SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Downloaden Sie, um offline zu lesen
Old West Edition
Practical
DevSecOps
Fundamentals of Successful Programs
HOWDY!
● Reformed programmer & AppSec Engineer
● Noname Security - Distinguished Engineer
● 14 years in the OWASP Community
○ OWASP DefectDojo (core maintainer)
○ OWASP AppSec Pipeline (co-leader)
○ OWASP WTE (leader)
● 22 + years using FLOSS & Linux
● Currently a Go language fanboy
● Ee Dan in Tang Soo Do Mi Guk Kwan
(2nd degree black belt)
● Founder 10Security
Starting from
Zero
Steps 2 Take
Example of how to
expand your horizon
1 Final Thought
Conclusions and key
takeaways
How this whole thing got
started
3 Ways of
DevOps
Crawl, walk run with
DevSecOps
TABLE OF CONTENTS
2
4
3
1
Starting
from Zero
1
And maybe heading towards hero
Steam Locomotives
The Iron Horse Straddles
America
● Radically changed travel in the US
● Travel time across the US
○ Pre-train: 6 months + $1,000
○ Post-train: 1 week + $150
● Town that had a stop prospered
○ Those that didn’t, faded away
Trains == Change
● Trains changed the landscape for better or worse
● The US ‘got smaller’ - travel was in reach to more people
● Expanded markets, more customers
● ‘Cost’ of going west went way down
Trains <==> DevSecOps
● Trains changed the landscape for better or worse
DevSecOps changed IT for better or worse
● The US ‘got smaller’ - travel was in reach to more people
Batch / change size got smaller (CICD)
● Expanded markets, more customers
Increased agility, more customers
● ‘Cost’ of going west went way down
‘Cost’ of experiments goes way down
When will we see this?
DevSecOps AppSec
Your bit of
IT here
3 Ways of
DevOps
2
Before there was DevSecOps, there was DevOps
Workflow
?
?
The 3 ways of DevOs
1
3
2
Look at your purpose and those
processes which aid it
● Make sure the process is correct from the beginning to end
then look at ways to speed up that process
● Value Stream - the name of the process which provides value to the
business
● Working from left to right e.g. like a timeline
business / development => customer / operations
● Flow [rate] - speed work goes through the process.
#1 Workflow
Each Step Repeatable
#1 Workflow
● Remove all haphazard and ad hoc work from the process
● Repeat until stable
○ I like doing the first couple of times manually with a ‘run book’
● Scripting languages are your friends
● Config Mgmt - Puppet, Chef, Salt, Ansible, Terraform, Helm, …
● Create deployable artifacts from a branch/release e.g. .rpm, .deb, .msi, …
● Make sure what you do can be done once or 10,000 times
Never Pass along Defects
#1 Workflow
● While working left to right, don’t pass on failures
● Test early and often
● Increase rigor of testing as you work left to right
● When a failure occurs, end that flow and start a new one (after corrections)
● The further right you are, the more expensive failure is
○ Concentrate your early work on the left side (intake)
● e.g. in AppSec, defects are false positive findings
Local Optimizations with a
Global View
#1 Workflow
● Ensure no single-step optimizations degrade the overall performance of the
workflow
● Find the bottleneck in your workflow and start there
○ Upstream changes will just back things up
○ Downstream changes won’t manifest since input is constrained
● Each new optimization creates a new bottleneck
○ Iterate on these
Increase the flow of work
#1 Workflow
● Make sure you have a well-defined, repeatable process first
● Look for manual steps that can be automated
● Look for duplicate work that can be removed or eliminated
● Measuring/tracking time taken at each step is crucial
● Ask yourself:
Where does the flow ebb?
Workflow
Improve Feedback
?
The 3 ways of DevOs
1
3
2
Open yourself to upstream and
downstream information
#2 Improve Feedback
● Feedback loops occur when information is gathered from
○ upstream (business / development)
○ downstream (customer / operations)
● Make visible problems, concerns, potential improvements
○ Share this broadly inside the company
● Learn as you move left to right so improvements aren’t lost
● Requests are opportunities to better fulfill business’s needs
○ There’s rarely enough feedback, capture and look for more
○ Feedback collected can be used to optimally improve the system
Understand and Respond to your
Customers
#2 Improve Feedback
● Customers are also inside your business
● Customer is more than the end ‘consumer’ at the end of the process
○ Each step is the customer of the previous step
○ Understand what the next steps need from you to succeed
● Remember, feedback isn’t guaranteed
○ Encourage it by responding
● Responses are required of external and internal customers
● Make feedback & responding quick, easy and readily available
Shorten Feedback Loops
#2 Improve Feedback
● Remove any intermediaries and impediments to feedback
● Communicate as directly as possible, skipping steps/people if possible
○ e.g . The person who finds a problem communicates with the person
who fixes the problem
● The more hands that hold the feedback, the more change to get garbled
● If possible, intermediaries should be software, not people
● Whispered secret across a classroom
○ How much change occurs?
Amplify All Feedback
#2 Improve Feedback
● Shout it from the mountain tops
● No heroes quietly fixing things or applying workarounds
● Open, honest communication of feedback, especially of problems
○ File a bug report
○ Halt the process at that step (e.g. pull the Andon cord to stop the line)
● Make having problems OK and hiding problems a fireable offense
○ GM and all those green status sheets…
Embed Knowledge where Needed
#2 Improve Feedback
● Keep specialized knowledge out of people’s heads and into the system
○ Special configurations, business requirements, etc
○ Check it into source control - automatic versioning!
● git blame anyone? Find out where/when regressions occurred
● Moving left to right, keep info in the stage that requires it
● Docs to build a package stored in the repo for that package
● Deploy automation in the repo with configuration templates, etc
Workflow
Improve Feedback
Continual Experimentation
& Learning
The 3 ways of DevOs
1
3
2
Create a culture of innovation and
experimentation
#3 Continual Experiments
● The fundamentals are now solid, what can your new knowledge buy you?
● The business culture must allow for and embrace innovation &
experimentation
● Two essential things must be understood by the business
○ We can learn from failed experiments / risks we take
○ Mastery comes from repetition and practice
● And you won’t be a master the first N times you practice
“I fear not the
man who has
practiced ten
thousand kicks
once,
But I fear the man
who has practiced
one kick ten
thousand times.”
Rituals are created that reward
risk taking
#3 Continual Experiments
● Reward risk + learning
● Don’t just talk about rewarding risk, walk the walk
● Trying new things and failing is OK when you gain knowledge
● Consider this creating your own feedback in a very tight loop
● Get real about this:
○ Failures should be noted positively in annual reviews
if and only if a lesson was learned
● Edison invented the lightbulb by running out of things that didn’t work
Mgmt allocates time for projects
to improve the system
#3 Continual Experiments
● Plan to improve or you’re planning on stagnation
● Invest in improving the system created
○ By providing value to the business,
it should want to maximize that return
● Prune any technical debt - all debt is not bad
○ Some is good, none has opportunity costs, too much will crush you
● Amplifying feedback helps sell this to the business
● Can keep mistakes from being repeated
Faults are introduced to increase
resilience
#3 Continual Experiments
● Practice emergencies so emergencies feel routine
● Think fire drills aka Chaos Monkey
● You need to be a very mature org to do this
● Wonderful feedback look
○ How would your programming change if you knew the DB could
disappear at any second?
● How else to check redundancy?
○ e.g. Think ‘trying to restore from backups’ after they were encrypted by
malware
Try crazy or audacious things
#3 Continual Experiments
● Stretch out of your comfort zone
● Requires embracing failures since many of these won’t work
● Forces out-of-the-box thinking
● Provides new perspectives on existing systems
○ You may thing A will break first, but B falls over instead
● Can help find false bottlenecks, bad assumptions, the dreaded “unknown
unknowns”
● Yet another source of feedback so make sure and learn from it publicly
The Phoenix
Project
_If you haven’t_
_read that yet…
Right after this talk is over, go out and
get this book & “Beyond The Phoenix
Project” to read them. Period
Steps 2 Take
3
Iterate from zero to hero
Introducing AppSec Pipelines
Key features of AppSec Pipelines
AppSec Pipelines
● Designed for iterative improvement
● Provides a re-usable path for AppSec activities
● Provides a consistent process for both the team and your constituency
● One way flow with well defined states
● Relies heavily on automation
● Grow functionality organically over time
● Gracefully interconnects with the development process (e.g customers)
AppSec Pipelines
Gen 1 Pipelines
Look at your team’s purpose and
those processes which aid it
Spending time
optimizing
anything other
than the critical
resource is an
illusion
_W. Edwards Deming_
AppSec Personnelle
Critical Resource
● They are the critical resource
- optimize their work
● Automate things that don’t require a human brain
● Drive up consistency
● Increase tracking of work status
● Increase flow through the pipeline
● Increase visibility and metrics
● Reduce any dev team friction with application security
Gen 1 Pipeline
Then,
once your house
is in order…
Gen 2 Pipelines
Look outside at your team’s purpose and
those processes which aid it
Gen 2 Pipeline
Dev Pipeline AppSec Pipeline
Drop tool(s)
into
their pipeline
Weaponizing CICD
Gen 2 Pipelines
● Zero false positives
○ Pretend FPs give you anaphylactic shock
● Health Checks vs Scanning
○ Run health checks all the time
● Home of specific issue tests
○ Find a vulnerability, write a test
● Cadence for longer running tests
○ These NEVER break a build
○ Every X builds or every Y days
Gen 2 Pipeline
(A minor aside)
Single source of truth for findings
OWASP DefectDojo
● AppSec Programs, QA / QE, Product Security, Pen Testers
○ Custom report generation
○ Metrics and Dashboards
○ App and Infrastructure findings
○ 150+ security tools supported
● OWASP Flagship project, 8+ years being open sourced from Rackspace
● Community and contributor friendly
○ 305 contributors
● Github: 2.4k stars, 1.1k forks, monthly releases
The Heart of your DevSecOps
OWASP DefectDojo
Gen 3 Pipelines
Look to scale your team’s reach and
dramatically increase speed and visibility
What is a Gen 3 Pipeline?
Gen 3 Pipelines
● A way to conduct AppSec testing in an automated fashion
● Run by the AppSec team for the AppSec team to:
○ Provide visibility into software security
○ Provide security findings to the dev teams
● A means to scale the AppSec team coverage
○ Not in-depth testing but “you must be this high”
○ Allow some testing to be ‘pre-calculated’ for
manual assessments
○ Event-driven (mostly) or on a schedule
● Creates a baseline of security
What a Gen 3 Pipeline isn’t:
Gen 3 Pipelines
● Magic pixie dust
● A gate blocking production deploys
● Something to add to existing CICD systems
● Pipelines create artifacts
○ CICD artifacts are a deployed app
○ AppSec Pipeline artifacts are security findings
Gen 3 Pipelines
Gen 3 Pipelines
AppSec Pipeline evolution
1
2
3
Gen 1
Your team's
purpose and
what aids it
Gen 2
Look outside
your teams
purpose and
what aids it
Gen 3
Event Driven,
inter-connected
pipelines
Iteration will be required
Iteration will be required
Obligatory
coffee stain
1 Final Thought
4
Conclusions and Key Takeaways
● Reverse IP Lookup
● IP reputation
● IP blacklist check
● Domain reputation
● Known IP
(aka we own it)
● Check IP against our
cloud account
OK, AppSec, what else?
DFIR ● Who registered the
domain
● How long registered
● Shodan lookup
● Geolocate IP
● Whois
● Check against threat
intel feed(s)
Useage
5,100 Runs
25k+
Container Executions
Size
15 Repos
4 months
Event-driven Pipeline numbers
2014 2015 2016
Number of
Assessments 44 224 414
Headcount N/A -3.5 -2
Percentage
Increase N/A 450% 107%
AppSec Program Numbers
840.91%
Percentage Increase
From 2014 - 2016
What are you waiting for…
● Build a Pipeline & remove painful drudgery
from your life
● Co-opt good ideas from other disciplines
● Get your DevSecOps on!
TLDR for this talk
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, and infographics &
images by Freepik
THANKS!
matt.tesauro@owasp.org
mattt@nonamesecurity.com
Twitter: matt_tesauro
Do you have any questions?

Weitere ähnliche Inhalte

Was ist angesagt?

OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityMatt Tesauro
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityMohammed Fazuluddin
 
API Testing with Frisby and Mocha
API Testing with Frisby and MochaAPI Testing with Frisby and Mocha
API Testing with Frisby and MochaLyudmila Anisimova
 
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...gmaran23
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
API Testing and Hacking (1).pdf
API Testing and Hacking (1).pdfAPI Testing and Hacking (1).pdf
API Testing and Hacking (1).pdfVishwas N
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
 
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
Frida  Android run time hooking - Bhargav Gajera & Vitthal ShindeFrida  Android run time hooking - Bhargav Gajera & Vitthal Shinde
Frida Android run time hooking - Bhargav Gajera & Vitthal ShindeNSConclave
 
Hackfest presentation.pptx
Hackfest presentation.pptxHackfest presentation.pptx
Hackfest presentation.pptxPeter Yaworski
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentestersAPI Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentestersInon Shkedy
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and GuidelinesWSO2
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAjin Abraham
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 

Was ist angesagt? (20)

OWASP Top Ten 2017
OWASP Top Ten 2017OWASP Top Ten 2017
OWASP Top Ten 2017
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API Security
 
API Testing with Frisby and Mocha
API Testing with Frisby and MochaAPI Testing with Frisby and Mocha
API Testing with Frisby and Mocha
 
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
API Testing and Hacking (1).pdf
API Testing and Hacking (1).pdfAPI Testing and Hacking (1).pdf
API Testing and Hacking (1).pdf
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
Frida  Android run time hooking - Bhargav Gajera & Vitthal ShindeFrida  Android run time hooking - Bhargav Gajera & Vitthal Shinde
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
 
Belajar Postman test runner
Belajar Postman test runnerBelajar Postman test runner
Belajar Postman test runner
 
Hackfest presentation.pptx
Hackfest presentation.pptxHackfest presentation.pptx
Hackfest presentation.pptx
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentestersAPI Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 

Ähnlich wie Practical DevSecOps: Fundamentals of Successful Programs

How to be a 10x Engineer
How to be a 10x EngineerHow to be a 10x Engineer
How to be a 10x EngineerNick Sullivan
 
August: DevOps 101 (in lieu of DevOps Patterns Distilled)
August: DevOps 101 (in lieu of DevOps Patterns Distilled)August: DevOps 101 (in lieu of DevOps Patterns Distilled)
August: DevOps 101 (in lieu of DevOps Patterns Distilled)TriTAUG
 
Agile practices for management
Agile practices for managementAgile practices for management
Agile practices for managementIcalia Labs
 
Frug'Agile 2021: Agile as doctrine (and that's a good thing)
Frug'Agile 2021: Agile as doctrine (and that's a good thing)Frug'Agile 2021: Agile as doctrine (and that's a good thing)
Frug'Agile 2021: Agile as doctrine (and that's a good thing)Jason Yip
 
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...Estimations, Expectations, and Evolution During a Project's Journey from RFP ...
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...Rick Manelius
 
Devops, Secops, Opsec, DevSec *ops *.* ?
Devops, Secops, Opsec, DevSec *ops *.* ?Devops, Secops, Opsec, DevSec *ops *.* ?
Devops, Secops, Opsec, DevSec *ops *.* ?Kris Buytaert
 
Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Matt Tesauro
 
Test strategy
Test strategyTest strategy
Test strategyadarsh j
 
Indix Engineering Culture Code (2015)
Indix Engineering Culture Code (2015)Indix Engineering Culture Code (2015)
Indix Engineering Culture Code (2015)Rajesh Muppalla
 
Agile and test driven development
Agile and test driven developmentAgile and test driven development
Agile and test driven developmentAhmed El-Deeb
 
Devops, the future is here it's not evenly distributed yet
Devops, the future is here it's not evenly distributed yetDevops, the future is here it's not evenly distributed yet
Devops, the future is here it's not evenly distributed yetKris Buytaert
 
Introducing Agile Methodologies
Introducing Agile MethodologiesIntroducing Agile Methodologies
Introducing Agile MethodologiesStfalcon Meetups
 
How to deliver the right software (Specification by example)
How to deliver the right software (Specification by example)How to deliver the right software (Specification by example)
How to deliver the right software (Specification by example)Asier Barrenetxea
 
Agile Fundamentals and Best Practices (with Trello)
Agile Fundamentals and Best Practices (with Trello)Agile Fundamentals and Best Practices (with Trello)
Agile Fundamentals and Best Practices (with Trello)Filippo Zanella
 
Managing software projects & teams effectively
Managing software projects & teams effectivelyManaging software projects & teams effectively
Managing software projects & teams effectivelyAshutosh Agarwal
 
unit-1 agile development.pptx
unit-1 agile development.pptxunit-1 agile development.pptx
unit-1 agile development.pptxDhruvSuthar24
 
Post-Agile Methodologies and all that Jazz
Post-Agile Methodologies and all that JazzPost-Agile Methodologies and all that Jazz
Post-Agile Methodologies and all that JazzStojan Peshov
 
Running lean startup with agile 20130810
Running lean startup with agile 20130810Running lean startup with agile 20130810
Running lean startup with agile 20130810Kulawat Wongsaroj
 
Introduction to Scrum
Introduction to ScrumIntroduction to Scrum
Introduction to ScrumBixlabs
 
Usa prácticas de integración continua y sobrevive para luchar otro día.
 Usa prácticas de integración continua y sobrevive para luchar otro día. Usa prácticas de integración continua y sobrevive para luchar otro día.
Usa prácticas de integración continua y sobrevive para luchar otro día.Software Guru
 

Ähnlich wie Practical DevSecOps: Fundamentals of Successful Programs (20)

How to be a 10x Engineer
How to be a 10x EngineerHow to be a 10x Engineer
How to be a 10x Engineer
 
August: DevOps 101 (in lieu of DevOps Patterns Distilled)
August: DevOps 101 (in lieu of DevOps Patterns Distilled)August: DevOps 101 (in lieu of DevOps Patterns Distilled)
August: DevOps 101 (in lieu of DevOps Patterns Distilled)
 
Agile practices for management
Agile practices for managementAgile practices for management
Agile practices for management
 
Frug'Agile 2021: Agile as doctrine (and that's a good thing)
Frug'Agile 2021: Agile as doctrine (and that's a good thing)Frug'Agile 2021: Agile as doctrine (and that's a good thing)
Frug'Agile 2021: Agile as doctrine (and that's a good thing)
 
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...Estimations, Expectations, and Evolution During a Project's Journey from RFP ...
Estimations, Expectations, and Evolution During a Project's Journey from RFP ...
 
Devops, Secops, Opsec, DevSec *ops *.* ?
Devops, Secops, Opsec, DevSec *ops *.* ?Devops, Secops, Opsec, DevSec *ops *.* ?
Devops, Secops, Opsec, DevSec *ops *.* ?
 
Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023
 
Test strategy
Test strategyTest strategy
Test strategy
 
Indix Engineering Culture Code (2015)
Indix Engineering Culture Code (2015)Indix Engineering Culture Code (2015)
Indix Engineering Culture Code (2015)
 
Agile and test driven development
Agile and test driven developmentAgile and test driven development
Agile and test driven development
 
Devops, the future is here it's not evenly distributed yet
Devops, the future is here it's not evenly distributed yetDevops, the future is here it's not evenly distributed yet
Devops, the future is here it's not evenly distributed yet
 
Introducing Agile Methodologies
Introducing Agile MethodologiesIntroducing Agile Methodologies
Introducing Agile Methodologies
 
How to deliver the right software (Specification by example)
How to deliver the right software (Specification by example)How to deliver the right software (Specification by example)
How to deliver the right software (Specification by example)
 
Agile Fundamentals and Best Practices (with Trello)
Agile Fundamentals and Best Practices (with Trello)Agile Fundamentals and Best Practices (with Trello)
Agile Fundamentals and Best Practices (with Trello)
 
Managing software projects & teams effectively
Managing software projects & teams effectivelyManaging software projects & teams effectively
Managing software projects & teams effectively
 
unit-1 agile development.pptx
unit-1 agile development.pptxunit-1 agile development.pptx
unit-1 agile development.pptx
 
Post-Agile Methodologies and all that Jazz
Post-Agile Methodologies and all that JazzPost-Agile Methodologies and all that Jazz
Post-Agile Methodologies and all that Jazz
 
Running lean startup with agile 20130810
Running lean startup with agile 20130810Running lean startup with agile 20130810
Running lean startup with agile 20130810
 
Introduction to Scrum
Introduction to ScrumIntroduction to Scrum
Introduction to Scrum
 
Usa prácticas de integración continua y sobrevive para luchar otro día.
 Usa prácticas de integración continua y sobrevive para luchar otro día. Usa prácticas de integración continua y sobrevive para luchar otro día.
Usa prácticas de integración continua y sobrevive para luchar otro día.
 

Mehr von Matt Tesauro

Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API LandscapeMatt Tesauro
 
The Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingThe Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingMatt Tesauro
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandMatt Tesauro
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityMatt Tesauro
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.Matt Tesauro
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachMatt Tesauro
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with ScissorsMatt Tesauro
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program Matt Tesauro
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityMatt Tesauro
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramMatt Tesauro
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterMatt Tesauro
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015Matt Tesauro
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestMatt Tesauro
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineMatt Tesauro
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt Tesauro
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeMatt Tesauro
 
Dev ops hackformers-matt-tesauro
Dev ops hackformers-matt-tesauroDev ops hackformers-matt-tesauro
Dev ops hackformers-matt-tesauroMatt Tesauro
 
Making security-agile matt-tesauro
Making security-agile matt-tesauroMaking security-agile matt-tesauro
Making security-agile matt-tesauroMatt Tesauro
 
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinDev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinMatt Tesauro
 

Mehr von Matt Tesauro (20)

Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API Landscape
 
The Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingThe Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security Testing
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP Switzerland
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into security
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's Reach
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with Scissors
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
 
Dev ops hackformers-matt-tesauro
Dev ops hackformers-matt-tesauroDev ops hackformers-matt-tesauro
Dev ops hackformers-matt-tesauro
 
Making security-agile matt-tesauro
Making security-agile matt-tesauroMaking security-agile matt-tesauro
Making security-agile matt-tesauro
 
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinDev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Practical DevSecOps: Fundamentals of Successful Programs

  • 2. HOWDY! ● Reformed programmer & AppSec Engineer ● Noname Security - Distinguished Engineer ● 14 years in the OWASP Community ○ OWASP DefectDojo (core maintainer) ○ OWASP AppSec Pipeline (co-leader) ○ OWASP WTE (leader) ● 22 + years using FLOSS & Linux ● Currently a Go language fanboy ● Ee Dan in Tang Soo Do Mi Guk Kwan (2nd degree black belt) ● Founder 10Security
  • 3. Starting from Zero Steps 2 Take Example of how to expand your horizon 1 Final Thought Conclusions and key takeaways How this whole thing got started 3 Ways of DevOps Crawl, walk run with DevSecOps TABLE OF CONTENTS 2 4 3 1
  • 4. Starting from Zero 1 And maybe heading towards hero
  • 6. The Iron Horse Straddles America ● Radically changed travel in the US ● Travel time across the US ○ Pre-train: 6 months + $1,000 ○ Post-train: 1 week + $150 ● Town that had a stop prospered ○ Those that didn’t, faded away
  • 7. Trains == Change ● Trains changed the landscape for better or worse ● The US ‘got smaller’ - travel was in reach to more people ● Expanded markets, more customers ● ‘Cost’ of going west went way down
  • 8. Trains <==> DevSecOps ● Trains changed the landscape for better or worse DevSecOps changed IT for better or worse ● The US ‘got smaller’ - travel was in reach to more people Batch / change size got smaller (CICD) ● Expanded markets, more customers Increased agility, more customers ● ‘Cost’ of going west went way down ‘Cost’ of experiments goes way down
  • 9. When will we see this? DevSecOps AppSec Your bit of IT here
  • 10. 3 Ways of DevOps 2 Before there was DevSecOps, there was DevOps
  • 11. Workflow ? ? The 3 ways of DevOs 1 3 2
  • 12. Look at your purpose and those processes which aid it ● Make sure the process is correct from the beginning to end then look at ways to speed up that process ● Value Stream - the name of the process which provides value to the business ● Working from left to right e.g. like a timeline business / development => customer / operations ● Flow [rate] - speed work goes through the process. #1 Workflow
  • 13. Each Step Repeatable #1 Workflow ● Remove all haphazard and ad hoc work from the process ● Repeat until stable ○ I like doing the first couple of times manually with a ‘run book’ ● Scripting languages are your friends ● Config Mgmt - Puppet, Chef, Salt, Ansible, Terraform, Helm, … ● Create deployable artifacts from a branch/release e.g. .rpm, .deb, .msi, … ● Make sure what you do can be done once or 10,000 times
  • 14. Never Pass along Defects #1 Workflow ● While working left to right, don’t pass on failures ● Test early and often ● Increase rigor of testing as you work left to right ● When a failure occurs, end that flow and start a new one (after corrections) ● The further right you are, the more expensive failure is ○ Concentrate your early work on the left side (intake) ● e.g. in AppSec, defects are false positive findings
  • 15. Local Optimizations with a Global View #1 Workflow ● Ensure no single-step optimizations degrade the overall performance of the workflow ● Find the bottleneck in your workflow and start there ○ Upstream changes will just back things up ○ Downstream changes won’t manifest since input is constrained ● Each new optimization creates a new bottleneck ○ Iterate on these
  • 16. Increase the flow of work #1 Workflow ● Make sure you have a well-defined, repeatable process first ● Look for manual steps that can be automated ● Look for duplicate work that can be removed or eliminated ● Measuring/tracking time taken at each step is crucial ● Ask yourself: Where does the flow ebb?
  • 17. Workflow Improve Feedback ? The 3 ways of DevOs 1 3 2
  • 18. Open yourself to upstream and downstream information #2 Improve Feedback ● Feedback loops occur when information is gathered from ○ upstream (business / development) ○ downstream (customer / operations) ● Make visible problems, concerns, potential improvements ○ Share this broadly inside the company ● Learn as you move left to right so improvements aren’t lost ● Requests are opportunities to better fulfill business’s needs ○ There’s rarely enough feedback, capture and look for more ○ Feedback collected can be used to optimally improve the system
  • 19. Understand and Respond to your Customers #2 Improve Feedback ● Customers are also inside your business ● Customer is more than the end ‘consumer’ at the end of the process ○ Each step is the customer of the previous step ○ Understand what the next steps need from you to succeed ● Remember, feedback isn’t guaranteed ○ Encourage it by responding ● Responses are required of external and internal customers ● Make feedback & responding quick, easy and readily available
  • 20. Shorten Feedback Loops #2 Improve Feedback ● Remove any intermediaries and impediments to feedback ● Communicate as directly as possible, skipping steps/people if possible ○ e.g . The person who finds a problem communicates with the person who fixes the problem ● The more hands that hold the feedback, the more change to get garbled ● If possible, intermediaries should be software, not people ● Whispered secret across a classroom ○ How much change occurs?
  • 21. Amplify All Feedback #2 Improve Feedback ● Shout it from the mountain tops ● No heroes quietly fixing things or applying workarounds ● Open, honest communication of feedback, especially of problems ○ File a bug report ○ Halt the process at that step (e.g. pull the Andon cord to stop the line) ● Make having problems OK and hiding problems a fireable offense ○ GM and all those green status sheets…
  • 22. Embed Knowledge where Needed #2 Improve Feedback ● Keep specialized knowledge out of people’s heads and into the system ○ Special configurations, business requirements, etc ○ Check it into source control - automatic versioning! ● git blame anyone? Find out where/when regressions occurred ● Moving left to right, keep info in the stage that requires it ● Docs to build a package stored in the repo for that package ● Deploy automation in the repo with configuration templates, etc
  • 23. Workflow Improve Feedback Continual Experimentation & Learning The 3 ways of DevOs 1 3 2
  • 24. Create a culture of innovation and experimentation #3 Continual Experiments ● The fundamentals are now solid, what can your new knowledge buy you? ● The business culture must allow for and embrace innovation & experimentation ● Two essential things must be understood by the business ○ We can learn from failed experiments / risks we take ○ Mastery comes from repetition and practice ● And you won’t be a master the first N times you practice
  • 25. “I fear not the man who has practiced ten thousand kicks once, But I fear the man who has practiced one kick ten thousand times.”
  • 26. Rituals are created that reward risk taking #3 Continual Experiments ● Reward risk + learning ● Don’t just talk about rewarding risk, walk the walk ● Trying new things and failing is OK when you gain knowledge ● Consider this creating your own feedback in a very tight loop ● Get real about this: ○ Failures should be noted positively in annual reviews if and only if a lesson was learned ● Edison invented the lightbulb by running out of things that didn’t work
  • 27. Mgmt allocates time for projects to improve the system #3 Continual Experiments ● Plan to improve or you’re planning on stagnation ● Invest in improving the system created ○ By providing value to the business, it should want to maximize that return ● Prune any technical debt - all debt is not bad ○ Some is good, none has opportunity costs, too much will crush you ● Amplifying feedback helps sell this to the business ● Can keep mistakes from being repeated
  • 28. Faults are introduced to increase resilience #3 Continual Experiments ● Practice emergencies so emergencies feel routine ● Think fire drills aka Chaos Monkey ● You need to be a very mature org to do this ● Wonderful feedback look ○ How would your programming change if you knew the DB could disappear at any second? ● How else to check redundancy? ○ e.g. Think ‘trying to restore from backups’ after they were encrypted by malware
  • 29. Try crazy or audacious things #3 Continual Experiments ● Stretch out of your comfort zone ● Requires embracing failures since many of these won’t work ● Forces out-of-the-box thinking ● Provides new perspectives on existing systems ○ You may thing A will break first, but B falls over instead ● Can help find false bottlenecks, bad assumptions, the dreaded “unknown unknowns” ● Yet another source of feedback so make sure and learn from it publicly
  • 30. The Phoenix Project _If you haven’t_ _read that yet… Right after this talk is over, go out and get this book & “Beyond The Phoenix Project” to read them. Period
  • 31. Steps 2 Take 3 Iterate from zero to hero
  • 33. Key features of AppSec Pipelines AppSec Pipelines ● Designed for iterative improvement ● Provides a re-usable path for AppSec activities ● Provides a consistent process for both the team and your constituency ● One way flow with well defined states ● Relies heavily on automation ● Grow functionality organically over time ● Gracefully interconnects with the development process (e.g customers)
  • 35. Gen 1 Pipelines Look at your team’s purpose and those processes which aid it
  • 36. Spending time optimizing anything other than the critical resource is an illusion _W. Edwards Deming_
  • 37. AppSec Personnelle Critical Resource ● They are the critical resource - optimize their work ● Automate things that don’t require a human brain ● Drive up consistency ● Increase tracking of work status ● Increase flow through the pipeline ● Increase visibility and metrics ● Reduce any dev team friction with application security
  • 40. Gen 2 Pipelines Look outside at your team’s purpose and those processes which aid it
  • 41. Gen 2 Pipeline Dev Pipeline AppSec Pipeline Drop tool(s) into their pipeline
  • 42. Weaponizing CICD Gen 2 Pipelines ● Zero false positives ○ Pretend FPs give you anaphylactic shock ● Health Checks vs Scanning ○ Run health checks all the time ● Home of specific issue tests ○ Find a vulnerability, write a test ● Cadence for longer running tests ○ These NEVER break a build ○ Every X builds or every Y days
  • 45. Single source of truth for findings OWASP DefectDojo ● AppSec Programs, QA / QE, Product Security, Pen Testers ○ Custom report generation ○ Metrics and Dashboards ○ App and Infrastructure findings ○ 150+ security tools supported ● OWASP Flagship project, 8+ years being open sourced from Rackspace ● Community and contributor friendly ○ 305 contributors ● Github: 2.4k stars, 1.1k forks, monthly releases
  • 46. The Heart of your DevSecOps OWASP DefectDojo
  • 47. Gen 3 Pipelines Look to scale your team’s reach and dramatically increase speed and visibility
  • 48. What is a Gen 3 Pipeline? Gen 3 Pipelines ● A way to conduct AppSec testing in an automated fashion ● Run by the AppSec team for the AppSec team to: ○ Provide visibility into software security ○ Provide security findings to the dev teams ● A means to scale the AppSec team coverage ○ Not in-depth testing but “you must be this high” ○ Allow some testing to be ‘pre-calculated’ for manual assessments ○ Event-driven (mostly) or on a schedule ● Creates a baseline of security
  • 49. What a Gen 3 Pipeline isn’t: Gen 3 Pipelines ● Magic pixie dust ● A gate blocking production deploys ● Something to add to existing CICD systems ● Pipelines create artifacts ○ CICD artifacts are a deployed app ○ AppSec Pipeline artifacts are security findings
  • 50.
  • 53. AppSec Pipeline evolution 1 2 3 Gen 1 Your team's purpose and what aids it Gen 2 Look outside your teams purpose and what aids it Gen 3 Event Driven, inter-connected pipelines
  • 54. Iteration will be required
  • 55. Iteration will be required Obligatory coffee stain
  • 56. 1 Final Thought 4 Conclusions and Key Takeaways
  • 57. ● Reverse IP Lookup ● IP reputation ● IP blacklist check ● Domain reputation ● Known IP (aka we own it) ● Check IP against our cloud account OK, AppSec, what else? DFIR ● Who registered the domain ● How long registered ● Shodan lookup ● Geolocate IP ● Whois ● Check against threat intel feed(s)
  • 58. Useage 5,100 Runs 25k+ Container Executions Size 15 Repos 4 months Event-driven Pipeline numbers
  • 59. 2014 2015 2016 Number of Assessments 44 224 414 Headcount N/A -3.5 -2 Percentage Increase N/A 450% 107% AppSec Program Numbers
  • 61. What are you waiting for… ● Build a Pipeline & remove painful drudgery from your life ● Co-opt good ideas from other disciplines ● Get your DevSecOps on!
  • 63. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik THANKS! matt.tesauro@owasp.org mattt@nonamesecurity.com Twitter: matt_tesauro Do you have any questions?