SlideShare a Scribd company logo
1 of 15
Download to read offline
Why Security Engineers Need to
Shift-Left to DevSecOps
Najib Radzuan
Agenda
○
○
About Me
Najib Radzuan
● He was a Developer
● He became IT Operations
● Finally become DevOps Engineer/ DevOps Leader /
DevOps Institute Ambassador
● He is also a certified DevOps Leader, DevSecOps
Professional , Azure DevOps Expert, & etc.
● Founder of DevOps4Me
@devops4me @najibradzuan blog.devops4me.com
The Pitfall: Security & Compliance
Company
● Failure to recognise
cybersecurity basics
● Lack of Cybersecurity
Policy
● Not enough IT Security
Management
Application Developer
● Uses Open-Source
library which has a lot
of security bug risks
● They don't have formal
Application security
training.
● Lacks a recovery plan
for vulnerability risks.
AppSec / InfoSec Eng.
● Not involved in product
design/development
● The last person to
handle security and
compliance issues
● Cannot compete with
Agility and Speed of
DevOps team.
● DevSecOps also
added to the pain due
lack of CI/CD
knowledge
Traditional Security Testing
Plan Code Build Test Release Deploy Operate Monitor
Security Testing
The Pitfall
● A code review or penetration test it's
conducted to find security flaws in the
application at last Stage/Production
environment. Your Developer might
redo to eliminate the vulnerability.
● Bug/issue found when the project
deadline is near or last-minute = project
delayed
● Sometimes a bug/vulnerability is found
by the client or external pentester
Question:
Do we expect all
Developers to do security
testing and do not make
mistakes?
Solution
DevSecOps & Shift-Left
Approach
● Shifting left lets us deal with
security issues early and often
● So shifting left reduces risk and
the costs of fixing security
issues.
DevSecOps
DevSecOps is a modern model that provides that
everyone in the team is responsible for security
implementation in the application, from planning ,
design , development, QA / Testing to release, and in a
production environment.
Development
Quality
Assurance
IT Operation
Security
DevSecOps
DevSecOps Benefit
● Cost-saving is accomplish by identifying and addressing security
vulnerabilities during the development process, which also improves the
speed of delivery.
● It Improved overall security by reducing vulnerabilities, reducing insecure
defaults and increasing code coverage and automation by the use of
Infrastructure as Code (IaC).
● Everyone is responsible for security. DevSecOps fosters a culture of
transparency and accountability from the earliest stages of development.
● With help of DevSecOps, we are keeping up-to-date with the rapid creativity
common to cybercrime by effectively managing security auditing, monitoring
and notification systems.
DevSecOps Practice
Practice Secure CodingEmbrace AutomationShift-LeftPeople Process
- Neutralize senior
management mindset in
order for DevSecOps'
strategy to be embraced.
- Security specialists or
“Security Champions” will
play a key role in getting
your DevSecOps journey
right.
- Training developers on how
to develop secure code are
important to note.
- Until now, developer teams
may have not prioritized this
because the coding is the
priority. However, security
needs to be made aware of
security-related facts in
DevOps culture.
- The obvious advantage of
doing this is that you can
recognise possible
vulnerabilities and work to fix
them faster.
- The faster you notice any
bugs, the cheaper it will be
for you to fix them.
- Automation is a key feature
of DevSecOps to match the
speed of security with your
product delivery in a CI / CD
environment, security
automation is a must.
- Choosing and continuing
learning with the right
security automation tool is
key to the success of your
company's products.
- In general, different teams
within an organization
execute various tasks, with
DevSecOps, everyone works
on commonly agreed-upon
processes and executing
them to strengthen the extent
of security in development.
DevSecOps Approach
Pre-Commit Hooks
IDE Plugin
Developer
Secrets
Management
Source Code
- Software
Composition Analysis
(SCA)
-Static Analysis
Security Test (SAST)
Pre-Build
-Dynamic Analysis
Security Test (DAST)
Post-Build
Continuous Integration (CI) Tool/Server
- Defect Management
- Security Metric
-Artifact Security
Scan
Artifact
-Compliance As a
Code (CaC) - Inspec
by Chef
- Alert & Monitoring
Production
Vulnerability Management
DevSecOps Tools of the Trade
Developer Source Code Pre-Build Post-Build
Continuous Integration (CI) Tool/Server
Vulnerability Management
Artifact Production
**Above just an example, we don’t endorse any tool.
Retire.js
Example of DevSecOps Workflow
Push
Code
Source Code
Management
Developer
Pull Request
Scan
Pull
Request
Creation
Complete
Branch Scan
Trigger Build
CI/CD Tool / Server
1
2
3
Build Solution
Software
Analysis
(SCA) & Static
Security Scan
(SAST)
Artifact /
Image
4
Test
Staging
ProductionTrigger
Release
Release
Management
Pre-Approval
Deployment to
Environment
5
6
Dynamic Security
Scan (DAST)
Dynamic Security
Scan (DAST)
Pull
Image
Deploy
Talisman
How To Start DevSecOps?
1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple
as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are
in doubt about the process or toolchain.
2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then
decide if the change is good or bad.
3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance,
including obtaining proof of compliance with GDPR, PCI, etc.).
4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly.
5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are
being responded to and patched.
6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other
security skills.
Conclusion
● I think that every company/Security Engineers must make an effort to
"Shift-Left" to a DevSecOps culture or methodologies and come up with a
multidisciplinary security team.
● Approaching "Security As a Code", moving security practices to the left and
educating software developers on critical testing and security practices are
essential aspects to engage security as part of the DevOps process.
● The key is to be ready to start, to encourage experimentation, to be willing
to fail, to learn and to move forward one step at a time.
Question &
Answer
“If you don’t ask, you will never get
the answer.”

More Related Content

What's hot

Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsSuman Sourav
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Dinis Cruz
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityStephen de Vries
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevOps Indonesia
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOpsArchana Joshi
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment securityDevSecCon
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017Suman Sourav
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsSuman Sourav
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpskieranjacobsen
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minuteskieranjacobsen
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 

What's hot (20)

DevSecOps outline
DevSecOps outlineDevSecOps outline
DevSecOps outline
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
Application Security Logging with Splunk using Java
Application Security Logging with Splunk using JavaApplication Security Logging with Splunk using Java
Application Security Logging with Splunk using Java
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOps
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minutes
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 

Similar to Why Security Engineer Need Shift-Left to DevSecOps?

DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDev Software
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Enov8
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}Ajeet Singh
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineDevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineEnov8
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdfEnov8
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.Techugo
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.Techugo
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdfTechugo
 
How To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowHow To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowEnov8
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineCloudZenix LLC
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenNadira Bajrei
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfEnov8
 
Ensuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityEnsuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityDev Software
 
DevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDev Software
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?Enov8
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxDev Software
 

Similar to Why Security Engineer Need Shift-Left to DevSecOps? (20)

DevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLCDevSecOps: Integrating Security Into Your SDLC
DevSecOps: Integrating Security Into Your SDLC
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?Why You Should Implement DevSecOps Approach?
Why You Should Implement DevSecOps Approach?
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}DevSecOps: Integrating Security Into DevOps! {Business Security}
DevSecOps: Integrating Security Into DevOps! {Business Security}
 
DevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps PipelineDevSecOps Implement Making Security Central to Your DevOps Pipeline
DevSecOps Implement Making Security Central to Your DevOps Pipeline
 
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfResolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdf
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.DevOps and Devsecops- Everything you need to know.
DevOps and Devsecops- Everything you need to know.
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.DevOps and Devsecops- What are the Differences.
DevOps and Devsecops- What are the Differences.
 
DevOps and Devsecops.pdf
DevOps and Devsecops.pdfDevOps and Devsecops.pdf
DevOps and Devsecops.pdf
 
How To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps WorkflowHow To Implement DevSecOps In Your Existing DevOps Workflow
How To Implement DevSecOps In Your Existing DevOps Workflow
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD Pipeline
 
Dev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien HarisenDev secops indonesia-devsecops as a service-Amien Harisen
Dev secops indonesia-devsecops as a service-Amien Harisen
 
All About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdfAll About Intelligent Orchestration :The Future of DevSecOps.pdf
All About Intelligent Orchestration :The Future of DevSecOps.pdf
 
Ensuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps SecurityEnsuring Secure and Efficient Operations with DevOps Security
Ensuring Secure and Efficient Operations with DevOps Security
 
DevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and DeliveryDevOps Security: How to Secure Your Software Development and Delivery
DevOps Security: How to Secure Your Software Development and Delivery
 
DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?DevSecOps Security: Is it Necessary?
DevSecOps Security: Is it Necessary?
 
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptxHow DevSecOps Can Help You Deliver Software Faster and Safer.pptx
How DevSecOps Can Help You Deliver Software Faster and Safer.pptx
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Why Security Engineer Need Shift-Left to DevSecOps?

  • 1. Why Security Engineers Need to Shift-Left to DevSecOps Najib Radzuan
  • 3. About Me Najib Radzuan ● He was a Developer ● He became IT Operations ● Finally become DevOps Engineer/ DevOps Leader / DevOps Institute Ambassador ● He is also a certified DevOps Leader, DevSecOps Professional , Azure DevOps Expert, & etc. ● Founder of DevOps4Me @devops4me @najibradzuan blog.devops4me.com
  • 4. The Pitfall: Security & Compliance Company ● Failure to recognise cybersecurity basics ● Lack of Cybersecurity Policy ● Not enough IT Security Management Application Developer ● Uses Open-Source library which has a lot of security bug risks ● They don't have formal Application security training. ● Lacks a recovery plan for vulnerability risks. AppSec / InfoSec Eng. ● Not involved in product design/development ● The last person to handle security and compliance issues ● Cannot compete with Agility and Speed of DevOps team. ● DevSecOps also added to the pain due lack of CI/CD knowledge
  • 5. Traditional Security Testing Plan Code Build Test Release Deploy Operate Monitor Security Testing The Pitfall ● A code review or penetration test it's conducted to find security flaws in the application at last Stage/Production environment. Your Developer might redo to eliminate the vulnerability. ● Bug/issue found when the project deadline is near or last-minute = project delayed ● Sometimes a bug/vulnerability is found by the client or external pentester Question: Do we expect all Developers to do security testing and do not make mistakes?
  • 6. Solution DevSecOps & Shift-Left Approach ● Shifting left lets us deal with security issues early and often ● So shifting left reduces risk and the costs of fixing security issues.
  • 7. DevSecOps DevSecOps is a modern model that provides that everyone in the team is responsible for security implementation in the application, from planning , design , development, QA / Testing to release, and in a production environment. Development Quality Assurance IT Operation Security DevSecOps
  • 8. DevSecOps Benefit ● Cost-saving is accomplish by identifying and addressing security vulnerabilities during the development process, which also improves the speed of delivery. ● It Improved overall security by reducing vulnerabilities, reducing insecure defaults and increasing code coverage and automation by the use of Infrastructure as Code (IaC). ● Everyone is responsible for security. DevSecOps fosters a culture of transparency and accountability from the earliest stages of development. ● With help of DevSecOps, we are keeping up-to-date with the rapid creativity common to cybercrime by effectively managing security auditing, monitoring and notification systems.
  • 9. DevSecOps Practice Practice Secure CodingEmbrace AutomationShift-LeftPeople Process - Neutralize senior management mindset in order for DevSecOps' strategy to be embraced. - Security specialists or “Security Champions” will play a key role in getting your DevSecOps journey right. - Training developers on how to develop secure code are important to note. - Until now, developer teams may have not prioritized this because the coding is the priority. However, security needs to be made aware of security-related facts in DevOps culture. - The obvious advantage of doing this is that you can recognise possible vulnerabilities and work to fix them faster. - The faster you notice any bugs, the cheaper it will be for you to fix them. - Automation is a key feature of DevSecOps to match the speed of security with your product delivery in a CI / CD environment, security automation is a must. - Choosing and continuing learning with the right security automation tool is key to the success of your company's products. - In general, different teams within an organization execute various tasks, with DevSecOps, everyone works on commonly agreed-upon processes and executing them to strengthen the extent of security in development.
  • 10. DevSecOps Approach Pre-Commit Hooks IDE Plugin Developer Secrets Management Source Code - Software Composition Analysis (SCA) -Static Analysis Security Test (SAST) Pre-Build -Dynamic Analysis Security Test (DAST) Post-Build Continuous Integration (CI) Tool/Server - Defect Management - Security Metric -Artifact Security Scan Artifact -Compliance As a Code (CaC) - Inspec by Chef - Alert & Monitoring Production Vulnerability Management
  • 11. DevSecOps Tools of the Trade Developer Source Code Pre-Build Post-Build Continuous Integration (CI) Tool/Server Vulnerability Management Artifact Production **Above just an example, we don’t endorse any tool. Retire.js
  • 12. Example of DevSecOps Workflow Push Code Source Code Management Developer Pull Request Scan Pull Request Creation Complete Branch Scan Trigger Build CI/CD Tool / Server 1 2 3 Build Solution Software Analysis (SCA) & Static Security Scan (SAST) Artifact / Image 4 Test Staging ProductionTrigger Release Release Management Pre-Approval Deployment to Environment 5 6 Dynamic Security Scan (DAST) Dynamic Security Scan (DAST) Pull Image Deploy Talisman
  • 13. How To Start DevSecOps? 1. Start Small – Always start with code analysis on a small project to implement DevSecOps and keep it as simple as possible to avoid burnout if you cannot find the right tool for your security test. Make sure to get help if you are in doubt about the process or toolchain. 2. Change Management – Increase pace and performance by encouraging everyone to make changes, and then decide if the change is good or bad. 3. Compliance Monitoring – Be prepared to inspect at any time ( i.e. being in a continuous state of compliance, including obtaining proof of compliance with GDPR, PCI, etc.). 4. Threat Modeling – Identify potential emerging threats with each code update and be able to respond quickly. 5. Vulnerability Assessment – Identify new vulnerabilities with code analysis, then analyze how quickly they are being responded to and patched. 6. Security Training – Train and upskill developers and IT Operations with guidelines for DevSecOps and other security skills.
  • 14. Conclusion ● I think that every company/Security Engineers must make an effort to "Shift-Left" to a DevSecOps culture or methodologies and come up with a multidisciplinary security team. ● Approaching "Security As a Code", moving security practices to the left and educating software developers on critical testing and security practices are essential aspects to engage security as part of the DevOps process. ● The key is to be ready to start, to encourage experimentation, to be willing to fail, to learn and to move forward one step at a time.
  • 15. Question & Answer “If you don’t ask, you will never get the answer.”