SlideShare a Scribd company logo
INTRODUCTION TO DEVSECOPS
“You build it, You secure it!”
Cloud Security Architect, Penetration Tester
Setu Parimi
Cybersecurity professional with extensive
experience performing Vulnerability
Assessments, Third-Party Application Security
reviews, Penetration Testing, and Remediation
support as it pertains to the security of
Applications, Networks, Infrastructure, and
Cloud domains.
Cloud 90%
DevSecOps 85%
PenTesting 83%
Trainings 65%
Security Consulting
● Product Security Audit
● Architecture Reviews
● Secure Architecture design
● Security Automations
● Threat Modelling
● Vendor Analysis
● AppSec Program
● MSSP
Testing & Assessments
● Web Application
Penetration Testing
● Cloud Infrastructure
Pentesting
● Mobile Application Security
Assessment
● Network pentesting and
assessment
● Application Source code
reviews
Security Trainings
● Cloud Security Trainings
● DevSecOps Trainings
● Penetration testing training
● AWS Security Certification
● CCSK
● Cloud Security Automation
● AWS Cost Control
● SOC Training
CloudSecOps.com | +123456 43777 | hi@cloudsecops.com
➔ DevSecOps Introduction
➔ Key Challenges, Recommendations
➔ DevSecOps Analysis
➔ DevSecOps Core Practices
➔ DevSecOps pipeline for Application & Infrastructure Security
➔ DevSecOps Security Tools Selection Tips
➔ DevSecOps Implementation Strategy
➔ DevSecOps Checklist
Agenda: 5-45-10
Continuous Delivery
Small, incremental
and frequent code
pushes to production.
Continuous delivery
eschews large
production code
releases separated by
weeks or months
DevOps
A new mode of
intense collaboration
between development
and operations for the
same goals.
Continuous Delivery & DevOps
➔ Automated Provisioning
➔ No-Downtime Deployments
➔ Monitoring
➔ Fail fast and Open
➔ Automated builds and testing
DevOps Goals:
➔ Team or Community effort, not an individuals’
➔ Autonomous and Automated Security -> Security at Scale
➔ DevSecOps is an approach to IT security based on the principles of DevOps
➔ DevSecOps spans the entire IT stack
➔ DevSecOps also spans the full software lifecycle
Information security architects must integrate security at multiple points into DevOps
workflows in a collaborative way that is largely transparent to developers, and preserves
the teamwork, agility and speed of DevOps and agile development environments, delivering
"DevSecOps."
DevSecOps:
Introduction to DevSecOps
Adding Security to DevOps:
Do You Believe Your Information Security Policies/Teams Are Slowing IT Down?
Information Security Professionals IT Operations Professionals
➔ DevOps compliance is a top concern of IT leaders, but information security is seen as an
inhibitor to DevOps agility.
➔ Security infrastructure has lagged in its ability to become "software defined" and
programmable, making it difficult to integrate security controls into DevOps-style
workflows in an automated, transparent way
➔ Modern applications are largely "assembled," not developed, and developers often
download and use known vulnerable open-source components and frameworks.
DevSecOps Key Challenges:
➔ Start with secure development and training, but don't make developers become security
experts or switch tools.
➔ Embrace the concept of people-centric security and empower developers to take personal
responsibility for security compensated for with monitoring. Embrace a "trust and verify"
mindset.
➔ Require all information security platforms to expose full functionality via APIs for
automatability.
Recommendations:
➔ Security Controls Must Be Programmable and Automated Wherever Possible
➔ Use IAM and Role-Based Access Control to Provide Separation of Duties
➔ Implement a Simple Risk and Threat Model for All Applications
➔ Scan Custom Code, Applications and APIs
➔ Scan for OSS Issues in Development
➔ Scan for Vulnerabilities and Correct Configuration in Development
➔ Treat Scripts/Recipes/Templates/Layers as Sensitive Code
➔ Measure System Integrity and Ensure Correct Configuration at Load
➔ Lock Down Production Infrastructure and Services
DevSecOps Analysis:
DevSecOps Core Practices:
Step 1: Assess Your Current Security Controls
Step 2: Inserting “Sec” into DevOps
Step 3: Integrate DevSecOps into Security Operations
Delivering DevSecOps:
➔ Most likely threats
➔ Data types and sensitivity
➔ System builds and controls
➔ Cloud Infrastructure security posture
➔ Existing controls in place
➔ Controls we lose in cloud
Step 1: Assess Your Current Security Controls for Cloud
➔ Development
➔ Inventory Management
➔ Configuration and Patch Posture
➔ Vulnerability Scanning and Assessment
➔ Account and Privilege Management
➔ Logging and Event Management
➔ Change Detection and Automated Rollback
➔ Microsegmentation
Step 2: Inserting “Sec” into DevOps
Step 3: Integrate DevSecOps into Security Operations
➔ Security tools help to automate or speed up the DevOps processes Eg: Chef, Ansible,Puppet, Lambda
➔ Scenario:
◆ Security tools detect a suspicious behavior on an instance in the cloud provider environment and
trigger an automated response workflow via APIs that communicate with a DevSecOps automation
engine or product
◆ The network allocation of the instance is changed via scripts and API calls to a dedicated “quarantine
virtual switch” in the cloud environment that has no direct Internet connectivity
◆ A local process begins disk and memory acquisition on the suspect instance, which is copied to a
forensic storage node in the cloud controlled by the security team and automatically protected with
dedicated encryption
◆ The security and operations teams can then automatically perform a rollback of the instance to a
known good state (or likely create a new one from the most recent template).
DevSecOps pipeline for AppSec:
DevSecOps pipeline for AppSec:
Src: https://www.slideshare.net/denimgroup/rsa2015-blending-theautomatedandthemanualmakingapplicationvulnerabilitymanagementyourally
DevSecOps pipeline for AWS Cloud:
➔ Policy Coverage
➔ Accuracy
➔ Speed
➔ Scale
➔ Process Fit
➔ Integrations
Criteria for Choosing Security Tools
Example PoC & Vendor Analysis:
➔ Ensure that periodic reviews of the overall risk posture within cloud environments are performed to
guarantee continued alignment of security and the other DevOps teams involved
➔ Keep system instances in the cloud as locked down as you can, commensurate with the exposure and data
classification types involved
➔ Pay careful attention to privilege allocation and user, group and role management.This can easily creep
over time in a dynamic environment
➔ Commit to a culture of continuous monitoring, helping to automate detection and scripted response
activities that minimize manual intervention wherever possible
➔ Discuss vulnerabilities detected in cloud deployments with all team members, and make sure DevOps
teams are involved in vulnerability, patch and configuration management discussions and policy creation.
➔ Ensure that you are gathering adequate security and operations logs and eventdata, sending it to a remote
monitoring and collection platform
➔ Discuss the changing threat landscape with DevOps teams, get practical measures that can be taken to
implement the most effective security without impeding progress or slowing down the pace of business
activities
Final Checklist
➔ Web Application Penetration Testing
➔ DevSecops piple for application security
➔ Cloud Infrastructure Penetration Testing
➔ AWS, GCP security audit
➔ DevSecOps Training
➔ Security Automations in Cloud
➔ Incident Response in Cloud
➔ Architectect security in Cloud
➔ Cloud Cost Control
➔ Security Awareness Training
➔ Third party Vendor Application Security Assessment
Future Sessions
Security Consulting
● Product Security Audit
● Architecture Reviews
● Secure Architecture design
● Security Automations
● Threat Modelling
● Vendor Analysis
● AppSec Program
● MSSP
Testing & Assessments
● Web Application
Penetration Testing
● Cloud Infrastructure
Pentesting
● Mobile Application Security
Assessment
● Network pentesting and
assessment
● Application Source code
reviews
Security Trainings
● Cloud Security Trainings
● DevSecOps Trainings
● Penetration testing training
● AWS Security Certification
● CCSK
● Cloud Security Automation
● AWS Cost Control
● SOC Training
CloudSecOps.com | +123456 43777 | hi@cloudsecops.com
THANK YOU
https://www.linkedin.com/in/sethuparimi/
setu@cloudsecops.com
https://cloudsecops.com/contact-us/
https://cloudsecops.com/blog/
+123456 43777

More Related Content

PPTX
DEVSECOPS.pptx
MohammadSaif904342
 
PDF
Slide DevSecOps Microservices
Hendri Karisma
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PDF
The State of DevSecOps
DevOps Indonesia
 
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
PDF
DevSecOps Implementation Journey
DevOps Indonesia
 
DEVSECOPS.pptx
MohammadSaif904342
 
Slide DevSecOps Microservices
Hendri Karisma
 
Demystifying DevSecOps
Archana Joshi
 
DevSecOps in Baby Steps
Priyanka Aash
 
The State of DevSecOps
DevOps Indonesia
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
DevSecOps Implementation Journey
DevOps Indonesia
 

What's hot (20)

PDF
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
PDF
2019 DevSecOps Reference Architectures
Sonatype
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PPTX
DevSecOps reference architectures 2018
Sonatype
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PPTX
How to Get Started with DevSecOps
CYBRIC
 
PPTX
DevSecOps
Cheah Eng Soon
 
PDF
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
PDF
DevSecOps What Why and How
NotSoSecure Global Services
 
PDF
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PPT
DevSecOps Singapore introduction
Stefan Streichsbier
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PDF
DevSecOps | DevOps Sec
Rubal Jain
 
PPTX
DevSecOps
Joel Divekar
 
PPTX
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
PDF
DevSecOps
Spv Reddy
 
PPTX
About DevOps in simple steps
Ihor Odynets
 
PDF
DevSecOps
Tomas Honzak
 
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
2019 DevSecOps Reference Architectures
Sonatype
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevSecOps reference architectures 2018
Sonatype
 
DevSecOps : an Introduction
Prashanth B. P.
 
How to Get Started with DevSecOps
CYBRIC
 
DevSecOps
Cheah Eng Soon
 
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
 
DevSecOps What Why and How
NotSoSecure Global Services
 
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Introduction to DevSecOps
abhimanyubhogwan
 
DevSecOps Singapore introduction
Stefan Streichsbier
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
DevSecOps | DevOps Sec
Rubal Jain
 
DevSecOps
Joel Divekar
 
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
DevSecOps
Spv Reddy
 
About DevOps in simple steps
Ihor Odynets
 
DevSecOps
Tomas Honzak
 
Ad

Similar to Introduction to DevSecOps (20)

PDF
DevSecOps - Background, Status and Future Challenges
dsc71656
 
PPT
Secure Multi-cloud Environment workshop slides
victoryosowich1
 
PPTX
Application Security from the Inside Out
Ulisses Albuquerque
 
PPTX
Past, Present and Future of DevOps Infrastructure
Synergetics Learning and Cloud Consulting
 
PDF
Why You Should Implement DevSecOps Approach?
Enov8
 
PDF
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
PDF
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
PPTX
Why You Should Implement DevSecOps Approach?
Enov8
 
PDF
Security's DevOps Transformation
Michele Chubirka
 
PDF
Cloud security : Automate or die
Priyanka Aash
 
PPTX
Secure DevOPS Implementation Guidance
Tej Luthra
 
PPTX
Continuous Testing in containerized environment
Nicolas Giron
 
PDF
Cncf checkov and bridgecrew
LibbySchulze
 
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
PDF
Weaponizing Your DevOps Pipeline
Puma Security, LLC
 
PDF
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Predica Group
 
PPTX
Overcoming Security Challenges in DevOps
Alert Logic
 
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
PPTX
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
DevSecOps - Background, Status and Future Challenges
dsc71656
 
Secure Multi-cloud Environment workshop slides
victoryosowich1
 
Application Security from the Inside Out
Ulisses Albuquerque
 
Past, Present and Future of DevOps Infrastructure
Synergetics Learning and Cloud Consulting
 
Why You Should Implement DevSecOps Approach?
Enov8
 
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Why You Should Implement DevSecOps Approach?
Enov8
 
Security's DevOps Transformation
Michele Chubirka
 
Cloud security : Automate or die
Priyanka Aash
 
Secure DevOPS Implementation Guidance
Tej Luthra
 
Continuous Testing in containerized environment
Nicolas Giron
 
Cncf checkov and bridgecrew
LibbySchulze
 
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
Weaponizing Your DevOps Pipeline
Puma Security, LLC
 
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Predica Group
 
Overcoming Security Challenges in DevOps
Alert Logic
 
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Nadira Bajrei
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
Ad

Recently uploaded (20)

PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Introduction to DevSecOps

  • 1. INTRODUCTION TO DEVSECOPS “You build it, You secure it!”
  • 2. Cloud Security Architect, Penetration Tester Setu Parimi Cybersecurity professional with extensive experience performing Vulnerability Assessments, Third-Party Application Security reviews, Penetration Testing, and Remediation support as it pertains to the security of Applications, Networks, Infrastructure, and Cloud domains. Cloud 90% DevSecOps 85% PenTesting 83% Trainings 65%
  • 3. Security Consulting ● Product Security Audit ● Architecture Reviews ● Secure Architecture design ● Security Automations ● Threat Modelling ● Vendor Analysis ● AppSec Program ● MSSP Testing & Assessments ● Web Application Penetration Testing ● Cloud Infrastructure Pentesting ● Mobile Application Security Assessment ● Network pentesting and assessment ● Application Source code reviews Security Trainings ● Cloud Security Trainings ● DevSecOps Trainings ● Penetration testing training ● AWS Security Certification ● CCSK ● Cloud Security Automation ● AWS Cost Control ● SOC Training CloudSecOps.com | +123456 43777 | [email protected]
  • 4. ➔ DevSecOps Introduction ➔ Key Challenges, Recommendations ➔ DevSecOps Analysis ➔ DevSecOps Core Practices ➔ DevSecOps pipeline for Application & Infrastructure Security ➔ DevSecOps Security Tools Selection Tips ➔ DevSecOps Implementation Strategy ➔ DevSecOps Checklist Agenda: 5-45-10
  • 5. Continuous Delivery Small, incremental and frequent code pushes to production. Continuous delivery eschews large production code releases separated by weeks or months DevOps A new mode of intense collaboration between development and operations for the same goals. Continuous Delivery & DevOps
  • 6. ➔ Automated Provisioning ➔ No-Downtime Deployments ➔ Monitoring ➔ Fail fast and Open ➔ Automated builds and testing DevOps Goals:
  • 7. ➔ Team or Community effort, not an individuals’ ➔ Autonomous and Automated Security -> Security at Scale ➔ DevSecOps is an approach to IT security based on the principles of DevOps ➔ DevSecOps spans the entire IT stack ➔ DevSecOps also spans the full software lifecycle Information security architects must integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments, delivering "DevSecOps." DevSecOps:
  • 10. Do You Believe Your Information Security Policies/Teams Are Slowing IT Down? Information Security Professionals IT Operations Professionals
  • 11. ➔ DevOps compliance is a top concern of IT leaders, but information security is seen as an inhibitor to DevOps agility. ➔ Security infrastructure has lagged in its ability to become "software defined" and programmable, making it difficult to integrate security controls into DevOps-style workflows in an automated, transparent way ➔ Modern applications are largely "assembled," not developed, and developers often download and use known vulnerable open-source components and frameworks. DevSecOps Key Challenges:
  • 12. ➔ Start with secure development and training, but don't make developers become security experts or switch tools. ➔ Embrace the concept of people-centric security and empower developers to take personal responsibility for security compensated for with monitoring. Embrace a "trust and verify" mindset. ➔ Require all information security platforms to expose full functionality via APIs for automatability. Recommendations:
  • 13. ➔ Security Controls Must Be Programmable and Automated Wherever Possible ➔ Use IAM and Role-Based Access Control to Provide Separation of Duties ➔ Implement a Simple Risk and Threat Model for All Applications ➔ Scan Custom Code, Applications and APIs ➔ Scan for OSS Issues in Development ➔ Scan for Vulnerabilities and Correct Configuration in Development ➔ Treat Scripts/Recipes/Templates/Layers as Sensitive Code ➔ Measure System Integrity and Ensure Correct Configuration at Load ➔ Lock Down Production Infrastructure and Services DevSecOps Analysis:
  • 15. Step 1: Assess Your Current Security Controls Step 2: Inserting “Sec” into DevOps Step 3: Integrate DevSecOps into Security Operations Delivering DevSecOps:
  • 16. ➔ Most likely threats ➔ Data types and sensitivity ➔ System builds and controls ➔ Cloud Infrastructure security posture ➔ Existing controls in place ➔ Controls we lose in cloud Step 1: Assess Your Current Security Controls for Cloud
  • 17. ➔ Development ➔ Inventory Management ➔ Configuration and Patch Posture ➔ Vulnerability Scanning and Assessment ➔ Account and Privilege Management ➔ Logging and Event Management ➔ Change Detection and Automated Rollback ➔ Microsegmentation Step 2: Inserting “Sec” into DevOps
  • 18. Step 3: Integrate DevSecOps into Security Operations ➔ Security tools help to automate or speed up the DevOps processes Eg: Chef, Ansible,Puppet, Lambda ➔ Scenario: ◆ Security tools detect a suspicious behavior on an instance in the cloud provider environment and trigger an automated response workflow via APIs that communicate with a DevSecOps automation engine or product ◆ The network allocation of the instance is changed via scripts and API calls to a dedicated “quarantine virtual switch” in the cloud environment that has no direct Internet connectivity ◆ A local process begins disk and memory acquisition on the suspect instance, which is copied to a forensic storage node in the cloud controlled by the security team and automatically protected with dedicated encryption ◆ The security and operations teams can then automatically perform a rollback of the instance to a known good state (or likely create a new one from the most recent template).
  • 20. DevSecOps pipeline for AppSec: Src: https://www.slideshare.net/denimgroup/rsa2015-blending-theautomatedandthemanualmakingapplicationvulnerabilitymanagementyourally
  • 22. ➔ Policy Coverage ➔ Accuracy ➔ Speed ➔ Scale ➔ Process Fit ➔ Integrations Criteria for Choosing Security Tools
  • 23. Example PoC & Vendor Analysis:
  • 24. ➔ Ensure that periodic reviews of the overall risk posture within cloud environments are performed to guarantee continued alignment of security and the other DevOps teams involved ➔ Keep system instances in the cloud as locked down as you can, commensurate with the exposure and data classification types involved ➔ Pay careful attention to privilege allocation and user, group and role management.This can easily creep over time in a dynamic environment ➔ Commit to a culture of continuous monitoring, helping to automate detection and scripted response activities that minimize manual intervention wherever possible ➔ Discuss vulnerabilities detected in cloud deployments with all team members, and make sure DevOps teams are involved in vulnerability, patch and configuration management discussions and policy creation. ➔ Ensure that you are gathering adequate security and operations logs and eventdata, sending it to a remote monitoring and collection platform ➔ Discuss the changing threat landscape with DevOps teams, get practical measures that can be taken to implement the most effective security without impeding progress or slowing down the pace of business activities Final Checklist
  • 25. ➔ Web Application Penetration Testing ➔ DevSecops piple for application security ➔ Cloud Infrastructure Penetration Testing ➔ AWS, GCP security audit ➔ DevSecOps Training ➔ Security Automations in Cloud ➔ Incident Response in Cloud ➔ Architectect security in Cloud ➔ Cloud Cost Control ➔ Security Awareness Training ➔ Third party Vendor Application Security Assessment Future Sessions
  • 26. Security Consulting ● Product Security Audit ● Architecture Reviews ● Secure Architecture design ● Security Automations ● Threat Modelling ● Vendor Analysis ● AppSec Program ● MSSP Testing & Assessments ● Web Application Penetration Testing ● Cloud Infrastructure Pentesting ● Mobile Application Security Assessment ● Network pentesting and assessment ● Application Source code reviews Security Trainings ● Cloud Security Trainings ● DevSecOps Trainings ● Penetration testing training ● AWS Security Certification ● CCSK ● Cloud Security Automation ● AWS Cost Control ● SOC Training CloudSecOps.com | +123456 43777 | [email protected]