news of data breaching and hacking. Is there
any loophole in the application development ? don’t we have any established
laws against these breachers ? answer to these questions is a big yes.
• A security breach can results in loss of billions, even trillions of personal
records, confidential information, and overall effects on the business. The
traditional methodology for development is outdated in this tech-savy world.
• Today, where countless applications are created and uploaded on the webstore,
a security breach is a prime concern for businesses and application developers.
To cope with this critical security crises, devsecops is the savior.
EXAMPLE OF DATA BREACH
AADHAAR DATA BREACH :
• Date: march 2018
• Impact: 1.1 billion people
• In march of 2018, it became public that the personal information of more than a
billion indian citizens stored in the world’s largest biometric database could be
bought online.
• This massive data breach was the result of a data leak on a system run by a
state-owned utility company. The breach allowed access to private information
of aadhaar holders, exposing their names, their unique 12-digit identity
numbers, and their bank details.
• The type of information exposed included the photographs, thumbprints, retina
scans and other identifying details of nearly every indian citizen.
HOW DOES IT WORK?
• In the first step, a code is created in the version control
management system by a developer.
• All changes are seen and done in the same system,
• After that, another developer takes the code from the same
system, analyzes it, and identifies bugs or security breach in the
code,
• Once the developer rectify the error, the environment is created
using infrastructure as the tool,
• Next step is the deployment of the application, here test data
automation is carried out including security test, UI, integration &
API,
• Once the application clears these test, it is suitable for the
production step,
• Even under the production environment, continuously monitoring
is done to identify and rectify security threats.
IMPORTANCE OF DEVSECOPS
• The last decade was very crucial and progressive for the IT
industry as it has witnessed substantial growth in the terms of
cloud computing, storage, and new applications. however, with
the entry of DevOps, the speed and functionality took the industry
to the next level of success.
• but the only concern of DevOps was its security inefficiency. due
to this reason, DevSecOps is welcomed warmly. it caters to the
need for speed, functionality, security, and scale under a single
umbrella.
SOME OF DEVSECOPS PRACTICES
With the implementation of DevSecOps, the resources will be utilized in a better
and efficient way. Here are some practices that help in operating things in a
smooth way:
• 1. SAFE AND SECURE CODING:
• It is very important and necessary to practice safe and secure
software development to cut down the high risk of vulnerabilities.
Unsecure coding is a threat to the breach of confidential
information. Hire the service of a highly experienced and skilled
developer to avoid high risk.
• 2. IMPLEMENT AUTOMATION:
• Automation is the key factor for the secure and safe development
of an application. Embed the automation with continuous
integration and deployment environment to match the speed of
your security with the process. It becomes necessary for a larger
organization where varied versions of code are pushed in the
production environment for multiple times.
• 3. IMPLEMENTATION FROM THE BEGINNING:
• Implement security from the first stage of application development. Till
now, we have understood why it is necessary to implement a security
check from the beginning. This practice may take time, but in the long
run, it is handy and safest way for risk-free application development.
• 4. PEOPLE + TECHNOLOGY + PROCESS = RISK FREE
• The major role for the success of DevSecOps is played by the perfect
trio of people, technology, and process. Convincing people about the
shift from traditional methods to DevSecOps may need lots of effort, but
the result will be worth of those efforts made by you. Just after
convincing people, frame a common process to strengthen the security
aim. After the merger of people and process, next comes is technology.
With practices like automated compliance scan, confirmation
management, host hardening, and others devsecops, the aim for the
secured and safe application is not far.
PROS OF DEVSECOPS
• While there’s no full guarantee that a software product will be free from all possible
malicious attacks, DevSecOps can ensure that an application is pretty stable and less
vulnerable, upon release or off the shelf. This new approach to software creation is
beneficial due to the following reasons:
• 1. ENHANCES COLLABORATION AND COMMUNICATION BETWEEN ALL TEAMS
• The DevSecOps method encourages IT professionals with different skills to
collaborate and work together to achieve one goal. Team integration is one of the
main objectives of DevSecOps.
• 2. INCREASES THE SPEED AND AGILITY OF DEVELOPMENT TEAMS
• The nature of this approach pushes DevSecOps team members to react fast, as well
as review and correct vulnerabilities and other software problems as the
development process is ongoing.
• 3. PROMOTES BETTER QUALITY CONTROL AND THREAT DETECTION
• While the DevOps team may consider the security team as a cause of delay, this
should not be the case. Problems are identified and corrected immediately before
CONS OF DEVSECOPS
• 1. WON’T WORK WITHOUT OPEN COMMUNICATION
• For DevSecOps to work properly, communication and collaboration of key teams
from the security, software development, and IT departments must be established. If
any of these teams keeps important information from each other, it may not work as
intended.
• 2. SHOULD BE ACCEPTED BY EVERYONE
• Not all employees are keen on accepting non-traditional working arrangements.
Some live by the mantra, “if it ain’t broke, don’t fix it.” It can be difficult to ditch the
old ways of doing things and choose new working methods. Employees with this
mindset may be hard to convince about the importance of DevSecOps. Additionally,
they need time and few success stories to accept the new workflow.
• 3. MAY NOT BE THE MANAGEMENT’S MAIN PRIORITY
• Not all executives in a software development agency view security as a priority. As
such, a company executive may not be accepting of the proposed changes drafted
by a DevSecOps consultant or manager. As such, the company may revert to putting
LIMITATIONS OF DEVSECOPS
• As a new approach integrated in the DevSecOps, applications are quite limited
at this stage. For instance, it can’t be applied to the following:
• DevSecOps don’t work with web application firewalls (WAF) because wafs
function by monitoring real user requests. The latter is only applicable in
production environments and can’t resolve issues.
• DevSecOps are fully reliant on automation. This renders manual penetration
testing tools, useless as they can’t be used in DevSecOps.
• Simple web vulnerability scanners aren’t meant to work with continuous
integration (ci) and continuous delivery (cd) tools. Thus, it follows that it can’t
work with security vulnerability assessment under DevSecOps, too.
•
•
THANK
YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Cloud Native Day Tel Aviv
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...Cyber Security Alliance
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factoryscoopnewsgroup
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019Stefan Streichsbier
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Black Duck by Synopsys
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesCodefresh
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationDenim Group
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Black Duck by Synopsys
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of ThingsBlack Duck by Synopsys
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...Black Duck by Synopsys
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 

Was ist angesagt? (20)

Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI Pipelines
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 

Ähnlich wie Devsec ops

Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenNadira Bajrei
 
Why is The IT industry moving towards a DevSecOps approach?
Why is The IT industry moving towards a DevSecOps approach?Why is The IT industry moving towards a DevSecOps approach?
Why is The IT industry moving towards a DevSecOps approach?Enov8
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.Techugo
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.Techugo
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdfTechugo
 
Enterprise Devsecops
Enterprise DevsecopsEnterprise Devsecops
Enterprise DevsecopsEnov8
 
What is the role of DevSecOps in securing software development.pptx
What is the role of DevSecOps in securing software development.pptxWhat is the role of DevSecOps in securing software development.pptx
What is the role of DevSecOps in securing software development.pptxShantanuApurva1
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...Turja Narayan Chaudhuri
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?Enov8
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdfEnov8
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
 
The Importance of DevOps Security and the Emergence of DevSecOps
The Importance of DevOps Security and the Emergence of DevSecOpsThe Importance of DevOps Security and the Emergence of DevSecOps
The Importance of DevOps Security and the Emergence of DevSecOpsDev Software
 
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...Turja Narayan Chaudhuri
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfTechugo
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDev Software
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation JourneyDevOps Indonesia
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 

Ähnlich wie Devsec ops (20)

Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien Harisen
 
Why is The IT industry moving towards a DevSecOps approach?
Why is The IT industry moving towards a DevSecOps approach?Why is The IT industry moving towards a DevSecOps approach?
Why is The IT industry moving towards a DevSecOps approach?
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdf
 
Enterprise Devsecops
Enterprise DevsecopsEnterprise Devsecops
Enterprise Devsecops
 
What is the role of DevSecOps in securing software development.pptx
What is the role of DevSecOps in securing software development.pptxWhat is the role of DevSecOps in securing software development.pptx
What is the role of DevSecOps in securing software development.pptx
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
 
The Importance of DevOps Security and the Emergence of DevSecOps
The Importance of DevOps Security and the Emergence of DevSecOpsThe Importance of DevOps Security and the Emergence of DevSecOps
The Importance of DevOps Security and the Emergence of DevSecOps
 
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
 
DevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdfDevOps and Devsecops What are the Differences.pdf
DevOps and Devsecops What are the Differences.pdf
 
DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLC
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 

Kürzlich hochgeladen

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Kürzlich hochgeladen (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

Devsec ops

  • 1. DEVSECOPS PRESENTED BY: VIPIN ROLL NO. 200011029019 MCA 2ND SEM SUBMITTED TO: MR. SUDHIR (ASSISTANT PROFESSOR)
  • 2. CONTENTS • INTRODUCTION • WHY WE NEED DEVSECOPS • HOW DOES IT WORK • IMPORTANCE OF DEVSECOPS • DEVSECOPS PRACTICES • PROS OF DEVSECOPS • CONS OF DEVSECOPS • LIMITATION OF DEVSECOPS
  • 3. INTRODUCTION ● DevSecOps stands for development, security, and operations. It is about implementing the security right from the initial stage of the application development until the final product delivery. ● Its purpose is to ensure that every security breach is addressed and vulnerabilities are reduced. During the process, everybody is accountable for the security and actions from the developer to the operation department. Whereas in the traditional practice, security was the least concern of each department.
  • 4. ● Every organization that has DevOps should shift its gears towards the DevSecOps to get a higher level of proficiency and more secure application development experience. Instead of rushing at the last moment of a hazardous situation, DevSecOps ensures security at each level of development.
  • 5.
  • 6. WHY WE NEED DEVSECOPS? • Every day we come up with the news of data breaching and hacking. Is there any loophole in the application development ? don’t we have any established laws against these breachers ? answer to these questions is a big yes. • A security breach can results in loss of billions, even trillions of personal records, confidential information, and overall effects on the business. The traditional methodology for development is outdated in this tech-savy world. • Today, where countless applications are created and uploaded on the webstore, a security breach is a prime concern for businesses and application developers. To cope with this critical security crises, devsecops is the savior.
  • 7. EXAMPLE OF DATA BREACH AADHAAR DATA BREACH : • Date: march 2018 • Impact: 1.1 billion people • In march of 2018, it became public that the personal information of more than a billion indian citizens stored in the world’s largest biometric database could be bought online. • This massive data breach was the result of a data leak on a system run by a state-owned utility company. The breach allowed access to private information of aadhaar holders, exposing their names, their unique 12-digit identity numbers, and their bank details. • The type of information exposed included the photographs, thumbprints, retina scans and other identifying details of nearly every indian citizen.
  • 8.
  • 9. HOW DOES IT WORK? • In the first step, a code is created in the version control management system by a developer. • All changes are seen and done in the same system, • After that, another developer takes the code from the same system, analyzes it, and identifies bugs or security breach in the code, • Once the developer rectify the error, the environment is created using infrastructure as the tool,
  • 10. • Next step is the deployment of the application, here test data automation is carried out including security test, UI, integration & API, • Once the application clears these test, it is suitable for the production step, • Even under the production environment, continuously monitoring is done to identify and rectify security threats.
  • 11.
  • 12. IMPORTANCE OF DEVSECOPS • The last decade was very crucial and progressive for the IT industry as it has witnessed substantial growth in the terms of cloud computing, storage, and new applications. however, with the entry of DevOps, the speed and functionality took the industry to the next level of success. • but the only concern of DevOps was its security inefficiency. due to this reason, DevSecOps is welcomed warmly. it caters to the need for speed, functionality, security, and scale under a single umbrella.
  • 13. SOME OF DEVSECOPS PRACTICES With the implementation of DevSecOps, the resources will be utilized in a better and efficient way. Here are some practices that help in operating things in a smooth way:
  • 14. • 1. SAFE AND SECURE CODING: • It is very important and necessary to practice safe and secure software development to cut down the high risk of vulnerabilities. Unsecure coding is a threat to the breach of confidential information. Hire the service of a highly experienced and skilled developer to avoid high risk. • 2. IMPLEMENT AUTOMATION: • Automation is the key factor for the secure and safe development of an application. Embed the automation with continuous integration and deployment environment to match the speed of your security with the process. It becomes necessary for a larger organization where varied versions of code are pushed in the production environment for multiple times.
  • 15. • 3. IMPLEMENTATION FROM THE BEGINNING: • Implement security from the first stage of application development. Till now, we have understood why it is necessary to implement a security check from the beginning. This practice may take time, but in the long run, it is handy and safest way for risk-free application development. • 4. PEOPLE + TECHNOLOGY + PROCESS = RISK FREE • The major role for the success of DevSecOps is played by the perfect trio of people, technology, and process. Convincing people about the shift from traditional methods to DevSecOps may need lots of effort, but the result will be worth of those efforts made by you. Just after convincing people, frame a common process to strengthen the security aim. After the merger of people and process, next comes is technology. With practices like automated compliance scan, confirmation management, host hardening, and others devsecops, the aim for the secured and safe application is not far.
  • 16.
  • 17. PROS OF DEVSECOPS • While there’s no full guarantee that a software product will be free from all possible malicious attacks, DevSecOps can ensure that an application is pretty stable and less vulnerable, upon release or off the shelf. This new approach to software creation is beneficial due to the following reasons: • 1. ENHANCES COLLABORATION AND COMMUNICATION BETWEEN ALL TEAMS • The DevSecOps method encourages IT professionals with different skills to collaborate and work together to achieve one goal. Team integration is one of the main objectives of DevSecOps. • 2. INCREASES THE SPEED AND AGILITY OF DEVELOPMENT TEAMS • The nature of this approach pushes DevSecOps team members to react fast, as well as review and correct vulnerabilities and other software problems as the development process is ongoing. • 3. PROMOTES BETTER QUALITY CONTROL AND THREAT DETECTION • While the DevOps team may consider the security team as a cause of delay, this should not be the case. Problems are identified and corrected immediately before
  • 18. CONS OF DEVSECOPS • 1. WON’T WORK WITHOUT OPEN COMMUNICATION • For DevSecOps to work properly, communication and collaboration of key teams from the security, software development, and IT departments must be established. If any of these teams keeps important information from each other, it may not work as intended. • 2. SHOULD BE ACCEPTED BY EVERYONE • Not all employees are keen on accepting non-traditional working arrangements. Some live by the mantra, “if it ain’t broke, don’t fix it.” It can be difficult to ditch the old ways of doing things and choose new working methods. Employees with this mindset may be hard to convince about the importance of DevSecOps. Additionally, they need time and few success stories to accept the new workflow. • 3. MAY NOT BE THE MANAGEMENT’S MAIN PRIORITY • Not all executives in a software development agency view security as a priority. As such, a company executive may not be accepting of the proposed changes drafted by a DevSecOps consultant or manager. As such, the company may revert to putting
  • 19. LIMITATIONS OF DEVSECOPS • As a new approach integrated in the DevSecOps, applications are quite limited at this stage. For instance, it can’t be applied to the following: • DevSecOps don’t work with web application firewalls (WAF) because wafs function by monitoring real user requests. The latter is only applicable in production environments and can’t resolve issues. • DevSecOps are fully reliant on automation. This renders manual penetration testing tools, useless as they can’t be used in DevSecOps. • Simple web vulnerability scanners aren’t meant to work with continuous integration (ci) and continuous delivery (cd) tools. Thus, it follows that it can’t work with security vulnerability assessment under DevSecOps, too.