SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Rajiv Kadayam
© 2016 eGlobalTech. All rights reserved.
Succeeding in the Marriage of
Cybersecurity and DevOps
2
About Rajiv & eGT
 Executive Technologist
 Product Owner
 Agile Manager/Coach
 Solutions Architect
 Sr. Director, Technology
Strategy
 Dad / Hubby
• Established in 2004
• Agile Development & DevOps
• Cloud Migration & Enablement
• Cybersecurity & Information
Assurance
• eGT Labs – skunk works !
• 30+ federal agencies
Best of times…and Worst of times..
3
Businesses need to deliver faster and be more responsive
Align organizational units to rally behind one common goal
Continuously assess, monitor, prevent, and counter security risks and issues
Leverage technology, automation and agile practices to achieve all of the above
• E-Commerce Transactions to pass $1.5 Trillion/year
• Era of Digital & Connected Lives – mobile, cloud, wearables, social
• B2B ecommerce predicted to hit $6.7T/year by 2020
• 47% of American adults had their personal information stolen by hackers
• Cyber crime costs businesses $400+ Billion/year - McAfee, 2014
Stone Age IT
4
Development OperationsCybersecurity QA and TestingEnterprise
Architecture
 Messages lost in translation
 Slow & unwieldy
 Too much finger pointing
 Ultimately business suffers and people too…
Initiation & Planning Requirements
Definition
Design Development Testing Implementation
Operations &
Maintenance
Enter Agile Development Methodology
5
Automated
Deployment
Continuous
Integration
Automated
Code Review
Product / Release Backlog
Sprint Backlog
System
Releases
Continuous feedback loop
Production
Development
Testing/Demo
Test
Driven
Development
Iterative
Development
& Testing
 Scrum
 Kanban
 Lean
 SAFe
Initiation & Planning Requirements
Definition
Design Development Testing Implementation
Operations &
Maintenance
Agile as a means to develop solutions faster, release
frequently and incorporate feedback continuously
Gradual Agile Transformation
6
Development
Operations
Cybersecurity
QA and Testing
Enterprise
Architecture
Other
Stakeholders
More and more
federal agencies
are adopting agile
Some agencies
have adopted
DevOps
Very few agencies are
truly performing blue-
green deployments
Need to break walls and build a tighter trust circle
Agile Software
Development
&
DevOps
Agencies are
plagued with
security
concerns –
preventing
DevOps
transformation
DevOps + Cybersecurity  DevOpsSec
 Yes, but what about Testing, Users, Requirements, EA ?
 ReqEADevTestingSecOps ?
 DevOps => More than just “Development” and
“Operations”
 Philosophy , Culture, Process, Automation, Tools &
Continuous Learning
 By Practitioners - For Practitioners
7
DevOps & Cybersecurity – Flipping Resistance  Results
8
Challenges
• Organizational hierarchies
• Lack of domain understanding
• RMF, NIST Controls
• Emerging / Open Source Tech
• Different tools and processes
• Different objectives –
• DevOps: Deliver Faster vs Security:
Protect Information
Opportunities
Secure Designs, Robust Solutions,
Reduced $Costs$
Integrate and automate delivery
pipeline – Accelerate time to
Market
Respond faster to business
Enhanced Transparency, Visibility
and Accountability
Keys to a Successful Marriage of DevOps & Cybersecurity
9
#1 – Come together - Establish Common Process Framework
• Integrate and Align SDLC and RMF
• Concurrently execute lifecycle phases
• Peer review and validate work products
• Reinforce security mindset in every step of the process.
• Universal visibility, transparency, and accountability
10
NIST Risk
Management
Framework
Software
Development
Lifecycle
+
Categorize
Information
System
Select
Security
Controls
Implement
Security
Controls
Assess
Security
Controls
Authorize
Information
System
Monitor
Security
Controls
Initiation
&
Planning
Requirements
Design
Development
Testing
Implementation
Operations
&
Maintenance
DevOps Factory
11
Machine enforced
governance
and compliance established
by fully automated CI/CD
process expressed in code
#2 – Be kind to your partner - Commit to Collaborate
12
DevOpsCybersecurity
Target solution
must properly
address all
required NIST
security controls !
• Truly bring disparate teams together to work towards common goals and objectives
• Learn, understand and appreciate each other’s concern
• Instead of “No, not possible” – explore and provide alternate approaches
• Leverage effective collaboration tools
Here is how and
what needs to be
done to certify new
technologies for
secure acceptable
use
 Common Goals
 Invested in Shared
Success
 Continuous
Communication
I want to adopt the
latest and greatest
open source
technology Is this
implementation
approach secure
and compliant ?
#3 – Build Trust Early - Design for Security From Inception
13
• Detect basic security issues early and prevent downstream friction
• Include security issues (POAMS, etc) as part of the product backlog
and prioritize collectively
• Keep pace with new technology insertion and refreshes
• Address security controls early in the architecture and design
phase Develop System &
Software Architecture
and Design
Test for compliance with
required NIST controls
#4 – Simplify Life - Strive to Automate
14
Security Docs
Security Testing,
Monitoring &
Compliance
Automation &
Orchestration
• Aggressively exploit opportunities to automate security processes
• Automate -
• FISMA / FedRAMP documentation
• Security Penetration/Vulnerability Testing
• Security Compliance and Monitoring
• Intrusion Detection & Data Breaches
• Threat Management
SaaS / PaaS /
IaaS
SDLC
Activities
Security Policy and Compliance “as code”
15
• Replace opinionated human compliance checkers with machines –
Compliant or Non-Compliant
describe port(80) do
it { should_not be_listening }
end
describe port(443) do
it { should be_listening }
its('protocol') {should eq 'tcp'}
end
• BDD-Security , Gauntlt – security test code expressed in plain English
• Treat like any other code – source control, versions, peer review
• Provides a time-machine view into security evolution
• Produces valuable raw data for historical and trend analytics
Short detour for a specific use case /demo…
Web Application Security Vulnerabilities Survey Results
16
86% of websites and web-apps contain at least one serious
vulnerability
Make vulnerability remediation process faster and easier
Visibility, Accountability and Empowerment
More secure software, NOT more security software
What is OWASP ?
17
Make software security visible, so that individuals and
organizations are able to make informed decisions
100s of Projects..
OWASP Top 10 security flaws
Agile Development & OWASP Testing is Disconnected
18
Source
Control
Release
Candidate
Build
Testing
• Unit
• Functional
• Static Code Scan
• Performance, etc
Staging /
Production
Iterative / Agile Development
Security
Penetration
Testing
Backlog
Multiple daily/weekly iterations
Push security testing
left of the process
 Web App Penetration testing conducted very late in the process
 Developers have limited visibility and less time to remediate issues
 Security vulnerabilities leak through into production
Espial – Automate & Integrate Penetration Testing
19
Jenkins
Source
Control
Automated
Build
Automated Testing
• Unit
• Functional, etc.
• Espial Plugin
Automated
Deployment
deploy
execute tests &
collect results
Build Quality Report
- Code Quality
- Test Execution Results
- Espial - Security
Vulnerabilities
- Metrics
output
orchestrate
Vagrant
Docker
image
Dev/Test Env
Apps
Prod Env
Apps
Apps
A mechanism that automates and integrates security vulnerability tests as part of
your existing Jenkins-based CI/CD process
Continuous Detection  Faster Remediation
Espial Video
20
https://vimeo.com/170149154
Espial – Key Benefits
21
• Platform and programming language agnostic.
• Any web-app
• Out of the box integration with Jenkins
• Developers have clear visibility of security vulnerabilities
• Comprehensive – crawls all end-points automatically
• Eliminates risk of vulnerabilities creeping in
#5 – Keep the spark alive - Continuously Learn & Innovate
22
• Evaluate emerging tools & technologies for adoption
• Identify opportunities to innovate and evolve
• Threat Management
• Security Data Analytics
• Interactive Application Security Testing
• Promote industry and community relationships
• Cultivate Labs – Ideas to Reality
• Promote innovation
• Experiment and Prototype
• Productize
• Rinse and Repeat
Questions ?
Rajiv Kadayam
Senior Director, Technology Strategy
rajiv.kadayam@eglobaltech.com
https://www.linkedin.com/in/rajivkadayam
http://www.eglobaltech.com
http://www.cloudamatic.com
23
Thank You !
Keep Innovating…

Weitere ähnliche Inhalte

Was ist angesagt?

we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA ChennaiAbhay Bhargav
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept PresentationAbhay Bhargav
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps JourneyVeracode
 
Making security-agile matt-tesauro
Making security-agile matt-tesauroMaking security-agile matt-tesauro
Making security-agile matt-tesauroMatt Tesauro
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Armyconjur_inc
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, saneBuilding an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, saneweaveraaaron
 
Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Klocwork
 
Embracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsEmbracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsTom Cappetta
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt Tesauro
 
HouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchHouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchSpencer Koch
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsSuman Sourav
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeMatt Tesauro
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.Matt Tesauro
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineJames Wickett
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemWhiteSource
 
Ast in CI/CD by Ofer Maor
Ast in CI/CD by Ofer MaorAst in CI/CD by Ofer Maor
Ast in CI/CD by Ofer MaorDevSecCon
 

Was ist angesagt? (20)

we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
Making security-agile matt-tesauro
Making security-agile matt-tesauroMaking security-agile matt-tesauro
Making security-agile matt-tesauro
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Army
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, saneBuilding an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
 
Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009
 
Embracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsEmbracing the Rise of SecDevOps
Embracing the Rise of SecDevOps
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
 
HouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchHouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from Scratch
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
Ast in CI/CD by Ofer Maor
Ast in CI/CD by Ofer MaorAst in CI/CD by Ofer Maor
Ast in CI/CD by Ofer Maor
 

Ähnlich wie Succeeding-Marriage-Cybersecurity-DevOps final

ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Najib Radzuan
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks Ulf Mattsson
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application SecurityChristian Martorella
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owaspDag Rowe
 

Ähnlich wie Succeeding-Marriage-Cybersecurity-DevOps final (20)

ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 

Succeeding-Marriage-Cybersecurity-DevOps final

  • 1. Rajiv Kadayam © 2016 eGlobalTech. All rights reserved. Succeeding in the Marriage of Cybersecurity and DevOps
  • 2. 2 About Rajiv & eGT  Executive Technologist  Product Owner  Agile Manager/Coach  Solutions Architect  Sr. Director, Technology Strategy  Dad / Hubby • Established in 2004 • Agile Development & DevOps • Cloud Migration & Enablement • Cybersecurity & Information Assurance • eGT Labs – skunk works ! • 30+ federal agencies
  • 3. Best of times…and Worst of times.. 3 Businesses need to deliver faster and be more responsive Align organizational units to rally behind one common goal Continuously assess, monitor, prevent, and counter security risks and issues Leverage technology, automation and agile practices to achieve all of the above • E-Commerce Transactions to pass $1.5 Trillion/year • Era of Digital & Connected Lives – mobile, cloud, wearables, social • B2B ecommerce predicted to hit $6.7T/year by 2020 • 47% of American adults had their personal information stolen by hackers • Cyber crime costs businesses $400+ Billion/year - McAfee, 2014
  • 4. Stone Age IT 4 Development OperationsCybersecurity QA and TestingEnterprise Architecture  Messages lost in translation  Slow & unwieldy  Too much finger pointing  Ultimately business suffers and people too… Initiation & Planning Requirements Definition Design Development Testing Implementation Operations & Maintenance
  • 5. Enter Agile Development Methodology 5 Automated Deployment Continuous Integration Automated Code Review Product / Release Backlog Sprint Backlog System Releases Continuous feedback loop Production Development Testing/Demo Test Driven Development Iterative Development & Testing  Scrum  Kanban  Lean  SAFe Initiation & Planning Requirements Definition Design Development Testing Implementation Operations & Maintenance Agile as a means to develop solutions faster, release frequently and incorporate feedback continuously
  • 6. Gradual Agile Transformation 6 Development Operations Cybersecurity QA and Testing Enterprise Architecture Other Stakeholders More and more federal agencies are adopting agile Some agencies have adopted DevOps Very few agencies are truly performing blue- green deployments Need to break walls and build a tighter trust circle Agile Software Development & DevOps Agencies are plagued with security concerns – preventing DevOps transformation
  • 7. DevOps + Cybersecurity  DevOpsSec  Yes, but what about Testing, Users, Requirements, EA ?  ReqEADevTestingSecOps ?  DevOps => More than just “Development” and “Operations”  Philosophy , Culture, Process, Automation, Tools & Continuous Learning  By Practitioners - For Practitioners 7
  • 8. DevOps & Cybersecurity – Flipping Resistance  Results 8 Challenges • Organizational hierarchies • Lack of domain understanding • RMF, NIST Controls • Emerging / Open Source Tech • Different tools and processes • Different objectives – • DevOps: Deliver Faster vs Security: Protect Information Opportunities Secure Designs, Robust Solutions, Reduced $Costs$ Integrate and automate delivery pipeline – Accelerate time to Market Respond faster to business Enhanced Transparency, Visibility and Accountability
  • 9. Keys to a Successful Marriage of DevOps & Cybersecurity 9
  • 10. #1 – Come together - Establish Common Process Framework • Integrate and Align SDLC and RMF • Concurrently execute lifecycle phases • Peer review and validate work products • Reinforce security mindset in every step of the process. • Universal visibility, transparency, and accountability 10 NIST Risk Management Framework Software Development Lifecycle + Categorize Information System Select Security Controls Implement Security Controls Assess Security Controls Authorize Information System Monitor Security Controls Initiation & Planning Requirements Design Development Testing Implementation Operations & Maintenance
  • 11. DevOps Factory 11 Machine enforced governance and compliance established by fully automated CI/CD process expressed in code
  • 12. #2 – Be kind to your partner - Commit to Collaborate 12 DevOpsCybersecurity Target solution must properly address all required NIST security controls ! • Truly bring disparate teams together to work towards common goals and objectives • Learn, understand and appreciate each other’s concern • Instead of “No, not possible” – explore and provide alternate approaches • Leverage effective collaboration tools Here is how and what needs to be done to certify new technologies for secure acceptable use  Common Goals  Invested in Shared Success  Continuous Communication I want to adopt the latest and greatest open source technology Is this implementation approach secure and compliant ?
  • 13. #3 – Build Trust Early - Design for Security From Inception 13 • Detect basic security issues early and prevent downstream friction • Include security issues (POAMS, etc) as part of the product backlog and prioritize collectively • Keep pace with new technology insertion and refreshes • Address security controls early in the architecture and design phase Develop System & Software Architecture and Design Test for compliance with required NIST controls
  • 14. #4 – Simplify Life - Strive to Automate 14 Security Docs Security Testing, Monitoring & Compliance Automation & Orchestration • Aggressively exploit opportunities to automate security processes • Automate - • FISMA / FedRAMP documentation • Security Penetration/Vulnerability Testing • Security Compliance and Monitoring • Intrusion Detection & Data Breaches • Threat Management SaaS / PaaS / IaaS SDLC Activities
  • 15. Security Policy and Compliance “as code” 15 • Replace opinionated human compliance checkers with machines – Compliant or Non-Compliant describe port(80) do it { should_not be_listening } end describe port(443) do it { should be_listening } its('protocol') {should eq 'tcp'} end • BDD-Security , Gauntlt – security test code expressed in plain English • Treat like any other code – source control, versions, peer review • Provides a time-machine view into security evolution • Produces valuable raw data for historical and trend analytics Short detour for a specific use case /demo…
  • 16. Web Application Security Vulnerabilities Survey Results 16 86% of websites and web-apps contain at least one serious vulnerability Make vulnerability remediation process faster and easier Visibility, Accountability and Empowerment More secure software, NOT more security software
  • 17. What is OWASP ? 17 Make software security visible, so that individuals and organizations are able to make informed decisions 100s of Projects.. OWASP Top 10 security flaws
  • 18. Agile Development & OWASP Testing is Disconnected 18 Source Control Release Candidate Build Testing • Unit • Functional • Static Code Scan • Performance, etc Staging / Production Iterative / Agile Development Security Penetration Testing Backlog Multiple daily/weekly iterations Push security testing left of the process  Web App Penetration testing conducted very late in the process  Developers have limited visibility and less time to remediate issues  Security vulnerabilities leak through into production
  • 19. Espial – Automate & Integrate Penetration Testing 19 Jenkins Source Control Automated Build Automated Testing • Unit • Functional, etc. • Espial Plugin Automated Deployment deploy execute tests & collect results Build Quality Report - Code Quality - Test Execution Results - Espial - Security Vulnerabilities - Metrics output orchestrate Vagrant Docker image Dev/Test Env Apps Prod Env Apps Apps A mechanism that automates and integrates security vulnerability tests as part of your existing Jenkins-based CI/CD process Continuous Detection  Faster Remediation
  • 21. Espial – Key Benefits 21 • Platform and programming language agnostic. • Any web-app • Out of the box integration with Jenkins • Developers have clear visibility of security vulnerabilities • Comprehensive – crawls all end-points automatically • Eliminates risk of vulnerabilities creeping in
  • 22. #5 – Keep the spark alive - Continuously Learn & Innovate 22 • Evaluate emerging tools & technologies for adoption • Identify opportunities to innovate and evolve • Threat Management • Security Data Analytics • Interactive Application Security Testing • Promote industry and community relationships • Cultivate Labs – Ideas to Reality • Promote innovation • Experiment and Prototype • Productize • Rinse and Repeat
  • 23. Questions ? Rajiv Kadayam Senior Director, Technology Strategy rajiv.kadayam@eglobaltech.com https://www.linkedin.com/in/rajivkadayam http://www.eglobaltech.com http://www.cloudamatic.com 23 Thank You ! Keep Innovating…