SlideShare a Scribd company logo
© 2016 VERACODE INC. 1© 2016 VERACODE INC.
The Human Side
of DevSecOps
© 2016 VERACODE INC. 2
• @tojarrett
• Over 20 years in software
development and
management
• At Veracode since 2008
• Grammy award winner
• Bacon number of 3
About Tim Jarrett
This talk assumes automation.
© 2016 VERACODE INC. 4
DevOps: transformation or tragedy?
h/t @petecheslock, DevOpsDays Austin
© 2016 VERACODE INC. 6
Culture clash revisited
Credit: Gene Kim, IT Revolution
© 2016 VERACODE INC. 8
Why desiloing Security is hard
Source
• Cory Scott, LinkedIn Director Information Security, Information Security Talent
Pool Research, BlackHat CISO Summit 2015.
© 2016 VERACODE INC. 9
Consider the theory
© 2016 VERACODE INC. 10
Consider the theory
Development
work products Security
Release
velocity starved
© 2016 VERACODE INC. 11
Theory of constraints for security in software
development
Identify
Exploit
SubordinateElevate
Repeat
Remove low value work
from security team, shift
upstream where
possible
Minimize changes
requiring security
review
?
Enter Security Champions!Security Champions to the rescue
Pick the
right people
Start strong
Empower,
within limits
© 2016 VERACODE INC. 14
How to pick the right people
• Just developers
• Brand new
• (Too) Junior
• Already in a scrum role
© 2016 VERACODE INC. 15
Start strong
• Start with formal training in
security fundamentals
• Reinforce with eLearning
• Use CTFs and other opportunities
to learn in the wild
• Set guidelines for common
activities
© 2016 VERACODE INC. 16
Empower, within limits
• Security grooming within guidelines
• Security review guidelines
• Know when, and how, to escalate
The Human Side of DevSecOps
© 2016 VERACODE INC. 18
Measuring and managing
• Baseline security maturity
• Code review certifications
• Individual and team goals
© 2016 VERACODE INC. 19
Security champions:
the conscience of development.
IMPROVE
5 steps to
achieving
secure DevOps
© 2016 VERACODE INC. 22© 2016 VERACODE INC.
Questions?
Ask in the webinar or
tweet to @tojarrett

More Related Content

PPTX
The Coming Earthquake in IIS and SQL Configuration Management
Jules Pierre-Louis
 
PDF
Diving Deeper into DevOps Deployments
Jules Pierre-Louis
 
PPTX
Efficient Performance Test Automation - Opitmizing the Jenkins Pipeline
Jules Pierre-Louis
 
PDF
Behind the Book: Gene Kim's Top Takeaways from Researching and Writing 'The D...
XebiaLabs
 
PPTX
cdSummit Austin - Orchestrating the continuous delivery process - Andy Pemberton
Miles Blatstein
 
PDF
Integrating Automated Testing into DevOps
TechWell
 
PPTX
KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...
DevOpsDays Tel Aviv
 
PPTX
DevSecOps - It can change your life (cycle)
Qualitest
 
The Coming Earthquake in IIS and SQL Configuration Management
Jules Pierre-Louis
 
Diving Deeper into DevOps Deployments
Jules Pierre-Louis
 
Efficient Performance Test Automation - Opitmizing the Jenkins Pipeline
Jules Pierre-Louis
 
Behind the Book: Gene Kim's Top Takeaways from Researching and Writing 'The D...
XebiaLabs
 
cdSummit Austin - Orchestrating the continuous delivery process - Andy Pemberton
Miles Blatstein
 
Integrating Automated Testing into DevOps
TechWell
 
KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...
DevOpsDays Tel Aviv
 
DevSecOps - It can change your life (cycle)
Qualitest
 

What's hot (20)

PDF
2017 DevSecOps Survey
Sonatype
 
PPTX
Introduction to DevOps
Matthew David
 
PPTX
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
Miles Blatstein
 
PPTX
CI/CD Best Practices for Your DevOps Journey
DevOps.com
 
PDF
cdSummit Austin - Jez Humble: CD Architecture
Miles Blatstein
 
PDF
DevOps: A Culture Transformation, More than Technology
CA Technologies
 
PPTX
Starting and Scaling DevOps
Jules Pierre-Louis
 
PDF
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
SeniorStoryteller
 
PDF
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
XebiaLabs
 
PPTX
Cloud bees and forester open source is not enough
Jules Pierre-Louis
 
PDF
Barriers to Container Security and How to Overcome Them
WhiteSource
 
PPTX
Continuous Delivery and DevOps at Rabobank
XebiaLabs
 
PDF
DevOps 2016 summit
Chihyang Li
 
PDF
The New Age of Enterprise DevOps
XebiaLabs
 
PPTX
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
PPTX
DevOps by examples - Continuous Lifecycle London 2017
Giulio Vian
 
PDF
DevOps: What, who, why and how?
Red Gate Software
 
PDF
DevOps Explained
Richard Seroter
 
2017 DevSecOps Survey
Sonatype
 
Introduction to DevOps
Matthew David
 
cdSummit Austin - The Future of Enterprise Service Mangagement in a DevOps Wo...
Miles Blatstein
 
CI/CD Best Practices for Your DevOps Journey
DevOps.com
 
cdSummit Austin - Jez Humble: CD Architecture
Miles Blatstein
 
DevOps: A Culture Transformation, More than Technology
CA Technologies
 
Starting and Scaling DevOps
Jules Pierre-Louis
 
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Implementing DevOps in a Regulated Environment - DJ Schleen
SeniorStoryteller
 
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
XebiaLabs
 
Cloud bees and forester open source is not enough
Jules Pierre-Louis
 
Barriers to Container Security and How to Overcome Them
WhiteSource
 
Continuous Delivery and DevOps at Rabobank
XebiaLabs
 
DevOps 2016 summit
Chihyang Li
 
The New Age of Enterprise DevOps
XebiaLabs
 
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
DevOps by examples - Continuous Lifecycle London 2017
Giulio Vian
 
DevOps: What, who, why and how?
Red Gate Software
 
DevOps Explained
Richard Seroter
 
Ad

Viewers also liked (9)

PPTX
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Jules Pierre-Louis
 
PDF
Travis ci
Mahyuddin Mahyuddin
 
PPTX
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
Affinity Energy
 
PDF
BYOD Security Scanning
MAX Risk Intelligence by LOGICnow
 
PPTX
How to Build the Right Automation
Jules Pierre-Louis
 
PPTX
Starting and Scaling Devops
Jules Pierre-Louis
 
PDF
Hitting back against digital disruption
Mike Shaw
 
PDF
The four changes in IT because of digital technology
Mike Shaw
 
PDF
What does Digital Disruption look like?
Mike Shaw
 
Microservice Monitoring and Quality Management for Modern Apps and Infrastruc...
Jules Pierre-Louis
 
A Smart Landfill Gas Control System Design to Optimize ROI & Performance
Affinity Energy
 
BYOD Security Scanning
MAX Risk Intelligence by LOGICnow
 
How to Build the Right Automation
Jules Pierre-Louis
 
Starting and Scaling Devops
Jules Pierre-Louis
 
Hitting back against digital disruption
Mike Shaw
 
The four changes in IT because of digital technology
Mike Shaw
 
What does Digital Disruption look like?
Mike Shaw
 
Ad

Similar to The Human Side of DevSecOps (20)

PPTX
The Human Side of DevSecOps
Timothy Jarrett
 
PDF
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Sebastian Taphanel CISSP-ISSEP
 
PDF
Devops: Security's big opportunity by Peter Chestna
DevSecCon
 
PPTX
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 
PDF
DevOpsDays - Pick any Three - Devops from scratch
Pete Cheslock
 
PPTX
DevOps: Security's Big Opportunity
Timothy Jarrett
 
PDF
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
PPTX
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta
 
PDF
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
 
PDF
Defense-Oriented DevOps for Modern Software Development
James Wickett
 
PDF
Defense-Oriented DevOps for Modern Software Development
VMware Tanzu
 
PDF
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
TechWell
 
PPTX
How to get the best out of DevSecOps - a developers perspective
Colin Domoney
 
PPTX
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
PPTX
SC18 DevOps Short Introduction
Jason Echols
 
PPTX
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
PDF
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Digital Transformation EXPO Event Series
 
PPTX
How to apply DevOps in a regulated organisation
Colin Domoney
 
PDF
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
VMware Tanzu
 
The Human Side of DevSecOps
Timothy Jarrett
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Sebastian Taphanel CISSP-ISSEP
 
Devops: Security's big opportunity by Peter Chestna
DevSecCon
 
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 
DevOpsDays - Pick any Three - Devops from scratch
Pete Cheslock
 
DevOps: Security's Big Opportunity
Timothy Jarrett
 
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
 
Defense-Oriented DevOps for Modern Software Development
James Wickett
 
Defense-Oriented DevOps for Modern Software Development
VMware Tanzu
 
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
TechWell
 
How to get the best out of DevSecOps - a developers perspective
Colin Domoney
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
SC18 DevOps Short Introduction
Jason Echols
 
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
From Rogue One to Rebel Alliance: Building Developers into Security Champions
Digital Transformation EXPO Event Series
 
How to apply DevOps in a regulated organisation
Colin Domoney
 
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
VMware Tanzu
 

More from Jules Pierre-Louis (11)

PPTX
Sandstorm or Significant: The evolving role of context in Incident Management
Jules Pierre-Louis
 
PPTX
From Monolith to Microservices – and Beyond!
Jules Pierre-Louis
 
PPTX
Containers: DevOp Enablers of Technical Solutions
Jules Pierre-Louis
 
PPTX
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Jules Pierre-Louis
 
PDF
Managing Quality of Service for Containerized Microservice Applications
Jules Pierre-Louis
 
PPTX
The Evolution of Application Release Automation
Jules Pierre-Louis
 
PDF
DevOPs Transformation Workshop
Jules Pierre-Louis
 
PDF
Pipeline: Continuous Delivery as Code in Jenkins 2.0
Jules Pierre-Louis
 
PDF
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
PPTX
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
PPTX
Webinar: A Roadmap for DevOps Success
Jules Pierre-Louis
 
Sandstorm or Significant: The evolving role of context in Incident Management
Jules Pierre-Louis
 
From Monolith to Microservices – and Beyond!
Jules Pierre-Louis
 
Containers: DevOp Enablers of Technical Solutions
Jules Pierre-Louis
 
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Jules Pierre-Louis
 
Managing Quality of Service for Containerized Microservice Applications
Jules Pierre-Louis
 
The Evolution of Application Release Automation
Jules Pierre-Louis
 
DevOPs Transformation Workshop
Jules Pierre-Louis
 
Pipeline: Continuous Delivery as Code in Jenkins 2.0
Jules Pierre-Louis
 
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
7 Habits of Highly Effective Jenkins Users
Jules Pierre-Louis
 
Webinar: A Roadmap for DevOps Success
Jules Pierre-Louis
 

Recently uploaded (20)

PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PDF
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
Exploring AI Agents in Process Industries
amoreira6
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Presentation about variables and constant.pptx
kr2589474
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 

The Human Side of DevSecOps

  • 1. © 2016 VERACODE INC. 1© 2016 VERACODE INC. The Human Side of DevSecOps
  • 2. © 2016 VERACODE INC. 2 • @tojarrett • Over 20 years in software development and management • At Veracode since 2008 • Grammy award winner • Bacon number of 3 About Tim Jarrett
  • 3. This talk assumes automation.
  • 4. © 2016 VERACODE INC. 4 DevOps: transformation or tragedy?
  • 6. © 2016 VERACODE INC. 6 Culture clash revisited
  • 7. Credit: Gene Kim, IT Revolution
  • 8. © 2016 VERACODE INC. 8 Why desiloing Security is hard Source • Cory Scott, LinkedIn Director Information Security, Information Security Talent Pool Research, BlackHat CISO Summit 2015.
  • 9. © 2016 VERACODE INC. 9 Consider the theory
  • 10. © 2016 VERACODE INC. 10 Consider the theory Development work products Security Release velocity starved
  • 11. © 2016 VERACODE INC. 11 Theory of constraints for security in software development Identify Exploit SubordinateElevate Repeat Remove low value work from security team, shift upstream where possible Minimize changes requiring security review ?
  • 12. Enter Security Champions!Security Champions to the rescue
  • 13. Pick the right people Start strong Empower, within limits
  • 14. © 2016 VERACODE INC. 14 How to pick the right people • Just developers • Brand new • (Too) Junior • Already in a scrum role
  • 15. © 2016 VERACODE INC. 15 Start strong • Start with formal training in security fundamentals • Reinforce with eLearning • Use CTFs and other opportunities to learn in the wild • Set guidelines for common activities
  • 16. © 2016 VERACODE INC. 16 Empower, within limits • Security grooming within guidelines • Security review guidelines • Know when, and how, to escalate
  • 18. © 2016 VERACODE INC. 18 Measuring and managing • Baseline security maturity • Code review certifications • Individual and team goals
  • 19. © 2016 VERACODE INC. 19 Security champions: the conscience of development.
  • 22. © 2016 VERACODE INC. 22© 2016 VERACODE INC. Questions? Ask in the webinar or tweet to @tojarrett

Editor's Notes

  • #4: As noted up front, this is a talk about people and organizational factors. If you think that DevOps begins and ends at the pipeline and the technologies that plug into it, you may want to wait for the recap on Twitter. And this talk is definitely not for you if your job description for your AppSec team includes configuring, tuning, and running code and web app scanners by hand. For those of you who have had one or more transformation efforts fail due to change management failures, staff shortages, or other organizational issues—and for those who have one or more automated AppSec tools and are wondering how to make them successful—this talk is for you.
  • #5: I think none of us would be at this webinar if we didn’t think there is transformational power in DevOps. But for a lot of teams facing the DevOps transformation, the potential comes with a lot of anxiety. After all, we’re talking about collapsing silos. In the real world, when that happens, people die. This goes double for integrating Security into DevOps. But given that DevOps has already absorbed development, operations, QA and release engineering, why should the security transition be harder?
  • #6: The reason is culture clash. More than any other organization, Security has been publicly skeptical of the benefits of DevOps. They’ve seen a lot of development processes come and go, and insecure software keeps getting built. h/t @petecheslock, DevOpsDays Austin
  • #7: Let’s put a finer point on the skepticism. Security has traditionally been a discipline of controls and gates. But there’s no room for this sort of manual, expert-driven check in DevOps, just as there’s no room for weeks of manual quality assurance testing if you want to ship code several times a day. That means developers have to get security conscious, and security folks have to stop looking down their noses at DevOps and figure out how to help it move faster, not stand in the way.
  • #8: As with a lot of other things, Gene Kim’s Three Ways help us to see the problem: We need to see software delivery as an end to end system that includes security as part of the problem. Security needs to help create some of the feedback loops from production (and earlier stages of the process), and needs to help Dev interpret and act on them. And security needs to participate in the culture of continual experimentation and learning.
  • #9: A big part of the challenge of meeting the need for security to participate in DevOps is math: specifically, for every four people employed in infosec, there are three additional job openings. You can’t hire an infosec team big enough to define security requirements, perform secure code reviews, interpret security testing results, and handle security alerts for all your applications in your entire portfolio if you’re operating at DevOps speed.
  • #10: Theory of Constraints: in an end to end flow, identify the constraint, exploit, subordinate, elevate, then repeat What is the constraint in DevSecOps? Define requirements --> Develop code --> Review code --> Build code --> Test code --> Handle bugs (Almost) all have some touch between security and development First pass: Security is the constraint Exploit constraint – maximize throughput with processes like security reviews etc. Subordinate constraint – implicitly done either by minimizing the amount of security changes that happen or adding surge capacity Elevate constraint – Optimize handoffs, change the process
  • #11: So to put it another way, once you’ve optimized your Dev and Ops processes, Security becomes the constraint.
  • #12: Identify Exploit Subordinate (This theory, by the way, is why I say that this talk isn’t for you if you are still running your scanners by hand. If you’re doing that, you haven’t even begun to exploit the constraint of your security team yet.) Elevate? How do we do that? The definition is “In this step, more substantive changes are implemented to “break” the constraint. These changes may necessitate a significant investment of time and/or money” – and may involve targeted review of lost productive time, tactical actions, design and/or component upgrades, and supplementing the constraint with additional throughput. But how does that work if you don’t have enough people in the first place? You do it by making more people who can do the work that security is doing
  • #13: Enter Security Champions – members of the DevOps team who can perform lower-skill, high frequency jobs to take load off the security team and help DevSecOps to scale. You can think of this role as essentially a new guild, like release engineers or folks who work on unit tests. Some examples of things security champions can take on (we’ll talk about a few of these): Peer reviews Security grooming Code reviews (very specific topics based on certain security controls) Data validation Encoding Parameterization Logging Error handling Product security incident response – new CVEs based on impact and severity Provide details of components, how to tell if you’re exposed, etc Known vulns e.g. Shellshock/Heartbleed/Struts-Shock – triage impact, provide remediation plan This sounds great, but how will we make this happen?
  • #14: So how do we do this practically? There’s a lot to talk about here, but I want to focus on how you get started— -- how to pick the right people for the guild, how do you get the program started, and how do you set up the working relationship between the security champion and the central security team. We’ll be drawing examples from Veracode’s own experience standing up a security champion function.
  • #15: Let’s assume you’ve made the case to management. The first step is drafting your team. Let’s talk about how not to pick the right people— -- You shouldn’t assume that only developers are going to be good security champions. A strong QA resource may be a great candidate. ---- They should just have clear expectations on the time commitment. ---- And make sure to loop the managers into the call for volunteers. ---- And don’t stop with just one per team – you want to make sure you’re not introducing a new single point of failure -- You should also have clear requirements. These will probably be specific to your culture and process, but some likely common requirements include: ---- Not new to company (ramping on day 2 day) ---- Not too junior (needed an influencer) ---- Not in an existing scrum role (PO, SM)
  • #16: Now that you have the team in place, you need to give them a certain baseline knowledge. How you do this will differ according to what your security team looks like, but some of the basics are: 1. security fundamentals (2 day instructor led training) CIA, etc Trust no one Security controls must be server-side Deny by default Use white lists Defense in depth Threat modeling 2. Reinforce with eLearning to provide ongoing training and access 3. Ongoing education with CTF exercises Use stuff that’s readily available – https://overthewire.org
  • #17: Set guidelines for common activities – Product specific grooming guidelines Update based on findings Self-service review guidelines (what to teach vs. what can be done by anyone) – automate if possible (pro tip) Does it need a review Does it have to be a security team person Crypto? Can it be security champion Dictates basic acceptance criteria
  • #18: All of these things are great activities. To be really successful, you need to measure what you’re doing and how you’re making progress.
  • #19: Product security maturity model Baseline and regular updates Open Samm and BSIMM useless – built our own Needed a vision of an ideal security program Code review certification eLearning, classroom training, code review ‘test’ First year – mentored transition – failure SC do first review Expert validates results Absence of findings was a problem Formal exercise with 1:1 meeting to discuss process and findings Goals for security champions Goals for teams (against maturity model) Positive and negative impacts Include eLearning Document inside of stories with security disposition
  • #21: So this is the first step in easing security as a constraint in your process. You’ll probably find a lot of additional places to improve this process.
  • #22: Last, a quick plug – if you would like to know more about how Veracode thinks about securing DevOps, you may want to look at our white paper, 5 Steps to Achieving Secure DevOps, which includes a few other topics around automation and Appsec in Production.