SlideShare a Scribd company logo
Dev{Sec}Ops
AUTOMATION CAN BE SECURITY FRIENDLY
The Talk
Dev{Sec}Ops - Automation can be Security Friendly
Keeping security top of mind while creating standards for engineering teams following the DevOps
culture. This talk was designed to show off how easily it is to automate security scanning and to be
the developer advocate by showing the quality of development work. We will cover some high-level
topics of DevSecOps and demo some examples DevOps team can implement for free.
Dev – Ops Culture
DevOps
DevSecOps
SecDevOps
DevSecAuditOps
Security Team’s Problems
That security guy
Shift Left …?
How about “Extend Left and Right”?
Steven
Carlson
Software Engineer who is passionate
about clean secure code.
https://rockrunner007.github.io/
The guy on the far right… people do
odd things when they ride a bicycle
for 7 straight days… #RAGBRAI2019
The Stage
HIGHLY REGULATED INDUSTRY OR NOT?!
Choose Policy and/or Goal
GDPR
SOC 1 | 2 | 3
PCI
NIST
COVID-19
Reliable
Easy to use
Secure
Feature Rich
Efficient
The Policy
A Secure Software Development Life Cycle Policy
or SDL
This process requires that an applications be
designed, developed, and maintained to protect
the integrity of all application functions as well
as sensitive data collected in association with
the application.
Secure Phase Guidance
Find it early. Fix it early.
Implement a proactive approach to discover and mitigate security issues in the early stages of SDL
thereby significantly reducing the cost of fixing the post-production vulnerabilities.
Avoid replicating vulnerabilities
Vulnerabilities get copied and replicated across the code base, it magnifies risk in individual projects
and possibly across multiple projects. Then it becomes a big development effort to clean up those
vulnerabilities.
Learn from constant feedback
Constant feedback and successful collaboration between developers and security team will reduce
the risk factor throughout SDL.
The Program
SCANNING + PRODUCT REVIEW + ACCESS MANAGEMENT = SDL
General Guidance
Code analysis
Embed automatic software vulnerabilities detection tools such as Checkmarx into your DevOps pipelines.
Change management
Increase speed and efficiency by allowing anyone to submit changes, then determine whether the change is good or bad.
Compliance monitoring
Automate compliance and be ready for an audit at any time (which means being in a constant state of compliance, including
gathering evidence of GDPR compliance, PCI compliance, etc.).
Threat investigation
Identify potential emerging threats with each code update and be able to respond quickly.
Vulnerability assessment
Identify new vulnerabilities with code analysis, then analyze how quickly they are being responded to and patched.
Security training
Train software and IT engineers with guidelines for set routines.
Threat Modeling
What are we building?
What can go wrong?
What are we going do about it?
How well are we doing?
Threat Dragon
Resource: https://owasp.org/www-project-
threat-dragon/
Example:
https://github.com/RockRunner007/Security-
Programs
Source Code Scanning
Reviewing the source for a product
Password Search
Bad patterns
Known framework issues
Checkmarx
Resource: https://www.checkmarx.com/
Example:
https://github.com/RockRunner007/SAST_Aut
omation
Open Source Scanning
Security Risk due to known vulnerabilities
with packages or package dependencies
License Compliance checking for known
license and comparing to company policy
jFrog Xray
Resource: https://jfrog.com/xray
Example:
https://github.com/RockRunner007/SCA_Aut
omation
Secrets Management
Passwords
API Keys
Hashing Salt + Vector + Work Factor
SSL Cert
Security for Bitbucket
Resource:
https://marketplace.atlassian.com/apps/1221
399/security-for-
bitbucket?hosting=server&tab=overview
Example:
https://github.com/RockRunner007/SM_Auto
mation
Deployed Application Scanning
Crawl a deployed application
Use an authenticated user
Scheduled scans
Rapid 7 Insight Appsec
Resource:
https://www.rapid7.com/products/insightapp
sec/
Example:
https://github.com/RockRunner007/DAST_Au
tomation
Product Score Card
Measure product security stance
Measure development readiness
Communicate leadership and SDL
expectation
Product Review Program
Resource: Q2 DevSecOps Team
Example:
https://github.com/RockRunner007/Security-
Programs
Security Champion
Enable engineers to leverage the SDL
Point person for application security
questions
Partnership on scanning configuration
Partnership on product development
Security Champion Playbook
Resource: https://github.com/c0rdis/security-
champions-playbook
Example:
https://github.com/RockRunner007/Security-
Programs
The Opera
OPERATION … SEE WHAT I DID THERE?!
All Together Now
Dashboard
Data from security program
Break it down per product
Results from before SDL and now
Exam | Audit Time
History of all scan per product
Policies each scan is configured with
Listing of user’s access and permissions
Track of remediation
Customer
Penetration
Test
Shift Left …?
How about “Extend Left and Right”?
Easy as 1 2 3 …?
Feedback?
QUESTIONS?!
Steven
Carlson
Software Engineer who is passionate
about clean secure code.
https://rockrunner007.github.io/
The guy on the far right… people do
odd things when they ride a bicycle
for 7 straight days… #RAGBRAI2019

More Related Content

PPTX
Product Security
Steven Carlson
 
PPTX
Threat Modeling with Threat Dragon
Steven Carlson
 
PDF
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
PDF
DevOpsDays Taipei 2019 - 新創導入資安?從 DevSecOps 開始
Secview
 
PDF
Zero to Ninety in Securing DevOps
DevSecOps Days
 
PDF
PIACERE - DevSecOps Automated
PIACERE
 
PDF
How to automate your DevSecOps successfully
Manuel Pistner
 
Product Security
Steven Carlson
 
Threat Modeling with Threat Dragon
Steven Carlson
 
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
DevOpsDays Taipei 2019 - 新創導入資安?從 DevSecOps 開始
Secview
 
Zero to Ninety in Securing DevOps
DevSecOps Days
 
PIACERE - DevSecOps Automated
PIACERE
 
How to automate your DevSecOps successfully
Manuel Pistner
 

What's hot (20)

PPTX
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
DevOps.com
 
PDF
HITCON Defense Summit 2019 - 從 SAST 談持續式資安測試
Secview
 
PDF
Modern Web 2019 從零開始加入自動化資安測試
Secview
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PDF
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PPTX
DevSecOps outline
Nickleus Jimenez
 
PPTX
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
DevSecOps
Joel Divekar
 
PDF
DevSecOps Everything You Need To Know
Centextech
 
PDF
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
PPTX
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
PDF
Microsoft DevOps Forum 2021 – DevOps & Security
Nico Meisenzahl
 
PDF
The Future of DevSecOps
Stefan Streichsbier
 
PDF
Dev secops. Real experience.
Vitaly Balashov
 
PPTX
DevSecOps without DevOps is Just Security
Kevin Fealey
 
PDF
DevSecOps, The Good, Bad, and Ugly
4ndersonLin
 
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
DevOps.com
 
HITCON Defense Summit 2019 - 從 SAST 談持續式資安測試
Secview
 
Modern Web 2019 從零開始加入自動化資安測試
Secview
 
Demystifying DevSecOps
Archana Joshi
 
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
DevSecOps outline
Nickleus Jimenez
 
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
DevSecOps
Joel Divekar
 
DevSecOps Everything You Need To Know
Centextech
 
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
Microsoft DevOps Forum 2021 – DevOps & Security
Nico Meisenzahl
 
The Future of DevSecOps
Stefan Streichsbier
 
Dev secops. Real experience.
Vitaly Balashov
 
DevSecOps without DevOps is Just Security
Kevin Fealey
 
DevSecOps, The Good, Bad, and Ugly
4ndersonLin
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
Ad

Similar to Dev{sec}ops (20)

PPTX
Solnet dev secops meetup
pbink
 
PDF
AppSec in an Agile World
David Lindner
 
PDF
Practical security in a DevOps World
Hinse ter Schuur
 
PDF
A journey into Application Security
Christian Martorella
 
PDF
ShiftGearsWithInformationSecurity.pdf
Steven Carlson
 
PDF
ProdSec: A Technical Approach
Jeremy Brown
 
PDF
Scanning in DevSecOps: A Detailed Guide
Enov8
 
DOCX
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 
PPTX
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
lior mazor
 
PDF
The What, Why, and How of DevSecOps
Cprime
 
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Sigma Software
 
PDF
Building security into the pipelines
Vandana Verma
 
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
PDF
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
PDF
Agile Relevance in the age of Continuous Everything ....
Eturnti Consulting Pvt Ltd
 
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
PPTX
Successful DevSecOps Organizations - by Dawid Balut
Dawid Balut
 
PDF
Beyond security testing
Cu Nguyen
 
PPTX
HouSecCon 2019: Offensive Security - Starting from Scratch
Spencer Koch
 
PPTX
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
Solnet dev secops meetup
pbink
 
AppSec in an Agile World
David Lindner
 
Practical security in a DevOps World
Hinse ter Schuur
 
A journey into Application Security
Christian Martorella
 
ShiftGearsWithInformationSecurity.pdf
Steven Carlson
 
ProdSec: A Technical Approach
Jeremy Brown
 
Scanning in DevSecOps: A Detailed Guide
Enov8
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
lior mazor
 
The What, Why, and How of DevSecOps
Cprime
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Sigma Software
 
Building security into the pipelines
Vandana Verma
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
Agile Relevance in the age of Continuous Everything ....
Eturnti Consulting Pvt Ltd
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
Successful DevSecOps Organizations - by Dawid Balut
Dawid Balut
 
Beyond security testing
Cu Nguyen
 
HouSecCon 2019: Offensive Security - Starting from Scratch
Spencer Koch
 
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
Ad

Recently uploaded (20)

PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Zero Carbon Building Performance standard
BassemOsman1
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 

Dev{sec}ops