Scale security in a dollar or less
@secfigoɂ www.teachera.io secfigo@gmail.com
DevSecOps London Meetup
2
Mohammed A. Imran
Senior Security Engineer
# whoami
Author, Speaker and Community Leader.
Trainer at Blackhat, AppSec EU, Pycon, Nullcon etc.,
Organizer of DevSecOps Track in OSS 2018.
Project Leader for OWASP DevSecOps Studio, DevSlop,
Integra and Awesome-Fuzzing projects.
Organised around 100 monthly security meetings and
about 50 workshops.
SCJP, OSCP, OSCE.
Reachable on @secfigo
Agile and DevOps 1
Long Long time ago
Trivia: how is this related to Singapore ?
5
Traditional SDLC
Requirements
Gather Requirements
from the client/customer
Implementation
Implement the design
agreed upon
Maintain
Maintain of the software
in production
Deploy
Deploy the software to
the production
Design
Design the software according to
the requirements
Business
Requirements
Development
Teams
Wall of uncertainty
7
Enter the
change
Agile
Everything changed after agile,
much shorter development cycles
and faster deploys to production.
Speed with which changes are
being made is beyond security’s
(operations) 🚨 reach.
Then Agile
Happened
Developers Operations
Wall of confusion
9
DevOps is a set of practices intended
to reduce the time between
committing a change to a system and
the change being placed into normal
production, while ensuring high
quality - Bass, Weber, and Zhu
DevOps
Development
(Software Engineering)
Operations
(Quality Assurance)
DevOps
D
10
Plan & Create
Plan and implement the
code using source code
management (SCM)
A
Monitor
Create
Verify
Package
Release
Configure
DevOps
Verify
Test and verify the code
does, what business
wants.
B
Package
Package the code in a
deployable artifact & test
it in staging environment
C
Release
Release the artefact as
production ready after
change/release approvals
Configure
Configure the application/
stack using configuration
management
E
Monitor
Monitor the application
for its performance,
security and compliance
F
DevOps Cycle
Scale security for a dollar or less
DevOps Security
Wall of compliance
DevOps Security
Wall of compliance
14
Traditional Secure SDLC
15
Security is Outnumbered!
Dev / Ops / Security
100 / 10 / 1
16
DevOps is a set of practices intended to
reduce the time between committing a
change to a system and the change being
placed into normal production, while
ensuring high quality - Bass, Weber, and Zhu
By definition, security is part of DevOps.
DevSecOps Development
(Software Engineering)
Security
(Quality Assurance)
Operations
DevSecOps
17
Flexibility
With ever changing technology,
businesses have to be flexible and
fast to deliver value to their
customers otherwise they risk losing
the business.
Reliability
Customers need more reliable
& available systems. DevOps
reduces failure rates and
provides faster feedback
Resilience
DevOps helps organisations in
designing and implementing resilient
systems.
Automation
Automation helps to reduce
complexity of modern systems and
can scale as per needs
Speed
Speed is competitive
advantage and DevOps
helps to go to market faster.
Development
Security
(Quality Assurance)
Operations
DevSecOps
DevSecOps Benefits
18
Culture
DevOps is about breaking down
barriers between teams; without
culture other practices fail
C A
M S
Measurement
Measuring activities in CI/CD helps
in informed decision making among
teams
Automation
Often mistaken as DevOps itself but
a very important aspect of the
initiative.
Sharing
Sharing tools, best practices etc.,
among the teams/organization
improves confidence for collaboration.
How to DevSecOps ?
Core Values of DevOps
Build bridges, not walls!
Build guard rails, not gates!
Embed security early and often
Conway’s Law
Any organization that designs a system
(defined broadly) will produce a design
whose structure is a copy of the
organization's communication structure.
“
Continuous Integration/Deployment 2
23
CI/CD
CODEPLAN BUILD TEST RELEASE Deploy OPERATE
Requirements Code
Repository
CI Server Integration
Testing
CD
Orchestration
MonitorArtefact
Repository
Functional req.
Non Functional req.
Design
Code
Branching
Third party components
Hooks
Compile
Basic tests
Lint(analyze)
Package
Security
Integration
Performance
Security
Test on staging
Release
Schedule
Configuration
Inventory
Infrastructure
Metrics
Monitoring
Alerting
Agile Development
Continuous Integration
Continuous Delivery
Continuous Deployment
DevOps/DevSecOps
CODEPLAN BUILD TEST RELEASE Deploy OPERATE
Requirements Code
Repository
CI Server Integration
Testing
CD
Orchestration
MonitorArtefact
Repository
Scale security with DevOps 3
26
DevSecOps
Implementation
So far we have looked at Principles and
Ideas behind DevSecOps but how do we
start implementing DevSecOps ?
We can use the techniques ( see towards
your right hand side) discussed in this
course to implement a full blown security
pipeline.
Everything as Code(EAC
Compliance as Code and
hardening via configuration
management systems
Secure by Default
Use secure by default
frameworks and services
Shift Security Left
Use CI/CD pipeline to
embed security
Self Service
Gives developers and
operations visibility into
security activities
Security Champions
Encourage security
champions to pick
security tasks.
Use maturity models
Use DevSecOps Maturity
Models to improve further
1. Shift Security left
Use CI/CD pipeline to embed security early on
CODEPLAN BUILD TEST RELEASE Deploy OPERATE
Requirements Code
Repository
CI Server Integration
Testing
CD
Orchestration
MonitorArtefact
Repository
Functional req.
Non Functional req.
Design
Code
Branching
Third party components
Hooks
Compile
Basic tests
Lint(Analyze)
Package
Security
Integration
Performance
Security
Test on staging
Release
Schedule
Configuration
Inventory
Infrastructure
Metrics
Monitoring
Alerting
DevOps: Typical Activities
Threat Modelling
ASVS
Git secrets
Dependency Scanning
Dependency Scanning
Code Analysis(SAST)
Security Unit Tests
Docker security Testing
Git secrets scanning
Component scanning
ZAP testing - baseline
Container Scanning
Modsecurity CRS
Docker/Third Party
SSL scanning
Nikto/dirbuster
WPScan/JoomScan
ZAP + selenium + python
Component scanning
Docker Benchmark
System Hardening
Application Hardening
Compliance as code
SOC with ELK
Verify Controls
CODEPLAN BUILD TEST RELEASE Deploy OPERATE
Requirements Code
Repository
CI Server Integration
Testing
CD
Orchestration
MonitoringArtefact
Repository
DevOps: Typical Security Activities
2. Self Service
Gives developers and operations visibility into security activities
Security Champions
Shifting Left, literally
OpsOps
3. Security as Code (EaC)
Compliance as Code and hardening via configuration management systems
4. Secure by default
Use secure by default frameworks and services
DevSecOps Maturity Model 4
DevSecOps Maturity Model (DSOMM)
Source: https://www.slideshare.net/cschneider4711/hackpra-2015-security-devops-free-pentesters-time-to-focus-on-highhanging-fruits
DevSecOps Maturity Model (DSOMM)
Static Depth: How deep is static code analysis ?
Dynamic Depth:  How deep are dynamic scans executed ?
Intensity:  How intense are the majority of the executed attacks ?
Consolidation:  How complete is the process of handling findings ?
Source: https://www.slideshare.net/cschneider4711/hackpra-2015-security-devops-free-pentesters-time-to-focus-on-highhanging-fruits
38
Security Tools in CI/CD
1. Anything which takes more than 10 minutes (me being optimistic), isn’t fit for CI/CD
2. SAST/DAST without creating custom rules/tweaks is of not huge benefit down the line.
3. Create separate jobs for easy debugging later.
4. Roll out tools in phases.
5. Fail builds when critical/high severity issues are found (after you have given devs/ops enough time to
learn and get used to the security tools)
6. Link wiki in the scan outputs if someone needs some answers.
7. Tools which provide APIs are huge wins but make sure you at least have a CLI
8. See if your tools does incremental/baseline scans.
9. Some Ability to control the scope and false positives locally is nice (see brakeman/zap/dependency
checker).
10. When in doubt ask Developers/QA for the help.
11. Everything as Code (EaC). Auditable, measurable and secure
ō
Let’s see DevSecOps
pipeline in Action
DEMO
40
DevSecOps Studio is a virtual environment to learn
and teach DevSecOps concepts. Its easy to get
started and is mostly automatic.
It takes lots of efforts to setup a DevSecOps
environment for training/demos and more often,
its error prone when done manually.
OWASP
DevSecOps Studio
https://github.com/teacheraio/DevSecOps-Studio/
41
Easy to setup
Takes only few mins to setup and
start using with just one command
A
Reproducible
The aim of this project is to
setup reproducible
DevSecOps Lab environment
for learning and testing
different tools.
B
Free & Open
Source Software
This project is a free
and open software to
help more people learn
about DevSecOps
C
DevSecOps
Studio Benefits
42
Our Setup for On-Premise
GITLABDeveloper(s)
> > >Gitlab CI/CD RUNNER PROD SERVER
>
Push Code
to git repo
Triggers Build Run tests Deploys to
Production
43
Our Setup for On-Premise
Developer(s)
> > >JEnkins CI/CD JENKINS SLAVE PROD SERVER
>
Push Code
to git repo
Triggers Build Run tests Deploys to
Production
GITLAB
44
Python security tools
Security Test Tool
SAST Bandit
DAST ZAP Baseline
Hardening Ansible
Compliance Inspec
Git Secrets Trufflehog
45
Conclusion
In conclusion, we don't need large sums of
money to implement DevSecOps. We can
use free and open source tools to
showcase the benefits and value
DevSecOps provides to the organization(s).
Go on, embed security as part of CI/CD
Everything as Code(EAC
Use Configuration
management (IaC) to
implement Security as Code
Secure by Default
Use secure by default
frameworks and services
Shift Security Left
Use CI/CD pipeline to
embed security early on
Self Service
Give developers and
operations visibility into
security activities/tools
Security Champions
Encourage security
champions to pick
security tasks.
Use maturity models
Use DevSecOps Maturity
Models to improve further
Thank you!
You folks are awesome.
@secfigoɂ www.teachera.io secfigo@gmail.com

More Related Content

PDF
Strengthen and Scale Security for a dollar or less
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PDF
8 Tips for Deploying DevSecOps
PPTX
How to Get Started with DevSecOps
PDF
DevSecOps | DevOps Sec
PPTX
Simplify Dev with Complicated Security Tools
PPTX
DevSecOps
PDF
DevOps or DevSecOps
Strengthen and Scale Security for a dollar or less
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
8 Tips for Deploying DevSecOps
How to Get Started with DevSecOps
DevSecOps | DevOps Sec
Simplify Dev with Complicated Security Tools
DevSecOps
DevOps or DevSecOps

What's hot (20)

PDF
DevSecOps Fundamentals and the Scars to Prove it.
PPT
Code Quality - Security
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PDF
Automating Security Compliance on AWS with DevSecOps
PDF
DevSecOps: What Why and How : Blackhat 2019
PPTX
Security Testing for Containerized Applications
PPTX
Integrating security into Continuous Delivery
PDF
DevSecOps for you Full Stack
PPTX
Unit testing : what are you missing for security
PPTX
DevSecOps OWASP
PDF
Why should developers care about container security?
PDF
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
PDF
DevSecOps The Evolution of DevOps
PDF
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
PPTX
DevOps Friendly Doc Publishing for APIs & Microservices
PDF
SecDevOps
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
PDF
Increasing Quality with DevOps
DevSecOps Fundamentals and the Scars to Prove it.
Code Quality - Security
DevSecOps: essential tooling to enable continuous security 2019-09-16
Automating Security Compliance on AWS with DevSecOps
DevSecOps: What Why and How : Blackhat 2019
Security Testing for Containerized Applications
Integrating security into Continuous Delivery
DevSecOps for you Full Stack
Unit testing : what are you missing for security
DevSecOps OWASP
Why should developers care about container security?
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
DevSecOps The Evolution of DevOps
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Security in CI/CD Pipelines: Tips for DevOps Engineers
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
DevOps Friendly Doc Publishing for APIs & Microservices
SecDevOps
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Increasing Quality with DevOps
Ad

Similar to Scale security for a dollar or less (20)

PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PPTX
Introduction to DevSecOps OWASP Ahmedabad
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PDF
How To Implement DevSecOps In Your Existing DevOps Workflow
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
You build it - Cyber Chicago Keynote
PDF
The Rise of DevSecOps in CI_CD Workflows.pdf
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PPTX
Secure DevOPS Implementation Guidance
PPTX
What is devsecops and what is the characteristics of it
PPTX
ISACA Ireland Keynote 2015
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
Ensuring Secure and Efficient Operations with DevOps Security
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PDF
Understanding DevSecOps.pdf
PDF
From DevOps to DevSecOps: Evolution of Secure Software Development
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
PDF
Practical DevSecOps Course - Part 1
PDF
Why You Should Implement DevSecOps Approach?
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Introduction to DevSecOps OWASP Ahmedabad
Why Security Engineer Need Shift-Left to DevSecOps?
How To Implement DevSecOps In Your Existing DevOps Workflow
Pentest is yesterday, DevSecOps is tomorrow
You build it - Cyber Chicago Keynote
The Rise of DevSecOps in CI_CD Workflows.pdf
Outpost24 webinar: Turning DevOps and security into DevSecOps
Secure DevOPS Implementation Guidance
What is devsecops and what is the characteristics of it
ISACA Ireland Keynote 2015
Secure DevOps - Evolution or Revolution?
Ensuring Secure and Efficient Operations with DevOps Security
Protecting Agile Transformation through Secure DevOps (DevSecOps)
DevSecOps Best Practices-Safeguarding Your Digital Landscape
Understanding DevSecOps.pdf
From DevOps to DevSecOps: Evolution of Secure Software Development
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
Practical DevSecOps Course - Part 1
Why You Should Implement DevSecOps Approach?
Ad

More from Mohammed A. Imran (12)

PPT
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
In graph we trust: Microservices, GraphQL and security challenges
PDF
Null Singapore 2015 accomplishments
PDF
Exploit development 101 - Part 1 - Null Singapore
PDF
Null Singapore Introduction
PDF
Pentesting RESTful webservices
PDF
Cross site scripting attacks and defenses
PDF
Assembly language part I
PDF
How to secure web applications
PDF
About Null open security community
PDF
How to find Zero day vulnerabilities
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
[DevSecOps Live] DevSecOps: Challenges and Opportunities
In graph we trust: Microservices, GraphQL and security challenges
Null Singapore 2015 accomplishments
Exploit development 101 - Part 1 - Null Singapore
Null Singapore Introduction
Pentesting RESTful webservices
Cross site scripting attacks and defenses
Assembly language part I
How to secure web applications
About Null open security community
How to find Zero day vulnerabilities

Recently uploaded (20)

PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
Configure Apache Mutual Authentication
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Data Virtualization in Action: Scaling APIs and Apps with FME
The influence of sentiment analysis in enhancing early warning system model f...
Enhancing plagiarism detection using data pre-processing and machine learning...
Auditboard EB SOX Playbook 2023 edition.
sbt 2.0: go big (Scala Days 2025 edition)
NewMind AI Weekly Chronicles – August ’25 Week IV
Comparative analysis of machine learning models for fake news detection in so...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Early detection and classification of bone marrow changes in lumbar vertebrae...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
4 layer Arch & Reference Arch of IoT.pdf
Consumable AI The What, Why & How for Small Teams.pdf
future_of_ai_comprehensive_20250822032121.pptx
Configure Apache Mutual Authentication
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...

Scale security for a dollar or less

  • 1. Scale security in a dollar or less @secfigoɂ www.teachera.io secfi[email protected] DevSecOps London Meetup
  • 2. 2 Mohammed A. Imran Senior Security Engineer # whoami Author, Speaker and Community Leader. Trainer at Blackhat, AppSec EU, Pycon, Nullcon etc., Organizer of DevSecOps Track in OSS 2018. Project Leader for OWASP DevSecOps Studio, DevSlop, Integra and Awesome-Fuzzing projects. Organised around 100 monthly security meetings and about 50 workshops. SCJP, OSCP, OSCE. Reachable on @secfigo
  • 4. Long Long time ago Trivia: how is this related to Singapore ?
  • 5. 5 Traditional SDLC Requirements Gather Requirements from the client/customer Implementation Implement the design agreed upon Maintain Maintain of the software in production Deploy Deploy the software to the production Design Design the software according to the requirements
  • 7. 7 Enter the change Agile Everything changed after agile, much shorter development cycles and faster deploys to production. Speed with which changes are being made is beyond security’s (operations) 🚨 reach. Then Agile Happened
  • 9. 9 DevOps is a set of practices intended to reduce the time between committing a change to a system and the change being placed into normal production, while ensuring high quality - Bass, Weber, and Zhu DevOps Development (Software Engineering) Operations (Quality Assurance) DevOps
  • 10. D 10 Plan & Create Plan and implement the code using source code management (SCM) A Monitor Create Verify Package Release Configure DevOps Verify Test and verify the code does, what business wants. B Package Package the code in a deployable artifact & test it in staging environment C Release Release the artefact as production ready after change/release approvals Configure Configure the application/ stack using configuration management E Monitor Monitor the application for its performance, security and compliance F DevOps Cycle
  • 15. 15 Security is Outnumbered! Dev / Ops / Security 100 / 10 / 1
  • 16. 16 DevOps is a set of practices intended to reduce the time between committing a change to a system and the change being placed into normal production, while ensuring high quality - Bass, Weber, and Zhu By definition, security is part of DevOps. DevSecOps Development (Software Engineering) Security (Quality Assurance) Operations DevSecOps
  • 17. 17 Flexibility With ever changing technology, businesses have to be flexible and fast to deliver value to their customers otherwise they risk losing the business. Reliability Customers need more reliable & available systems. DevOps reduces failure rates and provides faster feedback Resilience DevOps helps organisations in designing and implementing resilient systems. Automation Automation helps to reduce complexity of modern systems and can scale as per needs Speed Speed is competitive advantage and DevOps helps to go to market faster. Development Security (Quality Assurance) Operations DevSecOps DevSecOps Benefits
  • 18. 18 Culture DevOps is about breaking down barriers between teams; without culture other practices fail C A M S Measurement Measuring activities in CI/CD helps in informed decision making among teams Automation Often mistaken as DevOps itself but a very important aspect of the initiative. Sharing Sharing tools, best practices etc., among the teams/organization improves confidence for collaboration. How to DevSecOps ? Core Values of DevOps
  • 20. Build guard rails, not gates! Embed security early and often
  • 21. Conway’s Law Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization's communication structure. “
  • 23. 23 CI/CD CODEPLAN BUILD TEST RELEASE Deploy OPERATE Requirements Code Repository CI Server Integration Testing CD Orchestration MonitorArtefact Repository Functional req. Non Functional req. Design Code Branching Third party components Hooks Compile Basic tests Lint(analyze) Package Security Integration Performance Security Test on staging Release Schedule Configuration Inventory Infrastructure Metrics Monitoring Alerting
  • 24. Agile Development Continuous Integration Continuous Delivery Continuous Deployment DevOps/DevSecOps CODEPLAN BUILD TEST RELEASE Deploy OPERATE Requirements Code Repository CI Server Integration Testing CD Orchestration MonitorArtefact Repository
  • 26. 26 DevSecOps Implementation So far we have looked at Principles and Ideas behind DevSecOps but how do we start implementing DevSecOps ? We can use the techniques ( see towards your right hand side) discussed in this course to implement a full blown security pipeline. Everything as Code(EAC Compliance as Code and hardening via configuration management systems Secure by Default Use secure by default frameworks and services Shift Security Left Use CI/CD pipeline to embed security Self Service Gives developers and operations visibility into security activities Security Champions Encourage security champions to pick security tasks. Use maturity models Use DevSecOps Maturity Models to improve further
  • 27. 1. Shift Security left Use CI/CD pipeline to embed security early on
  • 28. CODEPLAN BUILD TEST RELEASE Deploy OPERATE Requirements Code Repository CI Server Integration Testing CD Orchestration MonitorArtefact Repository Functional req. Non Functional req. Design Code Branching Third party components Hooks Compile Basic tests Lint(Analyze) Package Security Integration Performance Security Test on staging Release Schedule Configuration Inventory Infrastructure Metrics Monitoring Alerting DevOps: Typical Activities
  • 29. Threat Modelling ASVS Git secrets Dependency Scanning Dependency Scanning Code Analysis(SAST) Security Unit Tests Docker security Testing Git secrets scanning Component scanning ZAP testing - baseline Container Scanning Modsecurity CRS Docker/Third Party SSL scanning Nikto/dirbuster WPScan/JoomScan ZAP + selenium + python Component scanning Docker Benchmark System Hardening Application Hardening Compliance as code SOC with ELK Verify Controls CODEPLAN BUILD TEST RELEASE Deploy OPERATE Requirements Code Repository CI Server Integration Testing CD Orchestration MonitoringArtefact Repository DevOps: Typical Security Activities
  • 30. 2. Self Service Gives developers and operations visibility into security activities
  • 33. 3. Security as Code (EaC) Compliance as Code and hardening via configuration management systems
  • 34. 4. Secure by default Use secure by default frameworks and services
  • 36. DevSecOps Maturity Model (DSOMM) Source: https://www.slideshare.net/cschneider4711/hackpra-2015-security-devops-free-pentesters-time-to-focus-on-highhanging-fruits
  • 37. DevSecOps Maturity Model (DSOMM) Static Depth: How deep is static code analysis ? Dynamic Depth:  How deep are dynamic scans executed ? Intensity:  How intense are the majority of the executed attacks ? Consolidation:  How complete is the process of handling findings ? Source: https://www.slideshare.net/cschneider4711/hackpra-2015-security-devops-free-pentesters-time-to-focus-on-highhanging-fruits
  • 38. 38 Security Tools in CI/CD 1. Anything which takes more than 10 minutes (me being optimistic), isn’t fit for CI/CD 2. SAST/DAST without creating custom rules/tweaks is of not huge benefit down the line. 3. Create separate jobs for easy debugging later. 4. Roll out tools in phases. 5. Fail builds when critical/high severity issues are found (after you have given devs/ops enough time to learn and get used to the security tools) 6. Link wiki in the scan outputs if someone needs some answers. 7. Tools which provide APIs are huge wins but make sure you at least have a CLI 8. See if your tools does incremental/baseline scans. 9. Some Ability to control the scope and false positives locally is nice (see brakeman/zap/dependency checker). 10. When in doubt ask Developers/QA for the help. 11. Everything as Code (EaC). Auditable, measurable and secure
  • 40. 40 DevSecOps Studio is a virtual environment to learn and teach DevSecOps concepts. Its easy to get started and is mostly automatic. It takes lots of efforts to setup a DevSecOps environment for training/demos and more often, its error prone when done manually. OWASP DevSecOps Studio https://github.com/teacheraio/DevSecOps-Studio/
  • 41. 41 Easy to setup Takes only few mins to setup and start using with just one command A Reproducible The aim of this project is to setup reproducible DevSecOps Lab environment for learning and testing different tools. B Free & Open Source Software This project is a free and open software to help more people learn about DevSecOps C DevSecOps Studio Benefits
  • 42. 42 Our Setup for On-Premise GITLABDeveloper(s) > > >Gitlab CI/CD RUNNER PROD SERVER > Push Code to git repo Triggers Build Run tests Deploys to Production
  • 43. 43 Our Setup for On-Premise Developer(s) > > >JEnkins CI/CD JENKINS SLAVE PROD SERVER > Push Code to git repo Triggers Build Run tests Deploys to Production GITLAB
  • 44. 44 Python security tools Security Test Tool SAST Bandit DAST ZAP Baseline Hardening Ansible Compliance Inspec Git Secrets Trufflehog
  • 45. 45 Conclusion In conclusion, we don't need large sums of money to implement DevSecOps. We can use free and open source tools to showcase the benefits and value DevSecOps provides to the organization(s). Go on, embed security as part of CI/CD Everything as Code(EAC Use Configuration management (IaC) to implement Security as Code Secure by Default Use secure by default frameworks and services Shift Security Left Use CI/CD pipeline to embed security early on Self Service Give developers and operations visibility into security activities/tools Security Champions Encourage security champions to pick security tasks. Use maturity models Use DevSecOps Maturity Models to improve further
  • 46. Thank you! You folks are awesome. @secfigoɂ www.teachera.io secfi[email protected]