SlideShare a Scribd company logo
© 2016 VERACODE INC. 1© 2016 VERACODE INC.
DevOps – Security’s
Big Opportunity
Peter Chestna, Director of Developer Engagement
Veracode/CA
© 2016 VERACODE INC. 2
Who am I?
• 25+ Years Software Development Experience
• 10+ Years Application Security Experience
• Certified Agile Product Owner and Scrum Master
• At Veracode since 2006
• From Waterfall to Agile to DevOps
• From Monolith to MicroService
• Consultant on DevSecOps best practices
• Fun Fact: I love whiskey!
• Tell me where to drink local whiskey
@PeteChestna
© 2016 VERACODE INC. 3
Lack of App Security is
Damaging Companies
© 2016 VERACODE INC. 4
High Profile Breaches
All attacked through the app layer
© 2016 VERACODE INC. 5
Is this your current AppSec program?
@PeteChestna
© 2016 VERACODE INC. 6
Which outcome do you see?
@PeteChestna
© 2016 VERACODE INC. 7© 2016 VERACODE INC.
Times have
changed
© 2016 VERACODE INC. 8
Release Timelines & Team Sizes
Waterfall Agile DevOps
1-4 Releases
Per Year
12-24 Releases
Per Year
100+ Releases
Per Year
50+ people 6-12 people 6-12 people
@PeteChestna
© 2016 VERACODE INC. 9© 2016 VERACODE INC.
DevOps
Plan Dev QA Ops
Business Intent
App Knowledge
Ops Knowledge
Business Intent
App Knowledge
Ops Knowledge
Continuity
Waterfall
! ! ! ! = Handoff
Agile
!
@PeteChestna
© 2016 VERACODE INC. 10
Waterfall
Technology
Agile
DevOps
@PeteChestna
© 2016 VERACODE INC. 11
Agile - Process
Copyright 2005, Mountain Goat Software @PeteChestna
© 2016 VERACODE INC. 12© 2016 VERACODE INC.
What is
DevOps?
© 2016 VERACODE INC. 13
Definition of DevOps
@PeteChestna
© 2016 VERACODE INC. 14
What’s a DevOps Team?
DevOps Team
@PeteChestna
© 2016 VERACODE INC. 15
DevOps – Process: Where is security?
Security
@PeteChestna
© 2016 VERACODE INC. 16
Strategy
• Relationship &
Accountability
• Training &
Remediation Coaching
• Security Champions &
Right-sized testing
@PeteChestna
© 2016 VERACODE INC. 17
Strategy - Relationships
• Who is your peer in development?
• Do you understand how they are
goaled?
• What are their struggles?
• How often do you meet with them?
• Are they sympathetic to your goals
and struggles?
@PeteChestna
© 2016 VERACODE INC. 18
Strategy - Accountability
• Shared between development and
security
• Part of annual goals for both teams
• Measured and reported regularly
@PeteChestna
© 2016 VERACODE INC. 19
Strategy - Training
• Security teams can help developers by providing training,
either through eLearning or in-person instructor-led training
• Think about targeted training based on policy violations
@PeteChestna
© 2016 VERACODE INC. 20
Strategy - Training
© 2016 VERACODE INC. 21
Strategy - Remediation Coaching
For applications that used remediation coaching,
development teams fixed more than 2.5x the
average # of flaws per megabyte
@PeteChestna
© 2016 VERACODE INC. 22
• Eyes and ears of security
• Specialized training
• Basic security concepts
• Threat modeling
• Grooming guidelines
• Secure code review training
• Security controls
• CTF Exercises
• Escalate when necessary
Strategy – Security Champions
@PeteChestna
© 2016 VERACODE INC. 23
Training
(eLearning, instructor led, metadata driven)
Static Application Security Testing + 3rd Party Risk Analysis
Remediation and Mitigation Guidance
Secure Code Reviews
Manual Penetration Testing
Red Team Activities
Runtime Application
Self Protection
Dynamic Application Security Testing
Plan Code Build Test Stage Deploy Monitor
Threat Modeling
Security Grooming
Secure Design
Strategy – Right-sized Security
@PeteChestna
© 2016 VERACODE INC. 24
CI
CD
1
Develop
4
Check in
Static
Analysis
3
Build
& Test
2
Backlog
Strategy –
Right-sized testing: protect the pipeline
Pass?
7
Synchronize
No Yes
7
Deploy to
QA/Stage
6
Static
Analysis
6
Unit
Tests
8
Dynamic
Analysis
8
Regression
Testing
Pass?
Yes
Stage
then
Prod
Per
Check-in
5
Build
CI/CD
Pipeline
3a
Manual
Testing*
@PeteChestna
© 2016 VERACODE INC. 25
Conclusions
• DevOps is inevitable – learn it
• Relationships and shared
accountability is key to securing
apps
• Train developers and help them fix
what they find
• Adjust to the speed of DevOps and
right-size your security requirements
@PeteChestna
© 2016 VERACODE INC. 26
Questions?
@PeteChestna

More Related Content

PDF
From rogue one to rebel alliance by Peter Chestna
DevSecCon
 
PDF
Ast in CI/CD by Ofer Maor
DevSecCon
 
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
PDF
DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon
 
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
PDF
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
PPTX
Null application security in an agile world
Stefan Streichsbier
 
PDF
Application Security in an Agile World - Agile Singapore 2016
Stefan Streichsbier
 
From rogue one to rebel alliance by Peter Chestna
DevSecCon
 
Ast in CI/CD by Ofer Maor
DevSecCon
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
Null application security in an agile world
Stefan Streichsbier
 
Application Security in an Agile World - Agile Singapore 2016
Stefan Streichsbier
 

What's hot (20)

PDF
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon
 
PDF
DevSecOps - The big picture
DevSecOpsSg
 
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
PPTX
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
PDF
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
PDF
Dos and Don'ts of DevSecOps
Priyanka Aash
 
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
PDF
The Challenges of Scaling DevSecOps
WhiteSource
 
PDF
DevSecOps - The big picture
Stefan Streichsbier
 
PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
DevSecOpsSg
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PDF
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
PPTX
DevSecCon KeyNote London 2015
Shannon Lietz
 
PPTX
SecDevOps: The New Black of IT
CloudPassage
 
PDF
Integrating DevOps and Security
Stijn Muylle
 
PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
PPTX
DevSecOps - It can change your life (cycle)
Qualitest
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Nick Galbreath
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon
 
DevSecOps - The big picture
DevSecOpsSg
 
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Dos and Don'ts of DevSecOps
Priyanka Aash
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
The Challenges of Scaling DevSecOps
WhiteSource
 
DevSecOps - The big picture
Stefan Streichsbier
 
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
DevSecOpsSg
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
DevSecCon KeyNote London 2015
Shannon Lietz
 
SecDevOps: The New Black of IT
CloudPassage
 
Integrating DevOps and Security
Stijn Muylle
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
DevSecOps - It can change your life (cycle)
Qualitest
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Nick Galbreath
 
Ad

Similar to Devops: Security's big opportunity by Peter Chestna (20)

PPTX
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
PPTX
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
PDF
Application Security in a DevOps World
CA Technologies
 
PDF
A Secure DevOps Journey
Sonatype
 
PDF
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
PDF
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Digital Transformation EXPO Event Series
 
PDF
Your Resolution for 2018: Five Principles For Securing DevOps
DevOps.com
 
PPTX
DevOps: Security's Big Opportunity
Timothy Jarrett
 
PDF
A Secure DevOps Journey
Veracode
 
PPTX
How to get the best out of DevSecOps - a developers perspective
Colin Domoney
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
PDF
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PDF
Seven Deadly Saves To Security With Integrations
SBWebinars
 
PPTX
we45 SecDevOps Presentation - ISACA Chennai
Abhay Bhargav
 
PDF
Application Security Testing for a DevOps Mindset
Denim Group
 
PPTX
How to apply DevOps in a regulated organisation
Colin Domoney
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PPTX
Winnipeg ISACA Security is Dead, Rugged DevOps
Gene Kim
 
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
Application Security in a DevOps World
CA Technologies
 
A Secure DevOps Journey
Sonatype
 
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Digital Transformation EXPO Event Series
 
Your Resolution for 2018: Five Principles For Securing DevOps
DevOps.com
 
DevOps: Security's Big Opportunity
Timothy Jarrett
 
A Secure DevOps Journey
Veracode
 
How to get the best out of DevSecOps - a developers perspective
Colin Domoney
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
Seven Deadly Saves To Security With Integrations
SBWebinars
 
we45 SecDevOps Presentation - ISACA Chennai
Abhay Bhargav
 
Application Security Testing for a DevOps Mindset
Denim Group
 
How to apply DevOps in a regulated organisation
Colin Domoney
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Scale security for a dollar or less
Mohammed A. Imran
 
Winnipeg ISACA Security is Dead, Rugged DevOps
Gene Kim
 
Ad

More from DevSecCon (20)

PDF
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon
 
PDF
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon
 
PDF
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon
 
PDF
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon
 
PPTX
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
PPTX
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon
 
PDF
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
PDF
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon
 
PDF
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon
 
PDF
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon
 
PDF
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon
 
PPTX
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon
 
PPTX
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon
 
PDF
DevSecCon London 2018: Open DevSecOps
DevSecCon
 
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon
 

Recently uploaded (20)

PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Software Development Methodologies in 2025
KodekX
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 

Devops: Security's big opportunity by Peter Chestna

  • 1. © 2016 VERACODE INC. 1© 2016 VERACODE INC. DevOps – Security’s Big Opportunity Peter Chestna, Director of Developer Engagement Veracode/CA
  • 2. © 2016 VERACODE INC. 2 Who am I? • 25+ Years Software Development Experience • 10+ Years Application Security Experience • Certified Agile Product Owner and Scrum Master • At Veracode since 2006 • From Waterfall to Agile to DevOps • From Monolith to MicroService • Consultant on DevSecOps best practices • Fun Fact: I love whiskey! • Tell me where to drink local whiskey @PeteChestna
  • 3. © 2016 VERACODE INC. 3 Lack of App Security is Damaging Companies
  • 4. © 2016 VERACODE INC. 4 High Profile Breaches All attacked through the app layer
  • 5. © 2016 VERACODE INC. 5 Is this your current AppSec program? @PeteChestna
  • 6. © 2016 VERACODE INC. 6 Which outcome do you see? @PeteChestna
  • 7. © 2016 VERACODE INC. 7© 2016 VERACODE INC. Times have changed
  • 8. © 2016 VERACODE INC. 8 Release Timelines & Team Sizes Waterfall Agile DevOps 1-4 Releases Per Year 12-24 Releases Per Year 100+ Releases Per Year 50+ people 6-12 people 6-12 people @PeteChestna
  • 9. © 2016 VERACODE INC. 9© 2016 VERACODE INC. DevOps Plan Dev QA Ops Business Intent App Knowledge Ops Knowledge Business Intent App Knowledge Ops Knowledge Continuity Waterfall ! ! ! ! = Handoff Agile ! @PeteChestna
  • 10. © 2016 VERACODE INC. 10 Waterfall Technology Agile DevOps @PeteChestna
  • 11. © 2016 VERACODE INC. 11 Agile - Process Copyright 2005, Mountain Goat Software @PeteChestna
  • 12. © 2016 VERACODE INC. 12© 2016 VERACODE INC. What is DevOps?
  • 13. © 2016 VERACODE INC. 13 Definition of DevOps @PeteChestna
  • 14. © 2016 VERACODE INC. 14 What’s a DevOps Team? DevOps Team @PeteChestna
  • 15. © 2016 VERACODE INC. 15 DevOps – Process: Where is security? Security @PeteChestna
  • 16. © 2016 VERACODE INC. 16 Strategy • Relationship & Accountability • Training & Remediation Coaching • Security Champions & Right-sized testing @PeteChestna
  • 17. © 2016 VERACODE INC. 17 Strategy - Relationships • Who is your peer in development? • Do you understand how they are goaled? • What are their struggles? • How often do you meet with them? • Are they sympathetic to your goals and struggles? @PeteChestna
  • 18. © 2016 VERACODE INC. 18 Strategy - Accountability • Shared between development and security • Part of annual goals for both teams • Measured and reported regularly @PeteChestna
  • 19. © 2016 VERACODE INC. 19 Strategy - Training • Security teams can help developers by providing training, either through eLearning or in-person instructor-led training • Think about targeted training based on policy violations @PeteChestna
  • 20. © 2016 VERACODE INC. 20 Strategy - Training
  • 21. © 2016 VERACODE INC. 21 Strategy - Remediation Coaching For applications that used remediation coaching, development teams fixed more than 2.5x the average # of flaws per megabyte @PeteChestna
  • 22. © 2016 VERACODE INC. 22 • Eyes and ears of security • Specialized training • Basic security concepts • Threat modeling • Grooming guidelines • Secure code review training • Security controls • CTF Exercises • Escalate when necessary Strategy – Security Champions @PeteChestna
  • 23. © 2016 VERACODE INC. 23 Training (eLearning, instructor led, metadata driven) Static Application Security Testing + 3rd Party Risk Analysis Remediation and Mitigation Guidance Secure Code Reviews Manual Penetration Testing Red Team Activities Runtime Application Self Protection Dynamic Application Security Testing Plan Code Build Test Stage Deploy Monitor Threat Modeling Security Grooming Secure Design Strategy – Right-sized Security @PeteChestna
  • 24. © 2016 VERACODE INC. 24 CI CD 1 Develop 4 Check in Static Analysis 3 Build & Test 2 Backlog Strategy – Right-sized testing: protect the pipeline Pass? 7 Synchronize No Yes 7 Deploy to QA/Stage 6 Static Analysis 6 Unit Tests 8 Dynamic Analysis 8 Regression Testing Pass? Yes Stage then Prod Per Check-in 5 Build CI/CD Pipeline 3a Manual Testing* @PeteChestna
  • 25. © 2016 VERACODE INC. 25 Conclusions • DevOps is inevitable – learn it • Relationships and shared accountability is key to securing apps • Train developers and help them fix what they find • Adjust to the speed of DevOps and right-size your security requirements @PeteChestna
  • 26. © 2016 VERACODE INC. 26 Questions? @PeteChestna