SlideShare ist ein Scribd-Unternehmen logo
1 von 79
Downloaden Sie, um offline zu lesen
DevOps Support
for Ethical SDLC
Overview of DevOps-related SDLC ethical concerns from IEEE P70nn Working Groups @IEEESA http://sites.ieee.org/sagroups-7000/
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
IEEE P7000: Marquis Group Charter
“Scope: The standard establishes a process model by which engineers and technologists can
address ethical consideration throughout the various stages of system initiation, analysis and
design. Expected process requirements include management and engineering view of new
IT product development, computer ethics and IT system design, value-sensitive design, and,
stakeholder involvement in ethical IT system design. . .. The purpose of this standard is to
enable the pragmatic application of this type of Value-Based System Design methodology
which demonstrates that conceptual analysis of values and an extensive feasibility analysis
can help to refine ethical system requirements in systems and software life cycles.”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Related IEEE P70nn Groups
 IEEE P7000 Ethical Systems Design
 IEEE P7001 Transparency of Autonomous Systems
 IEEE P7002 Data Privacy Process
 IEEE P7003 Algorithmic Bias Considerations
 IEEE P7004 Standard for Child and Student Data Governance
 IEEE P7005 Standard for Transparent Employer Data Governance
 IEEE P7006 Standard for Personal AI Agent
 IEEE P7007 Ontological Standard for Ethically Driven Robotics and Automation Systems
 IEEE P7008 - Standard for Ethically Driven Nudging for Robotic, Intelligent and Autonomous Systems
 IEEE P7009 - Standard for Fail-Safe Design of Autonomous and Semi-Autonomous Systems
 IEEE P7010 - Wellbeing Metrics Standard for Ethical Artificial Intelligence and Autonomous Systems
 IEEE P7011 - SSIE Standard for Trustworthiness of News Media
 IEEE P7012 - SSIE Machine Readable Personal Privacy Terms
 IEEE P7013 - Facial Analysis
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Key References
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Focus: artificial
intelligence and
autonomous systems.
Havens asks, “How will
machines know what we
value if we don’t know
ourselves?”
Recent Case Study Opportunities:
Case Study 1
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
“Faster, Higher, Farther chronicles a corporate scandal that
rivals those at Enron and Lehman Brothers—one that will cost
Volkswagen more than $22 billion in fines and settlements.” –
Publisher
Case Study 2
 “Equifax said that about 38,000
driver's licenses and 3,200 passports
details had been uploaded to the
portal that had was hacked.
(http://bit.ly/2jF3VTh) Equifax said in
September that hackers had stolen
personally identifiable information of
U.S., British and Canadian
consumers. The company confirmed
that information on about 146.6
million names, 146.6 million dates of
birth, 145.5 million social security
numbers, 99 million address
information and 209,000 payment
card number and expiration date,
were stolen in the cyber security
incident.” –Yahoo Finance
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Case Study 3
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
It will be remembered as “a breach,” but the Facebook –
Cambridge Analytica incident was about big data.
Adjectives to
remember:
“Tiny” + “Big”
Case Study 4
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Finding: Hispanic-owned and managed Airbnb properties, controlled for
other aspects, receive less revenue than other groups.
Response from Airbnb when contacted by reporters: We already provide
tools to help price listings.
Source: American Public Media Marketplace 8-May-2018
Related stories:
Dan Gorenstein, “Airbnb cracks down on bias – but at what cost?” Marketplace, 2018-09-08
Corporate Europe Observatory, “Unfairbnb” 2-May-2018
Case Study 5
A “charity” was used to subsidize
payments to Medicare patients in
order to boost drug sales. Multiple
manufacturers are involved.
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Case Study 6
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
“Value-added measures for teacher evaluation, called the Education Value-
Added Assessment System, or EVAAS, in Houston, is a statistical method that
uses a student’s performance on prior standardized tests to predict academic
growth in the current year. This methodology—derided as deeply flawed,
unfair and incomprehensible—was used to make decisions about teacher
evaluation, bonuses and termination. It uses a secret computer program
based on an inexplicable algorithm (above).
In May 2014, seven Houston teachers and the Houston Federation of Teachers
brought an unprecedented federal lawsuit to end the policy, saying it
reduced education to a test score, didn’t help improve teaching or learning,
and ruined teachers’ careers when they were incorrectly terminated. Neither
HISD nor its contractor allowed teachers access to the data or computer
algorithms so that they could test or challenge the legitimacy of the scores,
creating a ‘black box.’” http://kbros.co/2EvxjU9
Case Study 7
 A radiologist sends a message to a provider. It is never received, and critical
care was not delivered, probably resulting in a patient’s death. Whom would
you blame?
 What’s in your stack?
 “Apache Flink is an open-source framework for distributed stream processing
that Provides results that are accurate, even in the case of out-of-order or late-
arriving data. Some of its features are – (1) It is stateful and fault-tolerant and
can seamlessly recover from failures while maintaining exactly-once
application state; (2) performs at large scale, running on thousands of nodes
with excellent throughput and latency characteristics; (3) its streaming data
flow execution engine, APIs and domain-specific libraries for Batch, Streaming,
Machine Learning, and Graph Processing.”
 Or . . . ? “Apache Kafka solves the situation where the producer is generating
messages faster than the consumer can consume them in a reliable way.”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Related Decks
 NIST Big Data Public Working Group – Overview for Cloud Native SAFE
 Stakeholders for Ethical Systems Design
 DevOps Support for a More Ethical SDLC (this deck)
 GDPR Issues in Security and Privacy
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
My Perspective
 Chair Ontology / Taxonomy subgroup for P7000
 Occasional participant in IEEE Standards WGs P7007, P7001, P7003, P7002, P7010, P7007
 IEEE Standard P2675 WG Security for DevOps
 IEEE Standards P1915.1 SDN and Network Function Virtualization Security
 Finance large enterprise: supply chain risk, complex playbooks, many InfoSec tools,
workflow automation, big data logging; risks include fraud and regulatory #fail
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
IEEE Society on Social Implications
of Technology
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
IEEE Product Safety Engineering Society
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
• “Do no harm.” – It’s not
so easy.
• Do you know a system
is safe before it’s been
fully scaled up -- &
possibly federated?
• What constitutes “a
reasonable
explanation”?
IEEE Reliability Society
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
See free reliability analytics toolkit.
Some items are useful to Big Data
DevOps) https://kbros.co/2rugRij
IEEE Shill? No.
 Active communities are small.
 Standards documents are not free, though participation for IEEE members is.
 Heavily weighted toward late career participants.
 Despite “Engineering” in title, often not “engineering.”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
But IEEE has . . .
 IEEE Digital Library (with cross reference to ACM digital library)
 Multinational reach and engagement
 Reasonable internal advocacy and oversight
 Diversity
 Sometimes good awareness of NIST work
 Often best work in lesser-known conference publications (e.g., vs. IEEE Security)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
State of Computing Profession Ethics
@ACM_Ethics
ACM Code of Ethics
(Draft 3, 2018) https://www.acm.org/about-acm/code-of-ethics
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Highlights of ACM Ethics v3
 “minimize negative consequences of computing, including threats to health, safety,
personal security, and privacy.”
 When the interests of multiple groups conflict, the needs of the least advantaged should
be given increased attention and priority
 computing professionals should promote environmental sustainability both locally and
globally.
 “. . .the consequences of emergent systems and data aggregation should be carefully
analyzed. Those involved with pervasive or infrastructure systems should also consider
Principle 3.7 (Standard of care when a system is integrated into the infrastructure of
society).
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
https://www.computer.org/web/education/code-of-ethics
Joint ACM IEEE Software Engr Code
https://www.computer.org/web/education/code-of-ethics
 1. PUBLIC - Software engineers shall act consistently with the public interest.
 2. CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client
and employer consistent with the public interest.
 3. PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest
professional standards possible.
 4. JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment.
 5. MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical
approach to the management of software development and maintenance.
 6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent
with the public interest.
 7. COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues.
 8. SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession
and shall promote an ethical approach to the practice of the profession.
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Human Computer Interaction
 NBDPWG System Communicator
 Usability for web and mobile content
 Substitutes for old school manuals
 “Privacy text” for disclosures, policy, practices
 Central to much of the click-based economy
 “User” feedback, recommendations
 Recommendation engines
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Natural Language Tooling
 Hyperlinks to artifacts
 Chatbots
 Live agent
 Speech to text support
 Text mining
 Enterprise search (workflow-enabled artifacts)
 Some of the indexed artifacts may approach big data status
 SaaS Text Analytics
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Dependency Management (CM)
 Larger scope for Configuration management
 Support both hybrid cloud + fully distributed IoT applications
 Across organizations
 Needed for critical infrastructure
 See NIST critical sector efforts
 Emerging Dependencies may not be human-intelligible
 Special issues with machine-to-machine transactions
 Weak CM for dependencies on people or groups (including external)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Traceability & Requirements Engineering
 Define what is an ethical requirement
 Possible: big data ethical fabric (transparency, usage)
 Audit
 Traceability requirements
 Can an ethical responsibility be inherited like Personal Data-tagged data elements?
 What about synthetic, algorithm-defined elements?
Note: See EU notion for “Personal Data” vs. PII in the US: P. Schwartz and D. Solove, "Reconciling
Personal Information in the United States and European Union," California Law Review, vol. 102,
no. 4, Aug. 2014. [Online]. Available:
https://scholarship.law.berkeley.edu/californialawreview/vol102/iss4/7
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Special Populations
 Disadvantaged
 By regulation (e.g., 8A, SBIR, disability)
 By “common sense” (“fairness” and “equity”)
 By economic / sector (“underserved”)
 Internet Bandwidth inequity
 Children
 “Criminals” / Malware Designers
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Transparency
 What does it mean to be “transparent” about ethics?
 What connection to IEEE /ACM professional ethics?
 ACM: “The entire computing profession benefits when the ethical decision making process is
accountable to and transparent to all stakeholders. Open discussions about ethical issues promotes this
accountability and transparency.”
 ACM “A computing professional should be transparent and provide full disclosure of all pertinent system
limitations and potential problems. Making deliberately false or misleading claims, fabricating or
falsifying data, and other dishonest conduct are violations of the Code.”
 ACM “Computing professionals should establish transparent policies and procedures that allow
individuals to give informed consent to automatic data collection, review their personal data, correct
inaccuracies, and, where appropriate, remove data.”
 ACM “Organizational procedures and attitudes oriented toward quality, transparency, and the welfare
of society reduce harm to the public and raise awareness of the influence of technology in our lives.
Therefore, leaders should encourage full participation of all computing professionals in meeting social
responsibilities and discourage tendencies to do otherwise.”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Algorithms
 “Why am I locked out while she is permitted?”
 “Why isn’t my FICO score changing?”
 “How can I know when I have explained our algorithm?”
 “Is there an ‘explain-ability’ metric?” *** See next slide
 What is different about machine-to-machine algorithms?
 “Can an algorithm be abusive?”
 “Is ‘bias’ the new breach?” https://kbros.co/2I2sxDO
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Explanation
 “Right to explanation”
 Explanation sufficiency / suitability is not immediately obvious
 Explaining to novices vs. experts; children vs. adults
 Complex topics requiring specialized language, fast-changing technologies (e.g., cloud)
 Explanations may require agent-based technologies
 Directly related to knowledge / learning management (an LMS may be a prerequisite)
 References
 https://en.wikipedia.org/wiki/Explainable_Artificial_Intelligence
 https://en.wikipedia.org/wiki/Explanation#Meta-explanation
 https://en.wikipedia.org/wiki/Abductive_reasoning
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Risk Artifact Traceability
 Connect a Risk Framework object (e.g., NIST SP 800-37r2) to code objects
 Hyperlinks
 Embedded text
 Code-to-text macros
 Two-way connectivity
 Configuration changes impact risk
 Risk profile changes (flood, turnover in InfoSec workforce, open source ecosystem) impact code
 Risk shifts must be explained
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Function Point Traceability
 Requirements Engineering for Ethics
 Related: Utility (“Tradeoff) Functions
 Profit / Nonprofits
 Capture of ethical aspects of requirements
 Decision-making (function points need to support analytics, function points set by consensus –
meetings, Communities of Interest, or Product Owner requirements)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Cross-Sector Resilience
 Public safety, well-being
 Examples: FS-ISAC, Edison Institute
 Government services
 “Special” Scenarios
 Emergency Services
 Military
 DevOps was probably born in Logistics supply chain before it was called DevOps
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
The Professions
 Professions as cross-organizational force
 The obvious: software engineers, accountants, safety/reliability engineers
 Less obvious: most domains have specialists who are key: e.g., geneticists, structural engineer,
avionics
 Role is often set by a particular domain context or scenario
 Code of Ethics as RegTech / Story Points / Function Points
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Domain Specific Ethical Breach Stories
 Manual Process Signposts
 Anti-Money Laundering (AML) in Banking
 HIPAA compliance consulting
 DevOps Process Signposts
 RegTech
 Catalog ethical breaches associated with LoB, Mission
 To-do: Harmonize with SE Code of Ethics
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Audience, Alerts, Audits: Monitoring
 Support multiple “stakeholders”
 Not all are paying customers (“public interest”, regulators, suppliers)
 Traceability requirements vary across stakeholder groups
 In addition to those specified by product owners:
 Alerts for citizens, infrastructure managers, CEOs, CIO’s, CISO’s, industry peers
 May be the same, or may vary
 Monitoring may need to be specialized according to each “V” | Live “seed” testing
 Cautionary Tales: “Tin Can on the Wedding Car,” toddlers eating button batteries
 (Opinion: Need to resurrect Complex Event Processing design patterns)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
The “Are You Sure?” Problem
 If “Are you sure?” is omitted, who decided that?
 In CI?
 In automated test (harder to find a missing feature)
 Explanations
 Doc? On screen? FAQ?
 Connection to CMDB?
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Simulation
 New: DevOps Scalability
 Simulation and Interoperability (SISO)
 Scale for the V’s (see SISO)
 NIST Big Data S&P Appendix A high conformance
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Operational Intelligence
 Big Data often needed to manage applications
 Managing pay-as-you-go computing resources
=> OpIntel
 Related: Managing OpSec
 Related: Alerts and Logging
 Tradeoffs and utility models
 Transparency, traceability, “documentation”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Test Engineering and DevOps
 Continuous Pipeline concepts applied to IoT / Edge / Distributed
 Each platform (or stack “layer”) may introduce different types of ethical concerns
 E.g., Identity Management for children
 Infectious disease statistics -> break glass for public health
 Autonomous vehicles response to fog conditions (see http://web.media.mit.edu/~guysatat/fog/)
 Reliance on less reliable hardware or bandwidth (e.g., cheap sensors, residential wi-fi)
 Left- and right-shift of safety, reliability, regulatory constraints (remember case studies)
 New meaning for “interoperability” – “inter-responsibility”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Forensics
 Big Data may be needed for full stack playback
 Full stack for After Action Review is still immature with forensics professionals
 Even large firms may not be staffed with forensics specialists
 Big surprise may be in store when breach or litigation occurs
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Federation & Supply Chain
 Facebook/Cambridge Analytica scenario was forecast in V1
 Supply Chains that have been casual need upgrades
 Risk often increases as organizational size decreases
 Cost of “keeping data around” dangerously close to zero
 Conventional systems taxed to handle volume of identity management
 Access is infrequently leased
 Simplistic network zones fail to isolate subcomponents important to domain experts
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Corporate Initiatives
 Environmental Social Governance
 Transparency within employee groups, departments, subsidiaries (See P7005)
 Computing decisions that affect carbon footprint (green data centers, etc.)
 Individual practitioners have greater influence than before
 Disclaimers in developer contract work
 Offshore culture: some workers may be afraid to question requirements, risk-taking
 Whistle-blower (a la Bug Bounty) not working well yet
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Who Decides?
Some Opinions
 Requirements Engineering may need a refresher, uplift
 System Architects must continuously place controls in hands of domain experts
 This is counter to the “sysadmin” design pattern
 Risks multiply in part due to the commercial deprecation of documentation, manuals
 Boundaries of safe & manageable release pipelines may have already been exceeded (mobile)
 “Explain this” mentality partly offsets the DIY developer syndrome
 Good for self-education, but the problem is not defining “ethics”
 On-demand microlearning must accompany microservices deployment
 AI Agents: Can ask, “Why?” “Who?” and nudge ethical considerations
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Value Chain – Reference Model
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Bibliography
Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, and Marty J. Wolf.
2017. Listening to professional voices: draft 2 of the ACM code of ethics and professional
conduct. Commun. ACM 60, 5 (April 2017), 105-111. DOI: https://doi.org/10.1145/3072528
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Related Work
 NIST 800-53 Rev 5 and others, NIST Cloud Security, NIST RMF
 Building, Auto Automation ISO 29481, 16739, 12006
 https://www.buildingsmart.org/about/what-is-openbim/ifc-introduction
 Uptane
 Ethics and Societal Considerations ISO 26000, IEEE P70nn
 DevOps Security IEEE P2675
 Microsegmentation and NFV IEEE P1915.1
 Safety orientation
 Infrastructure as code
 E.g., security tooling is code, playbooks are code
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Revision History
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Vers Date Change
1.0 2018-05-25 Initial draft for IEEE P2675
1.1 2018-05-29 Add explainability, clarify PII vs. Personal Information, new Airbnb
reference, update traceability
This deck is released under
Creative Commons
Attribution-Share Alike.
Portions of the work summarized was developed by multiple contributors through the NIST
open public working group framework under the leadership of Wo Chang, but this document
represents my views alone. https://bigdatawg.nist.gov | govNISTBig Databig data
securityBig Data SecPriv V2
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Background: NIST Big Data PWG
Other insights from the NIST Big Data Public Working Group
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
What’s Different about Big Data
(OLD NEWS)
 Multiple security schemes, attack vectors, countermeasures
 May have streamed data frameworks + data at rest
 Sensor Sensibility
 Unintended uses and deanonymization
 Often multi-organizational (most standards built for single-org adoption)
 Problems of scale and complexity, veracity, content, provenance, jurisdiction
 Data and code shared across organizations
 Big data power wielded by smaller organizations with weak governance, training, regs
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Fluff
 Security and privacy are affected by all dimensions:
 Volume
 Velocity
 Variety
 Veracity (Provenance)
 Volatility
 Cloud
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Less Fluffy
 Big Data partly side effect of SDLC shifts
 Agile
 API-First
 Microservices / Containerization
 Deprecated but not forgotten: Components, Composable Services
 SDN, 5G
 Left Shift (DevOps)
 DevSecOps
 Model portability: CrispDM (IBM SPSS link), OMG DOL (Distributed Ontology, Model & Spec Language, link)
 IoT (Distributed Computing c. 1970-present)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Key Trends
 Cloud (centralization, scale, code-sharing)
 IoT, especially health & safety related
 Mobility and pervasive human-computer interactions (Alexa, etc.)
 Data Center automation (scripting -> DevOps code, “left-shift”)
 Trust and Federation (related: Blockchain)
 Domain automation (E.g., smart buildings, autonomous vehicles, FIBO)
 ABAC more than RBAC
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Use Cases
 Network Protection
 Systems Health & Management (AWS metrics, billing, performance)
 Education
 Cargo Shipping
 Aviation (safety)
 UAV, UGV regulation
 Regulated Government Privacy (FERPA, HIPAA, COPPA, GDPR, PCI etc.)
 Healthcare Consent Models
 HL7 FHIR Security and Privacy link
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Liaison
 NIST (mostly 1:1 contacts, catalog of cited SPs and standards)
 IEEE P2675 Security for DevOps
 IEEE P1915.1 NFV and SDN Security, 5G (1:1 via AT&T)
 IEEE P7000-P7010 (S&P in robotics: algorithms, student data, safety & resilience, etc.)
 ISO 20546 20547 Big Data
 IEEE Product Safety Engineering Society
 IEEE Reliability Engineering
 IEEE Society for Social Implications of Technology
 HL7 FHIR Security Audit WG
 Cloud Native SAFE Computing (Kubernetes-centric)
 Academic cryptography experts
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Contributions of this SP
 Checklists
 Deep bibliography
 Consent and Break-Glass after HL7
 Centrality of Domain Models
 Simulation
 Security/Privacy modeled after Safety frameworks
 E.g., data / code toxicity (after Material Data Safety standard link)
 “System Communicator”
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Value Chain – Reference Model
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
ACM Computing Classification
Security & Privacy Topics
 Database and storage security
 Data anonymization and sanitation
 Management and querying of encrypted data
 Information accountability and usage control
 Database activity monitoring
 Software and application security
 Software security engineering
 Web application security
 Social network security and privacy
 Domain-specific security and privacy architectures
 Software reverse engineering
 Human and societal aspects of security and privacy
 Economics of security and privacy
 Social aspects of security and privacy
 Privacy protections
 Usability in security and privacy
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Conceptual Taxonomy
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Security
and Privacy
Conceptual
Taxonomy
Data
Confidentiality
Provenance
System Health
Public Policy,
Social, and Cross-
Organizational
Topics
Operational Taxonomy
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Security
and Privacy
Operational
Taxonomy
Device and
Application
Registration
Identity and
Access
Management
Data
Governance
Infrastructure
Management
Risk and
Accountability
NBD SP Security & Privacy Safety:
Conformance Levels
 General approach: ISO 17021, 17067, 17023 Conformity Assessment
 Sets forth suggested levels of conformance:
 Safety Level 1, 2 & 3
 Self-administered
 Mechanics at Level 3
 Automated use of domain models for Security Operations
 Security and privacy risks driven to IDE
 Continuous Test (left- & right-shift of code)
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Value of Security Ontologies
(Obrst, Chase, & Markeloff, 2012) Note that systematic use of ontologies could enable
information security tools to process standardized information streams from third parties, using
methods such as the Security Content Automation Protocol (SCAP). This model could enable
automated reasoning to address potential breaches closer to real time, or which have
indirect effects on networks or applications which require a mixture of human and machine
cognition.
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Privacy and Security Fabric
 “Fabric” notion adopted by several organizations
 Fabric to cover multiple layers, facets, technologies
 Dissolving distinction between security and privacy
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Snips from NBDPWG V2 Appendix A
 Best practices for ABAC
 Integration of legacy RBAC with ABAC
 Derivation of ABAC from other model formats
 Kubernetes walkthrough
 Container and Microservice ABAC
 Log analysis for Splunk Security Operations / Application design patterns
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Appendix A
 There is more . . . Refer to Appendix A in the full document. The
preceding slides were an excerpt.
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Background Material
NBDPWG Appendix A, Cloud Native SAFE
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
CRISP-DM Process Model
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
Cloud Native Foundation
Safe Access For Everyone (SAFE)
 https://github.com/cn-security/safe
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
This deck is released under
Creative Commons
Attribution-Share Alike.
Portions of the work summarized was developed by multiple contributors through the NIST
open public working group framework under the leadership of Wo Chang, but this document
represents my views alone. https://bigdatawg.nist.gov | govNISTBig Databig data
securityBig Data SecPriv V2
Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end

Weitere ähnliche Inhalte

Was ist angesagt?

DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)
DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)
DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)Masanori KAMAYAMA
 
Load Balancing SSTP VPN with KEMP LoadMaster
Load Balancing SSTP VPN with KEMP LoadMasterLoad Balancing SSTP VPN with KEMP LoadMaster
Load Balancing SSTP VPN with KEMP LoadMasterKemp
 
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityKCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityAndreas Grabner
 
Scaling Engineering by Hacking Conway’s Law - Geecon,2022
Scaling Engineering by Hacking Conway’s Law - Geecon,2022Scaling Engineering by Hacking Conway’s Law - Geecon,2022
Scaling Engineering by Hacking Conway’s Law - Geecon,2022Aviran Mordo
 
Upgrade Kubernetes the boring way
Upgrade Kubernetes the boring wayUpgrade Kubernetes the boring way
Upgrade Kubernetes the boring wayOleksandr Slynko
 
Java で開発する Azure Web Apps アプリケーション
Java で開発する Azure Web Apps アプリケーションJava で開発する Azure Web Apps アプリケーション
Java で開発する Azure Web Apps アプリケーション彰 村地
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX, Inc.
 
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月VirtualTech Japan Inc.
 
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)Masaya Tahara
 
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)NTT DATA Technology & Innovation
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
DevOps Monitoring and Alerting
DevOps Monitoring and AlertingDevOps Monitoring and Alerting
DevOps Monitoring and AlertingKhairul Zebua
 
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)オラクルエンジニア通信
 
Building a Modern Website for Scale (QCon NY 2013)
Building a Modern Website for Scale (QCon NY 2013)Building a Modern Website for Scale (QCon NY 2013)
Building a Modern Website for Scale (QCon NY 2013)Sid Anand
 
Internetトラフィックエンジニアリングの現実
Internetトラフィックエンジニアリングの現実Internetトラフィックエンジニアリングの現実
Internetトラフィックエンジニアリングの現実J-Stream Inc.
 
OpenShiftでJBoss EAP構築
OpenShiftでJBoss EAP構築OpenShiftでJBoss EAP構築
OpenShiftでJBoss EAP構築Daein Park
 
GTC 2018 で発表された自動運転最新情報
GTC 2018 で発表された自動運転最新情報GTC 2018 で発表された自動運転最新情報
GTC 2018 で発表された自動運転最新情報NVIDIA Japan
 
How we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesHow we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesOpsta
 

Was ist angesagt? (20)

DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)
DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)
DevSecOpsのユースケースとDevSecOpsがもたらす未来(20191126)
 
Load Balancing SSTP VPN with KEMP LoadMaster
Load Balancing SSTP VPN with KEMP LoadMasterLoad Balancing SSTP VPN with KEMP LoadMaster
Load Balancing SSTP VPN with KEMP LoadMaster
 
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityKCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
 
Scaling Engineering by Hacking Conway’s Law - Geecon,2022
Scaling Engineering by Hacking Conway’s Law - Geecon,2022Scaling Engineering by Hacking Conway’s Law - Geecon,2022
Scaling Engineering by Hacking Conway’s Law - Geecon,2022
 
Service mesh
Service meshService mesh
Service mesh
 
Upgrade Kubernetes the boring way
Upgrade Kubernetes the boring wayUpgrade Kubernetes the boring way
Upgrade Kubernetes the boring way
 
MAKE IN INDIA INITIATIVE
MAKE IN INDIA INITIATIVEMAKE IN INDIA INITIATIVE
MAKE IN INDIA INITIATIVE
 
Java で開発する Azure Web Apps アプリケーション
Java で開発する Azure Web Apps アプリケーションJava で開発する Azure Web Apps アプリケーション
Java で開発する Azure Web Apps アプリケーション
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
 
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月
OpenStack Neutronの機能概要 - OpenStack最新情報セミナー 2014年12月
 
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)
なぜあなたのプロジェクトのDevSecOpsは形骸化するのか(CloudNative Security Conference 2022)
 
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)
どうやって決める?kubernetesでのシークレット管理方法(Cloud Native Days 2020 発表資料)
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
DevOps Monitoring and Alerting
DevOps Monitoring and AlertingDevOps Monitoring and Alerting
DevOps Monitoring and Alerting
 
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)
OCI 購入モデルの整理と Universal Credit 最新情報(2021年2月17日版)
 
Building a Modern Website for Scale (QCon NY 2013)
Building a Modern Website for Scale (QCon NY 2013)Building a Modern Website for Scale (QCon NY 2013)
Building a Modern Website for Scale (QCon NY 2013)
 
Internetトラフィックエンジニアリングの現実
Internetトラフィックエンジニアリングの現実Internetトラフィックエンジニアリングの現実
Internetトラフィックエンジニアリングの現実
 
OpenShiftでJBoss EAP構築
OpenShiftでJBoss EAP構築OpenShiftでJBoss EAP構築
OpenShiftでJBoss EAP構築
 
GTC 2018 で発表された自動運転最新情報
GTC 2018 で発表された自動運転最新情報GTC 2018 で発表された自動運転最新情報
GTC 2018 で発表された自動運転最新情報
 
How we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesHow we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on Kubernetes
 

Ähnlich wie DevOps Support for an Ethical Software Development Life Cycle (SDLC)

Technologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsTechnologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsMark Underwood
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeMark Underwood
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningMark Underwood
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Session 0.0 poster minutes madness
Session 0.0   poster minutes madnessSession 0.0   poster minutes madness
Session 0.0 poster minutes madnesssemanticsconference
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2Mark Underwood
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Gridforum David De Roure Newe Science 20080402
Gridforum David De Roure Newe Science 20080402Gridforum David De Roure Newe Science 20080402
Gridforum David De Roure Newe Science 20080402vrij
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next? PayamBarnaghi
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)Tao Xie
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research Ian Miles
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Diego Oppenheimer
 

Ähnlich wie DevOps Support for an Ethical Software Development Life Cycle (SDLC) (20)

Technologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsTechnologies in Support of Big Data Ethics
Technologies in Support of Big Data Ethics
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Data-X-v3.1
Data-X-v3.1Data-X-v3.1
Data-X-v3.1
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Data-X-Sparse-v2
Data-X-Sparse-v2Data-X-Sparse-v2
Data-X-Sparse-v2
 
Session 0.0 poster minutes madness
Session 0.0   poster minutes madnessSession 0.0   poster minutes madness
Session 0.0 poster minutes madness
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
A Methodology for Building the Internet of Things
A Methodology for Building the Internet of ThingsA Methodology for Building the Internet of Things
A Methodology for Building the Internet of Things
 
Gridforum David De Roure Newe Science 20080402
Gridforum David De Roure Newe Science 20080402Gridforum David De Roure Newe Science 20080402
Gridforum David De Roure Newe Science 20080402
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 

Mehr von Mark Underwood

Security within Scaled Agile
Security within Scaled AgileSecurity within Scaled Agile
Security within Scaled AgileMark Underwood
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability EngineeringMark Underwood
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
Stakeholders in Systems Design
Stakeholders in Systems DesignStakeholders in Systems Design
Stakeholders in Systems DesignMark Underwood
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and ScienceMark Underwood
 
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic InteroperabilityIoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic InteroperabilityMark Underwood
 
Ontology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use CasesOntology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use CasesMark Underwood
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTMark Underwood
 

Mehr von Mark Underwood (8)

Security within Scaled Agile
Security within Scaled AgileSecurity within Scaled Agile
Security within Scaled Agile
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability Engineering
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Stakeholders in Systems Design
Stakeholders in Systems DesignStakeholders in Systems Design
Stakeholders in Systems Design
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and Science
 
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic InteroperabilityIoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
 
Ontology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use CasesOntology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use Cases
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoT
 

Kürzlich hochgeladen

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 

Kürzlich hochgeladen (20)

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

DevOps Support for an Ethical Software Development Life Cycle (SDLC)

  • 1. DevOps Support for Ethical SDLC Overview of DevOps-related SDLC ethical concerns from IEEE P70nn Working Groups @IEEESA http://sites.ieee.org/sagroups-7000/ Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 2. IEEE P7000: Marquis Group Charter “Scope: The standard establishes a process model by which engineers and technologists can address ethical consideration throughout the various stages of system initiation, analysis and design. Expected process requirements include management and engineering view of new IT product development, computer ethics and IT system design, value-sensitive design, and, stakeholder involvement in ethical IT system design. . .. The purpose of this standard is to enable the pragmatic application of this type of Value-Based System Design methodology which demonstrates that conceptual analysis of values and an extensive feasibility analysis can help to refine ethical system requirements in systems and software life cycles.” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 3. Related IEEE P70nn Groups  IEEE P7000 Ethical Systems Design  IEEE P7001 Transparency of Autonomous Systems  IEEE P7002 Data Privacy Process  IEEE P7003 Algorithmic Bias Considerations  IEEE P7004 Standard for Child and Student Data Governance  IEEE P7005 Standard for Transparent Employer Data Governance  IEEE P7006 Standard for Personal AI Agent  IEEE P7007 Ontological Standard for Ethically Driven Robotics and Automation Systems  IEEE P7008 - Standard for Ethically Driven Nudging for Robotic, Intelligent and Autonomous Systems  IEEE P7009 - Standard for Fail-Safe Design of Autonomous and Semi-Autonomous Systems  IEEE P7010 - Wellbeing Metrics Standard for Ethical Artificial Intelligence and Autonomous Systems  IEEE P7011 - SSIE Standard for Trustworthiness of News Media  IEEE P7012 - SSIE Machine Readable Personal Privacy Terms  IEEE P7013 - Facial Analysis Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 4. Key References Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end Focus: artificial intelligence and autonomous systems. Havens asks, “How will machines know what we value if we don’t know ourselves?”
  • 5. Recent Case Study Opportunities: Case Study 1 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end “Faster, Higher, Farther chronicles a corporate scandal that rivals those at Enron and Lehman Brothers—one that will cost Volkswagen more than $22 billion in fines and settlements.” – Publisher
  • 6. Case Study 2  “Equifax said that about 38,000 driver's licenses and 3,200 passports details had been uploaded to the portal that had was hacked. (http://bit.ly/2jF3VTh) Equifax said in September that hackers had stolen personally identifiable information of U.S., British and Canadian consumers. The company confirmed that information on about 146.6 million names, 146.6 million dates of birth, 145.5 million social security numbers, 99 million address information and 209,000 payment card number and expiration date, were stolen in the cyber security incident.” –Yahoo Finance Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 7. Case Study 3 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end It will be remembered as “a breach,” but the Facebook – Cambridge Analytica incident was about big data. Adjectives to remember: “Tiny” + “Big”
  • 8. Case Study 4 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end Finding: Hispanic-owned and managed Airbnb properties, controlled for other aspects, receive less revenue than other groups. Response from Airbnb when contacted by reporters: We already provide tools to help price listings. Source: American Public Media Marketplace 8-May-2018 Related stories: Dan Gorenstein, “Airbnb cracks down on bias – but at what cost?” Marketplace, 2018-09-08 Corporate Europe Observatory, “Unfairbnb” 2-May-2018
  • 9. Case Study 5 A “charity” was used to subsidize payments to Medicare patients in order to boost drug sales. Multiple manufacturers are involved. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 10. Case Study 6 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end “Value-added measures for teacher evaluation, called the Education Value- Added Assessment System, or EVAAS, in Houston, is a statistical method that uses a student’s performance on prior standardized tests to predict academic growth in the current year. This methodology—derided as deeply flawed, unfair and incomprehensible—was used to make decisions about teacher evaluation, bonuses and termination. It uses a secret computer program based on an inexplicable algorithm (above). In May 2014, seven Houston teachers and the Houston Federation of Teachers brought an unprecedented federal lawsuit to end the policy, saying it reduced education to a test score, didn’t help improve teaching or learning, and ruined teachers’ careers when they were incorrectly terminated. Neither HISD nor its contractor allowed teachers access to the data or computer algorithms so that they could test or challenge the legitimacy of the scores, creating a ‘black box.’” http://kbros.co/2EvxjU9
  • 11. Case Study 7  A radiologist sends a message to a provider. It is never received, and critical care was not delivered, probably resulting in a patient’s death. Whom would you blame?  What’s in your stack?  “Apache Flink is an open-source framework for distributed stream processing that Provides results that are accurate, even in the case of out-of-order or late- arriving data. Some of its features are – (1) It is stateful and fault-tolerant and can seamlessly recover from failures while maintaining exactly-once application state; (2) performs at large scale, running on thousands of nodes with excellent throughput and latency characteristics; (3) its streaming data flow execution engine, APIs and domain-specific libraries for Batch, Streaming, Machine Learning, and Graph Processing.”  Or . . . ? “Apache Kafka solves the situation where the producer is generating messages faster than the consumer can consume them in a reliable way.” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 12. Related Decks  NIST Big Data Public Working Group – Overview for Cloud Native SAFE  Stakeholders for Ethical Systems Design  DevOps Support for a More Ethical SDLC (this deck)  GDPR Issues in Security and Privacy Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 13. My Perspective  Chair Ontology / Taxonomy subgroup for P7000  Occasional participant in IEEE Standards WGs P7007, P7001, P7003, P7002, P7010, P7007  IEEE Standard P2675 WG Security for DevOps  IEEE Standards P1915.1 SDN and Network Function Virtualization Security  Finance large enterprise: supply chain risk, complex playbooks, many InfoSec tools, workflow automation, big data logging; risks include fraud and regulatory #fail Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 14. IEEE Society on Social Implications of Technology Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 15. IEEE Product Safety Engineering Society Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end • “Do no harm.” – It’s not so easy. • Do you know a system is safe before it’s been fully scaled up -- & possibly federated? • What constitutes “a reasonable explanation”?
  • 16. IEEE Reliability Society Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end See free reliability analytics toolkit. Some items are useful to Big Data DevOps) https://kbros.co/2rugRij
  • 17. IEEE Shill? No.  Active communities are small.  Standards documents are not free, though participation for IEEE members is.  Heavily weighted toward late career participants.  Despite “Engineering” in title, often not “engineering.” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 18. But IEEE has . . .  IEEE Digital Library (with cross reference to ACM digital library)  Multinational reach and engagement  Reasonable internal advocacy and oversight  Diversity  Sometimes good awareness of NIST work  Often best work in lesser-known conference publications (e.g., vs. IEEE Security) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 19. State of Computing Profession Ethics @ACM_Ethics ACM Code of Ethics (Draft 3, 2018) https://www.acm.org/about-acm/code-of-ethics Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 20. Highlights of ACM Ethics v3  “minimize negative consequences of computing, including threats to health, safety, personal security, and privacy.”  When the interests of multiple groups conflict, the needs of the least advantaged should be given increased attention and priority  computing professionals should promote environmental sustainability both locally and globally.  “. . .the consequences of emergent systems and data aggregation should be carefully analyzed. Those involved with pervasive or infrastructure systems should also consider Principle 3.7 (Standard of care when a system is integrated into the infrastructure of society). Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 21. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end https://www.computer.org/web/education/code-of-ethics
  • 22. Joint ACM IEEE Software Engr Code https://www.computer.org/web/education/code-of-ethics  1. PUBLIC - Software engineers shall act consistently with the public interest.  2. CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.  3. PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.  4. JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment.  5. MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.  6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.  7. COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues.  8. SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 23. Human Computer Interaction  NBDPWG System Communicator  Usability for web and mobile content  Substitutes for old school manuals  “Privacy text” for disclosures, policy, practices  Central to much of the click-based economy  “User” feedback, recommendations  Recommendation engines Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 24. Natural Language Tooling  Hyperlinks to artifacts  Chatbots  Live agent  Speech to text support  Text mining  Enterprise search (workflow-enabled artifacts)  Some of the indexed artifacts may approach big data status  SaaS Text Analytics Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 25. Dependency Management (CM)  Larger scope for Configuration management  Support both hybrid cloud + fully distributed IoT applications  Across organizations  Needed for critical infrastructure  See NIST critical sector efforts  Emerging Dependencies may not be human-intelligible  Special issues with machine-to-machine transactions  Weak CM for dependencies on people or groups (including external) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 26. Traceability & Requirements Engineering  Define what is an ethical requirement  Possible: big data ethical fabric (transparency, usage)  Audit  Traceability requirements  Can an ethical responsibility be inherited like Personal Data-tagged data elements?  What about synthetic, algorithm-defined elements? Note: See EU notion for “Personal Data” vs. PII in the US: P. Schwartz and D. Solove, "Reconciling Personal Information in the United States and European Union," California Law Review, vol. 102, no. 4, Aug. 2014. [Online]. Available: https://scholarship.law.berkeley.edu/californialawreview/vol102/iss4/7 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 27. Special Populations  Disadvantaged  By regulation (e.g., 8A, SBIR, disability)  By “common sense” (“fairness” and “equity”)  By economic / sector (“underserved”)  Internet Bandwidth inequity  Children  “Criminals” / Malware Designers Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 28. Transparency  What does it mean to be “transparent” about ethics?  What connection to IEEE /ACM professional ethics?  ACM: “The entire computing profession benefits when the ethical decision making process is accountable to and transparent to all stakeholders. Open discussions about ethical issues promotes this accountability and transparency.”  ACM “A computing professional should be transparent and provide full disclosure of all pertinent system limitations and potential problems. Making deliberately false or misleading claims, fabricating or falsifying data, and other dishonest conduct are violations of the Code.”  ACM “Computing professionals should establish transparent policies and procedures that allow individuals to give informed consent to automatic data collection, review their personal data, correct inaccuracies, and, where appropriate, remove data.”  ACM “Organizational procedures and attitudes oriented toward quality, transparency, and the welfare of society reduce harm to the public and raise awareness of the influence of technology in our lives. Therefore, leaders should encourage full participation of all computing professionals in meeting social responsibilities and discourage tendencies to do otherwise.” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 29. Algorithms  “Why am I locked out while she is permitted?”  “Why isn’t my FICO score changing?”  “How can I know when I have explained our algorithm?”  “Is there an ‘explain-ability’ metric?” *** See next slide  What is different about machine-to-machine algorithms?  “Can an algorithm be abusive?”  “Is ‘bias’ the new breach?” https://kbros.co/2I2sxDO Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 30. Explanation  “Right to explanation”  Explanation sufficiency / suitability is not immediately obvious  Explaining to novices vs. experts; children vs. adults  Complex topics requiring specialized language, fast-changing technologies (e.g., cloud)  Explanations may require agent-based technologies  Directly related to knowledge / learning management (an LMS may be a prerequisite)  References  https://en.wikipedia.org/wiki/Explainable_Artificial_Intelligence  https://en.wikipedia.org/wiki/Explanation#Meta-explanation  https://en.wikipedia.org/wiki/Abductive_reasoning Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 31. Risk Artifact Traceability  Connect a Risk Framework object (e.g., NIST SP 800-37r2) to code objects  Hyperlinks  Embedded text  Code-to-text macros  Two-way connectivity  Configuration changes impact risk  Risk profile changes (flood, turnover in InfoSec workforce, open source ecosystem) impact code  Risk shifts must be explained Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 32. Function Point Traceability  Requirements Engineering for Ethics  Related: Utility (“Tradeoff) Functions  Profit / Nonprofits  Capture of ethical aspects of requirements  Decision-making (function points need to support analytics, function points set by consensus – meetings, Communities of Interest, or Product Owner requirements) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 33. Cross-Sector Resilience  Public safety, well-being  Examples: FS-ISAC, Edison Institute  Government services  “Special” Scenarios  Emergency Services  Military  DevOps was probably born in Logistics supply chain before it was called DevOps Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 34. The Professions  Professions as cross-organizational force  The obvious: software engineers, accountants, safety/reliability engineers  Less obvious: most domains have specialists who are key: e.g., geneticists, structural engineer, avionics  Role is often set by a particular domain context or scenario  Code of Ethics as RegTech / Story Points / Function Points Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 35. Domain Specific Ethical Breach Stories  Manual Process Signposts  Anti-Money Laundering (AML) in Banking  HIPAA compliance consulting  DevOps Process Signposts  RegTech  Catalog ethical breaches associated with LoB, Mission  To-do: Harmonize with SE Code of Ethics Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 36. Audience, Alerts, Audits: Monitoring  Support multiple “stakeholders”  Not all are paying customers (“public interest”, regulators, suppliers)  Traceability requirements vary across stakeholder groups  In addition to those specified by product owners:  Alerts for citizens, infrastructure managers, CEOs, CIO’s, CISO’s, industry peers  May be the same, or may vary  Monitoring may need to be specialized according to each “V” | Live “seed” testing  Cautionary Tales: “Tin Can on the Wedding Car,” toddlers eating button batteries  (Opinion: Need to resurrect Complex Event Processing design patterns) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 37. The “Are You Sure?” Problem  If “Are you sure?” is omitted, who decided that?  In CI?  In automated test (harder to find a missing feature)  Explanations  Doc? On screen? FAQ?  Connection to CMDB? Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 38. Simulation  New: DevOps Scalability  Simulation and Interoperability (SISO)  Scale for the V’s (see SISO)  NIST Big Data S&P Appendix A high conformance Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 39. Operational Intelligence  Big Data often needed to manage applications  Managing pay-as-you-go computing resources => OpIntel  Related: Managing OpSec  Related: Alerts and Logging  Tradeoffs and utility models  Transparency, traceability, “documentation” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 40. Test Engineering and DevOps  Continuous Pipeline concepts applied to IoT / Edge / Distributed  Each platform (or stack “layer”) may introduce different types of ethical concerns  E.g., Identity Management for children  Infectious disease statistics -> break glass for public health  Autonomous vehicles response to fog conditions (see http://web.media.mit.edu/~guysatat/fog/)  Reliance on less reliable hardware or bandwidth (e.g., cheap sensors, residential wi-fi)  Left- and right-shift of safety, reliability, regulatory constraints (remember case studies)  New meaning for “interoperability” – “inter-responsibility” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 41. Forensics  Big Data may be needed for full stack playback  Full stack for After Action Review is still immature with forensics professionals  Even large firms may not be staffed with forensics specialists  Big surprise may be in store when breach or litigation occurs Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 42. Federation & Supply Chain  Facebook/Cambridge Analytica scenario was forecast in V1  Supply Chains that have been casual need upgrades  Risk often increases as organizational size decreases  Cost of “keeping data around” dangerously close to zero  Conventional systems taxed to handle volume of identity management  Access is infrequently leased  Simplistic network zones fail to isolate subcomponents important to domain experts Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 43. Corporate Initiatives  Environmental Social Governance  Transparency within employee groups, departments, subsidiaries (See P7005)  Computing decisions that affect carbon footprint (green data centers, etc.)  Individual practitioners have greater influence than before  Disclaimers in developer contract work  Offshore culture: some workers may be afraid to question requirements, risk-taking  Whistle-blower (a la Bug Bounty) not working well yet Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 44. Who Decides? Some Opinions  Requirements Engineering may need a refresher, uplift  System Architects must continuously place controls in hands of domain experts  This is counter to the “sysadmin” design pattern  Risks multiply in part due to the commercial deprecation of documentation, manuals  Boundaries of safe & manageable release pipelines may have already been exceeded (mobile)  “Explain this” mentality partly offsets the DIY developer syndrome  Good for self-education, but the problem is not defining “ethics”  On-demand microlearning must accompany microservices deployment  AI Agents: Can ask, “Why?” “Who?” and nudge ethical considerations Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 45. Value Chain – Reference Model Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 46. Bibliography Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, and Marty J. Wolf. 2017. Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. Commun. ACM 60, 5 (April 2017), 105-111. DOI: https://doi.org/10.1145/3072528 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 47. Related Work  NIST 800-53 Rev 5 and others, NIST Cloud Security, NIST RMF  Building, Auto Automation ISO 29481, 16739, 12006  https://www.buildingsmart.org/about/what-is-openbim/ifc-introduction  Uptane  Ethics and Societal Considerations ISO 26000, IEEE P70nn  DevOps Security IEEE P2675  Microsegmentation and NFV IEEE P1915.1  Safety orientation  Infrastructure as code  E.g., security tooling is code, playbooks are code Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 48. Revision History Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end Vers Date Change 1.0 2018-05-25 Initial draft for IEEE P2675 1.1 2018-05-29 Add explainability, clarify PII vs. Personal Information, new Airbnb reference, update traceability
  • 49. This deck is released under Creative Commons Attribution-Share Alike. Portions of the work summarized was developed by multiple contributors through the NIST open public working group framework under the leadership of Wo Chang, but this document represents my views alone. https://bigdatawg.nist.gov | govNISTBig Databig data securityBig Data SecPriv V2 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 50. Background: NIST Big Data PWG Other insights from the NIST Big Data Public Working Group Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 51. What’s Different about Big Data (OLD NEWS)  Multiple security schemes, attack vectors, countermeasures  May have streamed data frameworks + data at rest  Sensor Sensibility  Unintended uses and deanonymization  Often multi-organizational (most standards built for single-org adoption)  Problems of scale and complexity, veracity, content, provenance, jurisdiction  Data and code shared across organizations  Big data power wielded by smaller organizations with weak governance, training, regs Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 52. Fluff  Security and privacy are affected by all dimensions:  Volume  Velocity  Variety  Veracity (Provenance)  Volatility  Cloud Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 53. Less Fluffy  Big Data partly side effect of SDLC shifts  Agile  API-First  Microservices / Containerization  Deprecated but not forgotten: Components, Composable Services  SDN, 5G  Left Shift (DevOps)  DevSecOps  Model portability: CrispDM (IBM SPSS link), OMG DOL (Distributed Ontology, Model & Spec Language, link)  IoT (Distributed Computing c. 1970-present) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 54. Key Trends  Cloud (centralization, scale, code-sharing)  IoT, especially health & safety related  Mobility and pervasive human-computer interactions (Alexa, etc.)  Data Center automation (scripting -> DevOps code, “left-shift”)  Trust and Federation (related: Blockchain)  Domain automation (E.g., smart buildings, autonomous vehicles, FIBO)  ABAC more than RBAC Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 55. Use Cases  Network Protection  Systems Health & Management (AWS metrics, billing, performance)  Education  Cargo Shipping  Aviation (safety)  UAV, UGV regulation  Regulated Government Privacy (FERPA, HIPAA, COPPA, GDPR, PCI etc.)  Healthcare Consent Models  HL7 FHIR Security and Privacy link Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 56. Liaison  NIST (mostly 1:1 contacts, catalog of cited SPs and standards)  IEEE P2675 Security for DevOps  IEEE P1915.1 NFV and SDN Security, 5G (1:1 via AT&T)  IEEE P7000-P7010 (S&P in robotics: algorithms, student data, safety & resilience, etc.)  ISO 20546 20547 Big Data  IEEE Product Safety Engineering Society  IEEE Reliability Engineering  IEEE Society for Social Implications of Technology  HL7 FHIR Security Audit WG  Cloud Native SAFE Computing (Kubernetes-centric)  Academic cryptography experts Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 57. Contributions of this SP  Checklists  Deep bibliography  Consent and Break-Glass after HL7  Centrality of Domain Models  Simulation  Security/Privacy modeled after Safety frameworks  E.g., data / code toxicity (after Material Data Safety standard link)  “System Communicator” Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 58. Value Chain – Reference Model Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 59. ACM Computing Classification Security & Privacy Topics  Database and storage security  Data anonymization and sanitation  Management and querying of encrypted data  Information accountability and usage control  Database activity monitoring  Software and application security  Software security engineering  Web application security  Social network security and privacy  Domain-specific security and privacy architectures  Software reverse engineering  Human and societal aspects of security and privacy  Economics of security and privacy  Social aspects of security and privacy  Privacy protections  Usability in security and privacy Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 60. Conceptual Taxonomy Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end Security and Privacy Conceptual Taxonomy Data Confidentiality Provenance System Health Public Policy, Social, and Cross- Organizational Topics
  • 61. Operational Taxonomy Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end Security and Privacy Operational Taxonomy Device and Application Registration Identity and Access Management Data Governance Infrastructure Management Risk and Accountability
  • 62. NBD SP Security & Privacy Safety: Conformance Levels  General approach: ISO 17021, 17067, 17023 Conformity Assessment  Sets forth suggested levels of conformance:  Safety Level 1, 2 & 3  Self-administered  Mechanics at Level 3  Automated use of domain models for Security Operations  Security and privacy risks driven to IDE  Continuous Test (left- & right-shift of code) Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 63. Value of Security Ontologies (Obrst, Chase, & Markeloff, 2012) Note that systematic use of ontologies could enable information security tools to process standardized information streams from third parties, using methods such as the Security Content Automation Protocol (SCAP). This model could enable automated reasoning to address potential breaches closer to real time, or which have indirect effects on networks or applications which require a mixture of human and machine cognition. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 64. Privacy and Security Fabric  “Fabric” notion adopted by several organizations  Fabric to cover multiple layers, facets, technologies  Dissolving distinction between security and privacy Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 65. Snips from NBDPWG V2 Appendix A  Best practices for ABAC  Integration of legacy RBAC with ABAC  Derivation of ABAC from other model formats  Kubernetes walkthrough  Container and Microservice ABAC  Log analysis for Splunk Security Operations / Application design patterns Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 66. Appendix A  There is more . . . Refer to Appendix A in the full document. The preceding slides were an excerpt. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 67. Background Material NBDPWG Appendix A, Cloud Native SAFE Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 68. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 69. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 70. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 71. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 72. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 73. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 74. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 75. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 76. Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 77. CRISP-DM Process Model Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 78. Cloud Native Foundation Safe Access For Everyone (SAFE)  https://github.com/cn-security/safe Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end
  • 79. This deck is released under Creative Commons Attribution-Share Alike. Portions of the work summarized was developed by multiple contributors through the NIST open public working group framework under the leadership of Wo Chang, but this document represents my views alone. https://bigdatawg.nist.gov | govNISTBig Databig data securityBig Data SecPriv V2 Mark Underwood @knowlengr | Synchrony | Views my own | DevOps SDLC Ethics | dark@computer.org | v1.1 | Rev History @ end