SlideShare a Scribd company logo
5930B Security and DevOps: How to
Manage Security in a DevOps Enterprise
Sanjeev Sharma
CTO, DevOps Technical Sales and Adoption
Distinguished Engineer, IBM Cloud
Please Note:
1
• IBM’s statements regarding its plans,directions,and intentare subjectto change or withdrawalwithoutnotice atIBM’s sole
discretion.
• Information regarding potential future products is intended to outline our general productdirection and itshould notbe relied on in
making a purchasing decision.
• The information mentioned regarding potential future products is nota commitment, promise,or legal obligation to deliver any
material,code or functionality.Information aboutpotentialfuture products may notbe incorporated into any contract.
• The development,release,and timing ofany future features or functionality described for our products remains atour sole discretion.
• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment.The actual
throughputor performance thatany user will experience willvary depending upon many factors,including considerations such as the
amountofmultiprogramming in the user’s job stream,the I/O configuration,the storage configuration,and the workload processed.
Therefore,no assurance can be given thatan individual user willachieveresults similar to those stated here.
Agenda
2
• DevOps refresher
• Security and the Application Delivery Pipeline
• Adopting a (Secure) DevOps Architecture
• Where do I start?
DevOps Refresher
4 © IBM Corporation
DevOps: Origins
What does the Line of Business want from IT?
Product Owner
Senior Executives
Users Domain ExpertsAuditors
Gold Owner Support Staff
ExternalSystem
Team
Operations
Staff
Team MemberTeam Lead
Team MemberTeam Member
Line-of-business Customer
IT
Agility - Velocity - Innovation
DevOps approach: Apply Lean principles accelerate feedback and
improve time to value
6
People
Process
Line-of-
business
Customer
1
3
2
1. Get ideas into production fast
2. Get people to use it
3. Get feedback
ContinuouslyImprove:
I. Application Delivered
II. EnvironmentDeployed
III. Application and EnvironmentDeliveryProcess
Security and the Application
Delivery Pipeline
Delivering a Business Capability – Hybrid Applications, Hybrid
Platforms, Hybrid Teams
Application A
Application B
Application C
Application N
BusinessCapability
…
Three Levels of Security
9
1. Secure the Perimeter
2. Secure the Delivery Pipeline
3. Secure the Deliverable
http://www.ibm.com/developerworks/library/d-security-
considerations-devops-adoption/
Secure the Perimeter
10
Secure the Delivery Pipeline
11
Secure Engineering
Access and Control
Secure Build and Deploy
Security Testing of Scripts
Separation of Duties
Secure the Deliverable
12
Application
Middleware Config
Middleware
OS Config
Hardware
FullStack
Blueprint
Policies
Secure:
• Code
• Packages
• Components
• Configurations
• Content
• Policies
• Roles
Risks and Vulnerabilities - Delivery Pipeline and Deliverables
13
• Vulnerabilities related to the supply chain
• Insider attacks
• Errors and mistakes in the development project
• Weaknesses in the design, code, and integration
• API Economy and Security
http://www.ibm.com/developerworks/library/d-security-
considerations-devops-adoption/
Vulnerabilities related to the supply chain
14
External Supplier A
External Supplier B
Internal SupplierA
Internal Supplier B
Insider attacks
15
Errors and mistakes in the development project
16
1 per min 1 per min
4 per min 1 per min
4 per min 4 per min
• Reduce Batch size
– Integrated Delivery Pipeline
– Agile Development
• Continuous Security
Testing
• Continuous Validation
Weaknesses in the design, code, and integration
17http://www-03.ibm.com/security/secure-engineering/
18
The API economy and security
Adopting a (Secure) DevOps
Architecture
Adopting Bi-modal IT World – Transformation
Industrialized Core
Traditional Development->DevOps, Legacy ->Cloud-ready
Traditional Middleware ->Middleware on Cloud, APIs, Software DefinedInfrastructure
Agile/Innovation Edge
Traditional Development ->
Cloud Native, 12-factor Apps, DevOps, PaaS
Partner Ecosystem
Point-to-Point Integration -> API
Economy
APIs
APIs
APIs
DevOps Multi-Speed IT Architecture
IBM Architecture Center
BLUEMIX
DELIVERY PIPELINESOURCE CONTROL
.js
LIVE SYNC
WEB IDE ACTIVE DEPLOY
AUTO SCALING
SECURE GATEWAY
ON-PREMISES
SYSTEMS
API MANAGEMENT
TRACK & PLAN
TRACK & PLAN DEVELOP BUILD DEPLOY
RELEASE TEST
RUNTIME ENVIRONMENTS
RUNTIMES &
CONTAINERS
1
2
3
6 7
9
10
8
1
2
4
5
10
https://developer.ibm.com/architecture/
Start Here:
Value Stream Mapping for Identifying and
Addressing bottlenecks
Mapping your Delivery Pipeline
Idea/Feature/Bug Fix/
Enhancement
Production
Development Build QA SIT UAT Prod
PMO
Requirements/
Analyst
Developer
CustomersLine of Business
Build
Engineer
QA Team Integration Tester User/Tester Operations
Artifact Repository
Deployment Engineer
Release Management
Code Repository
Deploy
Get Feedback
Infrastructure as Code/
Cloud Patterns
Feedback
Customer or
Customer Surrogate
Metrics - Reporting/Dashboarding
Tasks
Artifacts
Notices and Disclaimers
24
Copyright © 2016by International Business Machines Corporation(IBM). No part ofthis document may bereproduced or transmittedin anyform withoutwrittenpermission
from IBM.
U.S. Government UsersRestricted Rights - Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM.
Informationin thesepresentations (including informationrelatingto products thathave not yetbeenannounced byIBM) has been reviewedfor accuracy as ofthe dateof
initial publication andcould includeunintentional technical or typographical errors. IBM shall haveno responsibility to update this information.THIS DOCUMENT IS
DISTRIBUTED "ASIS"WITHOUT ANYWARRANTY, EITHER EXPRESSOR IMPLIED. IN NO EVENT SHALLIBM BELIABLEFOR ANY DAMAGEARISING FROM THE
USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSSOF DATA,BUSINESS INTERRUPTION,LOSS OF PROFIT OR LOSSOF OPPORTUNITY.
IBM products andservicesare warrantedaccording tothe terms andconditions of the agreements under which they areprovided.
Any statements regarding IBM's future direction, intent or product plansaresubject to change or withdrawalwithout notice.
Performancedatacontainedhereinwas generally obtainedin a controlled, isolatedenvironments. Customer examplesare presentedas illustrations of how thosecustomers
have usedIBM products andtheresults theymay have achieved. Actual performance, cost, savingsor other results in other operating environments may vary.
References in this document to IBM products, programs, or services doesnotimply thatIBM intends tomake such products, programs or servicesavailablein all countries in
which IBM operatesor does business.
Workshops, sessions and associatedmaterials may havebeenprepared byindependent sessionspeakers, anddo not necessarily reflect the views of IBM. All materials
and discussionsare provided for informational purposesonly,andare neither intendedto, nor shall constitute legal or other guidanceor adviceto any individual participant or
their specific situation.
It is the customer’s responsibility to insureits own compliancewith legal requirements and toobtainadvice ofcompetent legal counsel as totheidentification and
interpretationof any relevant laws and regulatory requirements that mayaffect the customer’s business andany actions thecustomer may needto taketo comply with such
laws. IBM does not providelegal advice or representor warrantthat its services or products will ensurethat the customer is in compliancewith any law
Notices and Disclaimers Con’t.
25
Informationconcerningnon-IBM productswas obtained from the suppliers of thoseproducts, their publishedannouncementsor other publicly available sources. IBM hasnot
tested thoseproducts in connectionwith this publicationandcannot confirm theaccuracy of performance, compatibility or any other claims related to non-IBM products.
Questionson the capabilities of non-IBM products shouldbe addressedto thesuppliers of thoseproducts.IBM does not warrantthequality of any third-party products, or the
ability of any suchthird-partyproducts to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMSALL WARRANTIES,EXPRESSED OR IMPLIED, INCLUDINGBUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESSFOR A PARTICULAR PURPOSE.
The provision oftheinformation containedh ereinis not intendedto, and does not, grantany right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix,BlueworksLive,CICS, Clearcase,Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®,
FileNet®, Global BusinessServices ®, Global Technology Services ®, IBM ExperienceOne™,IBM SmartCloud®,IBM Social Business®, Informationon Demand,ILOG,
Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON,OpenPower, PureAnalytics™,PureApplication®, pureCluster™, PureCoverage®,PureData®,
PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®,QRadar®, Rational®, Rhapsody®, Smarter Commerce®,SoDA, SPSS, SterlingCommerce®,
StoredIQ,Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®,Worklight®, X-Force® and System z® Z/OS, aretrademarks of International Business
Machines Corporation, registeredin many jurisdictions worldwide. Other product andservicenames might betrademarks of IBM or other companies. A current list of IBM
trademarks is availableon the Webat "Copyrightandtrademark information" at: www.ibm.com/legal/copytrade.shtml.
Thank You
Your Feedback is Important!
Access the InterConnect 2016 Conference Attendee
Portal to complete your session surveys from your
smartphone,
laptop or conference kiosk.

More Related Content

What's hot (20)

PDF
Continuous Delivery in the Enterprise - with IBM UrbanCode
IBM UrbanCode Products
 
PDF
Adopting DevOps for 2-Speed IT
IBM UrbanCode Products
 
PDF
DevOps adoption in the enterprise
Sanjeev Sharma
 
PDF
Using Lean Thinking to identify and address Delivery Pipeline bottlenecks
Sanjeev Sharma
 
PDF
DevOps for Enterprise Systems Overview
Rosalind Radcliffe
 
PDF
From DevOps to DevSecOps: 2 Dimensions of Security for DevOps
Sanjeev Sharma
 
PDF
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Claudia Ring
 
PPTX
Creating a DevOps Team that Isn't Evil
IBM UrbanCode Products
 
PDF
Security and DevOps - Managing Security in a DevOps Enterprise
Claudia Ring
 
PDF
How NBCUniversal Adopted DevOps
Sanjeev Sharma
 
PDF
A Continuous Delivery Safety Net for Databases
IBM UrbanCode Products
 
PDF
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
IBM UrbanCode Products
 
PPTX
Urban code - DevOps - cost reduction
Chris Sparshott
 
PDF
Death to Manual Deployments
IBM UrbanCode Products
 
PPTX
How IBM Scaled DevOps: The IBM Marketplace and Continuous Improvement
Dev_Events
 
PDF
Mastering DevOps Automation: Webinar
Claudia Ring
 
PDF
Webcast urbancodemobiltomainframe
Rosalind Radcliffe
 
PDF
Continuous Delivery with Jenkins Enterprise and IBM UrbanCode Deploy
IBM UrbanCode Products
 
PDF
DevOps for the Mobile Enterprise: Build and Connect
Rosalind Radcliffe
 
PDF
DevOps and Application Delivery for Hybrid Cloud - DevOpsSummit session
Sanjeev Sharma
 
Continuous Delivery in the Enterprise - with IBM UrbanCode
IBM UrbanCode Products
 
Adopting DevOps for 2-Speed IT
IBM UrbanCode Products
 
DevOps adoption in the enterprise
Sanjeev Sharma
 
Using Lean Thinking to identify and address Delivery Pipeline bottlenecks
Sanjeev Sharma
 
DevOps for Enterprise Systems Overview
Rosalind Radcliffe
 
From DevOps to DevSecOps: 2 Dimensions of Security for DevOps
Sanjeev Sharma
 
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Claudia Ring
 
Creating a DevOps Team that Isn't Evil
IBM UrbanCode Products
 
Security and DevOps - Managing Security in a DevOps Enterprise
Claudia Ring
 
How NBCUniversal Adopted DevOps
Sanjeev Sharma
 
A Continuous Delivery Safety Net for Databases
IBM UrbanCode Products
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
IBM UrbanCode Products
 
Urban code - DevOps - cost reduction
Chris Sparshott
 
Death to Manual Deployments
IBM UrbanCode Products
 
How IBM Scaled DevOps: The IBM Marketplace and Continuous Improvement
Dev_Events
 
Mastering DevOps Automation: Webinar
Claudia Ring
 
Webcast urbancodemobiltomainframe
Rosalind Radcliffe
 
Continuous Delivery with Jenkins Enterprise and IBM UrbanCode Deploy
IBM UrbanCode Products
 
DevOps for the Mobile Enterprise: Build and Connect
Rosalind Radcliffe
 
DevOps and Application Delivery for Hybrid Cloud - DevOpsSummit session
Sanjeev Sharma
 

Viewers also liked (19)

PDF
Continuously Design your Continuous Deployment
Michael Elder
 
PDF
IBM InterConnect: Day 3
IBM Social Business
 
PDF
DevOps for IBM Commerce
Michael Elder
 
PDF
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...
Michael Elder
 
PDF
Technology Keynote I Love APIs 2015: Anant Jhingran, Apigee CTO
Apigee | Google Cloud
 
PDF
DevOps Gamification Workshop at JTEL Summer School 2015
IstvanKoren
 
PPTX
Project Execution Methodologies – Rising a Step Further
SPEC INDIA
 
PPT
IBM Pulse session 2727: Continuous delivery -accelerated with DevOps
Sanjeev Sharma
 
PPT
Continuous Delivery to the cloud - Innovate 2014
Sanjeev Sharma
 
PPTX
Delivering High-Availability Web Services with NGINX Plus on AWS
NGINX, Inc.
 
PPTX
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
Sanjeev Sharma
 
PDF
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
Kevin Sutter
 
PDF
IBM MQ - Comparing Distributed and z/OS platforms
MarkTaylorIBM
 
PPTX
DevOps 101 - IBM Impact 2014
Sanjeev Sharma
 
PDF
MQ Security Overview
MarkTaylorIBM
 
PPTX
ACT-IAC Partners #GovDevOps: PTO - agile - and DevOps
Christopher Dorobek
 
PDF
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
MarkTaylorIBM
 
PDF
Big Data: InterConnect 2016 Session on Getting Started with Big Data Analytics
Cynthia Saracco
 
PPTX
IBM MQ Advanced - IBM InterConnect 2016
Leif Davidsen
 
Continuously Design your Continuous Deployment
Michael Elder
 
IBM InterConnect: Day 3
IBM Social Business
 
DevOps for IBM Commerce
Michael Elder
 
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...
Michael Elder
 
Technology Keynote I Love APIs 2015: Anant Jhingran, Apigee CTO
Apigee | Google Cloud
 
DevOps Gamification Workshop at JTEL Summer School 2015
IstvanKoren
 
Project Execution Methodologies – Rising a Step Further
SPEC INDIA
 
IBM Pulse session 2727: Continuous delivery -accelerated with DevOps
Sanjeev Sharma
 
Continuous Delivery to the cloud - Innovate 2014
Sanjeev Sharma
 
Delivering High-Availability Web Services with NGINX Plus on AWS
NGINX, Inc.
 
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
Sanjeev Sharma
 
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
Kevin Sutter
 
IBM MQ - Comparing Distributed and z/OS platforms
MarkTaylorIBM
 
DevOps 101 - IBM Impact 2014
Sanjeev Sharma
 
MQ Security Overview
MarkTaylorIBM
 
ACT-IAC Partners #GovDevOps: PTO - agile - and DevOps
Christopher Dorobek
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
MarkTaylorIBM
 
Big Data: InterConnect 2016 Session on Getting Started with Big Data Analytics
Cynthia Saracco
 
IBM MQ Advanced - IBM InterConnect 2016
Leif Davidsen
 
Ad

Similar to IBM InterConnect 2016: Security for DevOps in an Enterprise (20)

PDF
IBM Security SaaS IaaS and PaaS
Camilo Fandiño Gómez
 
PDF
Scalable, Available and Reliable Cloud Applications with PaaS and Microservices
David Currie
 
PDF
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
DevOps for Enterprise Systems
 
PPTX
App infrastructure &_integration_keynote_final
eileendohertysmith
 
PDF
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Michael Elder
 
PDF
Ibm apim
sflynn073
 
PDF
TI 1641 - delivering enterprise software at the speed of cloud
Vincent Burckhardt
 
PPT
IBM WebSphere Liberty and Docker Deep Dive
David Currie
 
PDF
Become an IBM Cloud Architect in 40 Minutes
Andrew Ferrier
 
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 
PDF
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
Carl Osipov
 
PDF
Introduction to IBM Cloud Private - April 2018
Michael Elder
 
PDF
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
paul young cpa, cga
 
PPTX
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
PPTX
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
PDF
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini
 
PDF
Integrate Application Security Testing into your SDLC
IBM Security
 
PPTX
Big Data With Graphs
Peter Presnell
 
PPTX
Big Data With Graphs
Red Pill Now
 
PPTX
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
IBM Rational software
 
IBM Security SaaS IaaS and PaaS
Camilo Fandiño Gómez
 
Scalable, Available and Reliable Cloud Applications with PaaS and Microservices
David Currie
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
DevOps for Enterprise Systems
 
App infrastructure &_integration_keynote_final
eileendohertysmith
 
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Michael Elder
 
Ibm apim
sflynn073
 
TI 1641 - delivering enterprise software at the speed of cloud
Vincent Burckhardt
 
IBM WebSphere Liberty and Docker Deep Dive
David Currie
 
Become an IBM Cloud Architect in 40 Minutes
Andrew Ferrier
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
Carl Osipov
 
Introduction to IBM Cloud Private - April 2018
Michael Elder
 
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
paul young cpa, cga
 
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini
 
Integrate Application Security Testing into your SDLC
IBM Security
 
Big Data With Graphs
Peter Presnell
 
Big Data With Graphs
Red Pill Now
 
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
IBM Rational software
 
Ad

More from Sanjeev Sharma (14)

PDF
Democratizing security
Sanjeev Sharma
 
PDF
My code, my environment, and yes, my data
Sanjeev Sharma
 
PDF
Cloud expo 2018: From Apollo 13 to Google SRE - When DevOps meets SRE
Sanjeev Sharma
 
PDF
The Muda, Mura and Muri of DevOps
Sanjeev Sharma
 
PDF
DeliverAgile2018 - from Apollo 13 to Google SRE
Sanjeev Sharma
 
PDF
From Apollo 13 to Google SRE
Sanjeev Sharma
 
PPT
Enabling DevOps in the cloud - Federal Cloud Innovation Center
Sanjeev Sharma
 
PDF
IBM Innovate - Uderstanding DevOps
Sanjeev Sharma
 
PDF
CampDevOps keynote - DevOps: Using 'Lean' to eliminate Bottlenecks
Sanjeev Sharma
 
PDF
Continuous Delivery for cloud - scenarios and scope
Sanjeev Sharma
 
PPTX
Mobile to mainframe - Enterprise DevOps - MoDevEast Slides
Sanjeev Sharma
 
PPT
Applying DevOps for more reliable Public Sector Software Delivery
Sanjeev Sharma
 
PPT
(Japanese) From Continuous Integration to DevOps - Japan Innovate 2013
Sanjeev Sharma
 
PPTX
From Continuous Integration to DevOps - Japan Innovate 2013
Sanjeev Sharma
 
Democratizing security
Sanjeev Sharma
 
My code, my environment, and yes, my data
Sanjeev Sharma
 
Cloud expo 2018: From Apollo 13 to Google SRE - When DevOps meets SRE
Sanjeev Sharma
 
The Muda, Mura and Muri of DevOps
Sanjeev Sharma
 
DeliverAgile2018 - from Apollo 13 to Google SRE
Sanjeev Sharma
 
From Apollo 13 to Google SRE
Sanjeev Sharma
 
Enabling DevOps in the cloud - Federal Cloud Innovation Center
Sanjeev Sharma
 
IBM Innovate - Uderstanding DevOps
Sanjeev Sharma
 
CampDevOps keynote - DevOps: Using 'Lean' to eliminate Bottlenecks
Sanjeev Sharma
 
Continuous Delivery for cloud - scenarios and scope
Sanjeev Sharma
 
Mobile to mainframe - Enterprise DevOps - MoDevEast Slides
Sanjeev Sharma
 
Applying DevOps for more reliable Public Sector Software Delivery
Sanjeev Sharma
 
(Japanese) From Continuous Integration to DevOps - Japan Innovate 2013
Sanjeev Sharma
 
From Continuous Integration to DevOps - Japan Innovate 2013
Sanjeev Sharma
 

Recently uploaded (20)

PPTX
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
PDF
Efficient, Automated Claims Processing Software for Insurers
Insurance Tech Services
 
PPTX
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
PDF
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PPTX
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
PPTX
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
DOCX
Import Data Form Excel to Tally Services
Tally xperts
 
PPTX
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
PDF
Mobile CMMS Solutions Empowering the Frontline Workforce
CryotosCMMSSoftware
 
PPTX
Equipment Management Software BIS Safety UK.pptx
BIS Safety Software
 
PDF
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
PDF
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
PPTX
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
PPTX
3uTools Full Crack Free Version Download [Latest] 2025
muhammadgurbazkhan
 
PPTX
Platform for Enterprise Solution - Java EE5
abhishekoza1981
 
PPTX
MailsDaddy Outlook OST to PST converter.pptx
abhishekdutt366
 
PDF
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
PDF
Revenue streams of the Wazirx clone script.pdf
aaronjeffray
 
PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
Efficient, Automated Claims Processing Software for Insurers
Insurance Tech Services
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
Import Data Form Excel to Tally Services
Tally xperts
 
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
Mobile CMMS Solutions Empowering the Frontline Workforce
CryotosCMMSSoftware
 
Equipment Management Software BIS Safety UK.pptx
BIS Safety Software
 
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
3uTools Full Crack Free Version Download [Latest] 2025
muhammadgurbazkhan
 
Platform for Enterprise Solution - Java EE5
abhishekoza1981
 
MailsDaddy Outlook OST to PST converter.pptx
abhishekdutt366
 
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
Revenue streams of the Wazirx clone script.pdf
aaronjeffray
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 

IBM InterConnect 2016: Security for DevOps in an Enterprise

  • 1. 5930B Security and DevOps: How to Manage Security in a DevOps Enterprise Sanjeev Sharma CTO, DevOps Technical Sales and Adoption Distinguished Engineer, IBM Cloud
  • 2. Please Note: 1 • IBM’s statements regarding its plans,directions,and intentare subjectto change or withdrawalwithoutnotice atIBM’s sole discretion. • Information regarding potential future products is intended to outline our general productdirection and itshould notbe relied on in making a purchasing decision. • The information mentioned regarding potential future products is nota commitment, promise,or legal obligation to deliver any material,code or functionality.Information aboutpotentialfuture products may notbe incorporated into any contract. • The development,release,and timing ofany future features or functionality described for our products remains atour sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment.The actual throughputor performance thatany user will experience willvary depending upon many factors,including considerations such as the amountofmultiprogramming in the user’s job stream,the I/O configuration,the storage configuration,and the workload processed. Therefore,no assurance can be given thatan individual user willachieveresults similar to those stated here.
  • 3. Agenda 2 • DevOps refresher • Security and the Application Delivery Pipeline • Adopting a (Secure) DevOps Architecture • Where do I start?
  • 5. 4 © IBM Corporation DevOps: Origins
  • 6. What does the Line of Business want from IT? Product Owner Senior Executives Users Domain ExpertsAuditors Gold Owner Support Staff ExternalSystem Team Operations Staff Team MemberTeam Lead Team MemberTeam Member Line-of-business Customer IT Agility - Velocity - Innovation
  • 7. DevOps approach: Apply Lean principles accelerate feedback and improve time to value 6 People Process Line-of- business Customer 1 3 2 1. Get ideas into production fast 2. Get people to use it 3. Get feedback ContinuouslyImprove: I. Application Delivered II. EnvironmentDeployed III. Application and EnvironmentDeliveryProcess
  • 8. Security and the Application Delivery Pipeline
  • 9. Delivering a Business Capability – Hybrid Applications, Hybrid Platforms, Hybrid Teams Application A Application B Application C Application N BusinessCapability …
  • 10. Three Levels of Security 9 1. Secure the Perimeter 2. Secure the Delivery Pipeline 3. Secure the Deliverable http://www.ibm.com/developerworks/library/d-security- considerations-devops-adoption/
  • 12. Secure the Delivery Pipeline 11 Secure Engineering Access and Control Secure Build and Deploy Security Testing of Scripts Separation of Duties
  • 13. Secure the Deliverable 12 Application Middleware Config Middleware OS Config Hardware FullStack Blueprint Policies Secure: • Code • Packages • Components • Configurations • Content • Policies • Roles
  • 14. Risks and Vulnerabilities - Delivery Pipeline and Deliverables 13 • Vulnerabilities related to the supply chain • Insider attacks • Errors and mistakes in the development project • Weaknesses in the design, code, and integration • API Economy and Security http://www.ibm.com/developerworks/library/d-security- considerations-devops-adoption/
  • 15. Vulnerabilities related to the supply chain 14 External Supplier A External Supplier B Internal SupplierA Internal Supplier B
  • 17. Errors and mistakes in the development project 16 1 per min 1 per min 4 per min 1 per min 4 per min 4 per min • Reduce Batch size – Integrated Delivery Pipeline – Agile Development • Continuous Security Testing • Continuous Validation
  • 18. Weaknesses in the design, code, and integration 17http://www-03.ibm.com/security/secure-engineering/
  • 19. 18 The API economy and security
  • 20. Adopting a (Secure) DevOps Architecture
  • 21. Adopting Bi-modal IT World – Transformation Industrialized Core Traditional Development->DevOps, Legacy ->Cloud-ready Traditional Middleware ->Middleware on Cloud, APIs, Software DefinedInfrastructure Agile/Innovation Edge Traditional Development -> Cloud Native, 12-factor Apps, DevOps, PaaS Partner Ecosystem Point-to-Point Integration -> API Economy APIs APIs APIs
  • 22. DevOps Multi-Speed IT Architecture IBM Architecture Center BLUEMIX DELIVERY PIPELINESOURCE CONTROL .js LIVE SYNC WEB IDE ACTIVE DEPLOY AUTO SCALING SECURE GATEWAY ON-PREMISES SYSTEMS API MANAGEMENT TRACK & PLAN TRACK & PLAN DEVELOP BUILD DEPLOY RELEASE TEST RUNTIME ENVIRONMENTS RUNTIMES & CONTAINERS 1 2 3 6 7 9 10 8 1 2 4 5 10 https://developer.ibm.com/architecture/
  • 23. Start Here: Value Stream Mapping for Identifying and Addressing bottlenecks
  • 24. Mapping your Delivery Pipeline Idea/Feature/Bug Fix/ Enhancement Production Development Build QA SIT UAT Prod PMO Requirements/ Analyst Developer CustomersLine of Business Build Engineer QA Team Integration Tester User/Tester Operations Artifact Repository Deployment Engineer Release Management Code Repository Deploy Get Feedback Infrastructure as Code/ Cloud Patterns Feedback Customer or Customer Surrogate Metrics - Reporting/Dashboarding Tasks Artifacts
  • 25. Notices and Disclaimers 24 Copyright © 2016by International Business Machines Corporation(IBM). No part ofthis document may bereproduced or transmittedin anyform withoutwrittenpermission from IBM. U.S. Government UsersRestricted Rights - Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM. Informationin thesepresentations (including informationrelatingto products thathave not yetbeenannounced byIBM) has been reviewedfor accuracy as ofthe dateof initial publication andcould includeunintentional technical or typographical errors. IBM shall haveno responsibility to update this information.THIS DOCUMENT IS DISTRIBUTED "ASIS"WITHOUT ANYWARRANTY, EITHER EXPRESSOR IMPLIED. IN NO EVENT SHALLIBM BELIABLEFOR ANY DAMAGEARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSSOF DATA,BUSINESS INTERRUPTION,LOSS OF PROFIT OR LOSSOF OPPORTUNITY. IBM products andservicesare warrantedaccording tothe terms andconditions of the agreements under which they areprovided. Any statements regarding IBM's future direction, intent or product plansaresubject to change or withdrawalwithout notice. Performancedatacontainedhereinwas generally obtainedin a controlled, isolatedenvironments. Customer examplesare presentedas illustrations of how thosecustomers have usedIBM products andtheresults theymay have achieved. Actual performance, cost, savingsor other results in other operating environments may vary. References in this document to IBM products, programs, or services doesnotimply thatIBM intends tomake such products, programs or servicesavailablein all countries in which IBM operatesor does business. Workshops, sessions and associatedmaterials may havebeenprepared byindependent sessionspeakers, anddo not necessarily reflect the views of IBM. All materials and discussionsare provided for informational purposesonly,andare neither intendedto, nor shall constitute legal or other guidanceor adviceto any individual participant or their specific situation. It is the customer’s responsibility to insureits own compliancewith legal requirements and toobtainadvice ofcompetent legal counsel as totheidentification and interpretationof any relevant laws and regulatory requirements that mayaffect the customer’s business andany actions thecustomer may needto taketo comply with such laws. IBM does not providelegal advice or representor warrantthat its services or products will ensurethat the customer is in compliancewith any law
  • 26. Notices and Disclaimers Con’t. 25 Informationconcerningnon-IBM productswas obtained from the suppliers of thoseproducts, their publishedannouncementsor other publicly available sources. IBM hasnot tested thoseproducts in connectionwith this publicationandcannot confirm theaccuracy of performance, compatibility or any other claims related to non-IBM products. Questionson the capabilities of non-IBM products shouldbe addressedto thesuppliers of thoseproducts.IBM does not warrantthequality of any third-party products, or the ability of any suchthird-partyproducts to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMSALL WARRANTIES,EXPRESSED OR IMPLIED, INCLUDINGBUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESSFOR A PARTICULAR PURPOSE. The provision oftheinformation containedh ereinis not intendedto, and does not, grantany right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera®, Bluemix,BlueworksLive,CICS, Clearcase,Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global BusinessServices ®, Global Technology Services ®, IBM ExperienceOne™,IBM SmartCloud®,IBM Social Business®, Informationon Demand,ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON,OpenPower, PureAnalytics™,PureApplication®, pureCluster™, PureCoverage®,PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®,QRadar®, Rational®, Rhapsody®, Smarter Commerce®,SoDA, SPSS, SterlingCommerce®, StoredIQ,Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®,Worklight®, X-Force® and System z® Z/OS, aretrademarks of International Business Machines Corporation, registeredin many jurisdictions worldwide. Other product andservicenames might betrademarks of IBM or other companies. A current list of IBM trademarks is availableon the Webat "Copyrightandtrademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 27. Thank You Your Feedback is Important! Access the InterConnect 2016 Conference Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.