SlideShare a Scribd company logo
Pentest is yesterday, DevSecOps is tomorrow
Pentest is Yesterday, DevSecOps is Tomorrow
WWW.TJAKRABIRAWA.ID
DevSecOps Introduction
Introduction
Amien Harisen
CEO & Founder - PT Tjakrabirawa Teknologi
Indonesia
www.devsecops.id
Manager – Ernst & Young , Cybersecurity
Division
Security Engineer – PT Spentera
Research & Development – IDSIRTII
Others!
www.Instagram.com/slashroot.id
Waterfall
As we see through the flown years,
the most in-demand approach to
project management was the
Waterfall approach. It, being a linear
and sequential approach, had
separately set goals for each defined
phase of the project. The entire
process of software development was
divided into distinct processes, each
having its own beginning and end and
all of them cascaded to each other in a
linear fashion. The latter had its start
once the former was achieved and
completed. It looked like an ideal
methodology at that time and did
wonders for years to come. But with
the complexities and variations of the
IT world on a rising spree, there was a
requirement for a change in the
typical approach
Waterfall vs Agile vs DevOps
Agile
Agile Methodology involves
continuous iteration of development
and testing in the SDLC process. This
software development method
emphasizes on iterative, incremental,
and evolutionary development.
Agile development process breaks the
product into smaller pieces and
integrates them for final testing. It can
be implemented in many ways,
including scrum, kanban, scrum, XP,
etc
DevOps
Considered to be the most modern
approach and creating a buzz in the IT
world today, ‘DevOps’ weaves its
entire approach around bridging the
gap between the Development and
Operations teams. With the IT world
becoming a smaller place to reach
with widening arms to reach anywhere
under the sun, DevOps Solutions has
become an essential ingredient for the
success of any application to
effectively and efficiently converge the
needs of the development and
operation teams so as to ensure a
completely reliable and secure end
product, with as many possible errors
to be encountered early
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
DevOps & Cloud Adoption Rate
In 2017, the global Development to Operations (DevOps) market size was 2770
million US$ and it is expected to reach 10800 million US$ by the end of 2025,
DevOps & Cloud Adoption Rate
But, Why ?
• DevOps solve problems faster by collaborating
& responsibility
• Cultural enabler for cloud adoption scaling
• More people can try and fails at rapid pace to
meet customer demand
DevOps
Efficiencies that speed up the lifecycle
DevOps
Efficiencies that speed up the lifecycle
DevOps
Efficiencies that speed up the lifecycle
DevSecOps
Makes everyone responsible for security
WWW.TJAKRABIRAWA.ID
Where is the Security
• Development without integrated security & compliance will fail
• With the growing business demand for Agile, DevOps, and Public
Cloud Services, traditional security testing processes have become a
major obstruction
• Gartner’s new concept of “DevSecOps,” which is a merger of
DevOps and security aims in bringing the mindset and culture of
DevOps into security testing practices. The DevOps mindset displays
that security is everybody’s responsibility
• Thus promote the “Shift Left” for security
DevSecOps
• DevSecOps is the answer to integrating all the
various challenge into a coherent and effective
software delivery. It is a new method that helps
identify security issues early in the development
process rather than after a product is release.
• DevSecOps validate building blocks without
slowing the life cycle
What is and is not DevSecOps
Is Is not
A mindset & a holistic approach A One size fits all approach
A collection of processes and tools A single tools or method
A means of security & compliance integrated
to software
Just a means of adding security into the
continuous delivery
A community driven effort Invented by vendors
DevSecOps
DevSecOps Main Process
• Vulnerability (VA) Scans and Assessments
• Threat Modeling
• Secure Code Reviews
• Penetration Tests (PenTests)
DevSecOps Secondary Process
• Educating Developers on Secure Coding
• Practices with workshops,
talks, lessons
• Secure Coding Standards
• Responsible/Coordinated Disclosure
• Secure code library and other reference materials,
creating custom tools
Security Testing in DevSecOps
• SAST (Static Application Security Testing)
– consists of internal audit of an application, when security auditor or
tool has unlimited access to the application source code or binary
• DAST (Dynamic Application Security Testing)
– tests the application from the “outside” when the application is
running in test or production environment.
• IAST (Interactive Application Security Testing)
– is a combination of SAST and DAST designed to leverage the
advantages and strength of both. However, from the practical point of
view, implementation of an IAST solution remains not an easy task.
DevSecOps
10 Guide to Successful DevSecOps
According to Gartner
01
03
02
“Adapt your security testing tools and processes to the developers,
not the other way around:” According to the analysts, the Sec in
DevSecOps should be silent. That means the security team needs to change
their processes and tools to be integrated into DevOps, instead of trying to
enforce their old processes be adopted.
“Quit trying to eliminate all vulnerabilities during
development.” “Perfect security is impossible. Zero risk is impossible. We
must bring continuous risk- and trust-based assessment and prioritization
of application vulnerabilities to DevSecOps,” Head and MacDonald wrote in
their report. DevSecOps should be thought of as a continuous
improvement process, meaning security can go beyond development and
can be searching and protecting against vulnerabilities even after services
are deployed into production.
“Focus first on identifying and removing the known critical
vulnerabilities.” Instead of wasting time trying to break a system, find
focus on known security issues from pre built components, libraries,
containers and frameworks; and protect against those before they are put
into production.
04
06
05
“Don’t expect to use traditional DAST/SAST without changes.” Scan
custom code for unknown vulnerabilities by integrating testing into the IDE,
providing autonomous scans that don’t require a security expert, reducing
false positives, and delivering results into a bug tracking system or
development dashboard.
“Train all developers on the basics of secure coding, but don’t expect
them to become security experts.” Training all developers on the basis of
security issues will help prevent them from creating harmful scenarios.
Developers should be expected to know simple threat modeling scenarios,
how to think like a hacker, and know not to put secrets like cryptographic
keys and passwords into the code, according to Head.
“Adopt a security champion model and implement a simple security
requirements gathering tool.” A security champion is someone who can
effectively lead the security community of practice, stay up to date with
maturity issues, and evangelize, communicate and market what to do with
security and how to adapt.
10 Guide to Successful DevSecOps
According to Gartner
07
09
08
“Eliminate the use of known vulnerable components at the
source.” “As previously stated, most risk in modern application
assembly comes from the use of known vulnerable components,
libraries and frameworks. Rather than wait until an application is
assembled to scan and identify these known vulnerabilities, why
not address this issue at its source by warning developers not to
download and use these known vulnerable components,” Head
and MacDonald wrote.
“Secure and apply operational discipline to automation
scripts.” “Treat automation code, scripts, recipes, formation
scripts and other such infrastructure and platform artifacts as
valuable source code with specific additional risk. Therefore, use
source-code-type controls including audit, protection, digital
signatures, change control and version control to protect all
such infrastructure and platform artifacts,” according to the
report.
“Implement strong version control on all code and
components.” Be able to capture every change from what was
changed, when the change happened and who made the
change.
10
“Adopt an immutable infrastructure mindset.“ Teams should
work towards a place where all the infrastructure is only updated
by the tools. This is a sign that the team is maturing, and it
provides a more secure way to maintain applications, according
to Head.
Question & Answer
Please not that difficult question ☺
WWW.TJAKRABIRAWA.ID
Three Steps Process
DevSecOps Quick Start
01
03
02
Reading the article and collaborate on the
community at www.devsecops.id
Train the developer and the security
engineer with Us
Implement the DevSecOps As A Service with
Us
Reference
• https://medium.com/@freddyyumba/contrasting-the-
waterfall-model-agile-lean-and-devops-a95cd9acf58
• https://www.slideshare.net/isnuryusuf/devops-indonesia-
devsecops-the-open-source-way
• https://www.guru99.com/agile-vs-devops.html
• https://www.slideshare.net/narudomr/devsecops-101
PT. Tjakrabirawa Teknologi Indonesia
Manhattan Tower 12th Floor, TB Simatupang
phone : 021-80641090 | Web: http://www.tjakrabirawa.id |
Info : marketing@tjakrabirawa.co.id

More Related Content

What's hot (20)

PDF
Practical DevSecOps - Arief Karfianto
idsecconf
 
PDF
DevSecOps What Why and How
NotSoSecure Global Services
 
PPTX
DevSecOps reference architectures 2018
Sonatype
 
PPTX
Azure WAF
Cheah Eng Soon
 
PDF
Introduction to DevOps | Edureka
Edureka!
 
PDF
SIEM and Threat Hunting
n|u - The Open Security Community
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PPTX
DevOps to DevSecOps Journey..
Siddharth Joshi
 
PDF
DevSecOps
Tomas Honzak
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PPTX
Introduction to microservices
Anil Allewar
 
PDF
Microservice architecture
Žilvinas Kuusas
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PPTX
DevSecOps
Joel Divekar
 
PPTX
Microservices Architecture - Bangkok 2018
Araf Karsh Hamid
 
PPTX
DEVSECOPS.pptx
MohammadSaif904342
 
PDF
DevSecOps The Evolution of DevOps
Michael Man
 
PPTX
Introduction to Microservices
Roger van de Kimmenade
 
PPTX
Modern CI/CD in the microservices world with Kubernetes
Mikalai Alimenkou
 
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
Practical DevSecOps - Arief Karfianto
idsecconf
 
DevSecOps What Why and How
NotSoSecure Global Services
 
DevSecOps reference architectures 2018
Sonatype
 
Azure WAF
Cheah Eng Soon
 
Introduction to DevOps | Edureka
Edureka!
 
SIEM and Threat Hunting
n|u - The Open Security Community
 
Demystifying DevSecOps
Archana Joshi
 
DevOps to DevSecOps Journey..
Siddharth Joshi
 
DevSecOps
Tomas Honzak
 
DevSecOps in Baby Steps
Priyanka Aash
 
Introduction to microservices
Anil Allewar
 
Microservice architecture
Žilvinas Kuusas
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevSecOps
Joel Divekar
 
Microservices Architecture - Bangkok 2018
Araf Karsh Hamid
 
DEVSECOPS.pptx
MohammadSaif904342
 
DevSecOps The Evolution of DevOps
Michael Man
 
Introduction to Microservices
Roger van de Kimmenade
 
Modern CI/CD in the microservices world with Kubernetes
Mikalai Alimenkou
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 

Similar to Pentest is yesterday, DevSecOps is tomorrow (20)

PDF
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
PPTX
What is devsecops and what is the characteristics of it
amalsalah25
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
PPTX
Introduction to DevSecOps OWASP Ahmedabad
kunwaratul hax0r
 
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
 
PDF
Enterprise Devsecops
Enov8
 
PPTX
Devsec ops
VipinYadav257
 
PDF
How To Implement DevSecOps In Your Existing DevOps Workflow
Enov8
 
DOCX
DevSecOps - offpage blog final draft - 03.docx
Sun Technologies
 
DOCX
10 things to get right for successful dev secops
Mohammed Ahmed
 
PDF
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
PDF
Devsecops – Aerin IT Services
Aerin IT Services
 
PDF
2021-10-14 The Critical Role of Security in DevOps.pdf
Savinder Puri
 
PPTX
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
DevSecOps Best Practices-Safeguarding Your Digital Landscape
stevecooper930744
 
What is devsecops and what is the characteristics of it
amalsalah25
 
Scale security for a dollar or less
Mohammed A. Imran
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
Introduction to DevSecOps OWASP Ahmedabad
kunwaratul hax0r
 
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
 
Enterprise Devsecops
Enov8
 
Devsec ops
VipinYadav257
 
How To Implement DevSecOps In Your Existing DevOps Workflow
Enov8
 
DevSecOps - offpage blog final draft - 03.docx
Sun Technologies
 
10 things to get right for successful dev secops
Mohammed Ahmed
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
Enov8
 
Devsecops – Aerin IT Services
Aerin IT Services
 
2021-10-14 The Critical Role of Security in DevOps.pdf
Savinder Puri
 
Ensuring Secure and Efficient Operations with DevOps Security
Dev Software
 
Ad

Recently uploaded (20)

PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Ad

Pentest is yesterday, DevSecOps is tomorrow

  • 2. Pentest is Yesterday, DevSecOps is Tomorrow WWW.TJAKRABIRAWA.ID DevSecOps Introduction
  • 3. Introduction Amien Harisen CEO & Founder - PT Tjakrabirawa Teknologi Indonesia www.devsecops.id Manager – Ernst & Young , Cybersecurity Division Security Engineer – PT Spentera Research & Development – IDSIRTII Others! www.Instagram.com/slashroot.id
  • 4. Waterfall As we see through the flown years, the most in-demand approach to project management was the Waterfall approach. It, being a linear and sequential approach, had separately set goals for each defined phase of the project. The entire process of software development was divided into distinct processes, each having its own beginning and end and all of them cascaded to each other in a linear fashion. The latter had its start once the former was achieved and completed. It looked like an ideal methodology at that time and did wonders for years to come. But with the complexities and variations of the IT world on a rising spree, there was a requirement for a change in the typical approach Waterfall vs Agile vs DevOps Agile Agile Methodology involves continuous iteration of development and testing in the SDLC process. This software development method emphasizes on iterative, incremental, and evolutionary development. Agile development process breaks the product into smaller pieces and integrates them for final testing. It can be implemented in many ways, including scrum, kanban, scrum, XP, etc DevOps Considered to be the most modern approach and creating a buzz in the IT world today, ‘DevOps’ weaves its entire approach around bridging the gap between the Development and Operations teams. With the IT world becoming a smaller place to reach with widening arms to reach anywhere under the sun, DevOps Solutions has become an essential ingredient for the success of any application to effectively and efficiently converge the needs of the development and operation teams so as to ensure a completely reliable and secure end product, with as many possible errors to be encountered early
  • 9. DevOps & Cloud Adoption Rate In 2017, the global Development to Operations (DevOps) market size was 2770 million US$ and it is expected to reach 10800 million US$ by the end of 2025,
  • 10. DevOps & Cloud Adoption Rate
  • 11. But, Why ? • DevOps solve problems faster by collaborating & responsibility • Cultural enabler for cloud adoption scaling • More people can try and fails at rapid pace to meet customer demand
  • 12. DevOps Efficiencies that speed up the lifecycle
  • 13. DevOps Efficiencies that speed up the lifecycle
  • 14. DevOps Efficiencies that speed up the lifecycle
  • 15. DevSecOps Makes everyone responsible for security WWW.TJAKRABIRAWA.ID
  • 16. Where is the Security • Development without integrated security & compliance will fail • With the growing business demand for Agile, DevOps, and Public Cloud Services, traditional security testing processes have become a major obstruction • Gartner’s new concept of “DevSecOps,” which is a merger of DevOps and security aims in bringing the mindset and culture of DevOps into security testing practices. The DevOps mindset displays that security is everybody’s responsibility • Thus promote the “Shift Left” for security
  • 17. DevSecOps • DevSecOps is the answer to integrating all the various challenge into a coherent and effective software delivery. It is a new method that helps identify security issues early in the development process rather than after a product is release. • DevSecOps validate building blocks without slowing the life cycle
  • 18. What is and is not DevSecOps Is Is not A mindset & a holistic approach A One size fits all approach A collection of processes and tools A single tools or method A means of security & compliance integrated to software Just a means of adding security into the continuous delivery A community driven effort Invented by vendors
  • 20. DevSecOps Main Process • Vulnerability (VA) Scans and Assessments • Threat Modeling • Secure Code Reviews • Penetration Tests (PenTests)
  • 21. DevSecOps Secondary Process • Educating Developers on Secure Coding • Practices with workshops, talks, lessons • Secure Coding Standards • Responsible/Coordinated Disclosure • Secure code library and other reference materials, creating custom tools
  • 22. Security Testing in DevSecOps • SAST (Static Application Security Testing) – consists of internal audit of an application, when security auditor or tool has unlimited access to the application source code or binary • DAST (Dynamic Application Security Testing) – tests the application from the “outside” when the application is running in test or production environment. • IAST (Interactive Application Security Testing) – is a combination of SAST and DAST designed to leverage the advantages and strength of both. However, from the practical point of view, implementation of an IAST solution remains not an easy task.
  • 24. 10 Guide to Successful DevSecOps According to Gartner 01 03 02 “Adapt your security testing tools and processes to the developers, not the other way around:” According to the analysts, the Sec in DevSecOps should be silent. That means the security team needs to change their processes and tools to be integrated into DevOps, instead of trying to enforce their old processes be adopted. “Quit trying to eliminate all vulnerabilities during development.” “Perfect security is impossible. Zero risk is impossible. We must bring continuous risk- and trust-based assessment and prioritization of application vulnerabilities to DevSecOps,” Head and MacDonald wrote in their report. DevSecOps should be thought of as a continuous improvement process, meaning security can go beyond development and can be searching and protecting against vulnerabilities even after services are deployed into production. “Focus first on identifying and removing the known critical vulnerabilities.” Instead of wasting time trying to break a system, find focus on known security issues from pre built components, libraries, containers and frameworks; and protect against those before they are put into production. 04 06 05 “Don’t expect to use traditional DAST/SAST without changes.” Scan custom code for unknown vulnerabilities by integrating testing into the IDE, providing autonomous scans that don’t require a security expert, reducing false positives, and delivering results into a bug tracking system or development dashboard. “Train all developers on the basics of secure coding, but don’t expect them to become security experts.” Training all developers on the basis of security issues will help prevent them from creating harmful scenarios. Developers should be expected to know simple threat modeling scenarios, how to think like a hacker, and know not to put secrets like cryptographic keys and passwords into the code, according to Head. “Adopt a security champion model and implement a simple security requirements gathering tool.” A security champion is someone who can effectively lead the security community of practice, stay up to date with maturity issues, and evangelize, communicate and market what to do with security and how to adapt.
  • 25. 10 Guide to Successful DevSecOps According to Gartner 07 09 08 “Eliminate the use of known vulnerable components at the source.” “As previously stated, most risk in modern application assembly comes from the use of known vulnerable components, libraries and frameworks. Rather than wait until an application is assembled to scan and identify these known vulnerabilities, why not address this issue at its source by warning developers not to download and use these known vulnerable components,” Head and MacDonald wrote. “Secure and apply operational discipline to automation scripts.” “Treat automation code, scripts, recipes, formation scripts and other such infrastructure and platform artifacts as valuable source code with specific additional risk. Therefore, use source-code-type controls including audit, protection, digital signatures, change control and version control to protect all such infrastructure and platform artifacts,” according to the report. “Implement strong version control on all code and components.” Be able to capture every change from what was changed, when the change happened and who made the change. 10 “Adopt an immutable infrastructure mindset.“ Teams should work towards a place where all the infrastructure is only updated by the tools. This is a sign that the team is maturing, and it provides a more secure way to maintain applications, according to Head.
  • 26. Question & Answer Please not that difficult question ☺ WWW.TJAKRABIRAWA.ID
  • 27. Three Steps Process DevSecOps Quick Start 01 03 02 Reading the article and collaborate on the community at www.devsecops.id Train the developer and the security engineer with Us Implement the DevSecOps As A Service with Us
  • 29. PT. Tjakrabirawa Teknologi Indonesia Manhattan Tower 12th Floor, TB Simatupang phone : 021-80641090 | Web: http://www.tjakrabirawa.id | Info : [email protected]