- Home
- >
- DevOps News
- >
- Building a Collaborative DevSecOps Culture that Works – InApps 2022
Building a Collaborative DevSecOps Culture that Works – InApps is an article under the topic Devops Many of you are most interested in today !! Today, let’s InApps.net learn Building a Collaborative DevSecOps Culture that Works – InApps in today’s post !
Read more about Building a Collaborative DevSecOps Culture that Works – InApps at Wikipedia
You can find content about Building a Collaborative DevSecOps Culture that Works – InApps from the Wikipedia website
The cultural and technical change of DevSecOps can be tough to grasp. But Tanya Janca, a security trainer, offered InApps readers a succinct definition: “DevSecOps is what the security people do to enable developers and operations to make awesome, rugged, safe and secure systems.”
DevSecOps puts security at the center of the DevOps pipeline. It’s another technical and cultural shift left, which sees security engineers embedded on DevOps teams throughout the software development lifecycle, from ideation to sunsetting.
In this model, security is no longer the last hurdle right before production. DevSecOps means cybersecurity teams understand how to codify their policies, and developers and sysadmins learn firsthand how security can be used to actually speed up release cycles.
DevSecOps culture and processes aren’t easy to foster, but it’s the only way forward as high-profile cyberattacks have become the norm. And with cybersecurity experiencing a terrifying talent gap, everyone has to pitch in to keep systems secure. Here’s what you need to get teams into the right unified mindset necessary for DevSecOps success.
Setting up a DevOps/Security Mind Meld
“The whole DevOps movement to me was always about security, because I thought security was part of operations. But then I realized, we do want to call it out, because security is an equal partner,” Ashley Ward, senior product marketing manager for Prisma Cloud at Palo Alto Networks’ enterprise cybersecurity platform, told InApps.
Security has always been an operations consideration, Ward noted — but only when code heads to production. A report by Palo Alto Networks’ Unit 42 threat researchers found a surge in cloud adoption from 2019 to 2021, all while security was being left behind. In addition, a 2020 survey from the Linux Foundation found that only 3% of developers were interested in being responsible for security.
It adds up to not a lot of optimism for DevSecOps adoption. But it’s still desperately needed, according to experts like Ward.
There’s already so much developers need to know about their technical stacks and the cloud even before writing a line of code, Ward told us. DevOps teams are overwhelmed with faster delivery. Having to then learn the intricacies of vulnerability and compliance management would just be adding to their perpetual burnout.
“If we focus all our time on only the production environment, if security has blocked that, then that team is already onto another thing,” Ward said. That’s why teams need to “shift left” and learn to develop and operationalize security. While they don’t often realize that it’s available, security teams need to embrace codification of security or policy as code to translate their documentation so it can be consumed by DevOps teams and pipelines.
It’s not just about technology. It’s about security understanding how the application is used and what DevOps teams are doing. If developers are using specific toolsets, security needs to operate within those toolsets.
“Nobody knows everything. It’s about being humble and communicating that so we can figure out how to operate within that organization,” Ward said.
For instance: Things like the European Union’s General Data Protection Regulation (GDPR), which dictates how data is moved and stored, affects the creation and deployment of code. It’s up to developers and sysadmins to ask about how GDPR works, and it’s up to security to learn DevOps pipeline automation.
“Security is about enabling the business to do exceptional things in safe ways.”
— Ashley Ward, senior product marketing manager for Prisma Cloud, Palo Alto Networks
The problem is that DevOps teams often experiment like innovation sandpits, where creativity often flows in isolation.
“A lot of the time in DevOps, we try things out to see if they work and then you get budget for it. And then people get down that path — we need to consume more cloud resources, but then security lags behind that,” Ward said. “Who is going to engage security with what we’re doing, when we don’t even know if we’re going to do it?”
It’s not just the DevOps teams that are getting creative. Threat actors are adjusting all the time. The number of cryptomining accounts has dropped, Ward notes, but the activity in each of these accounts has gone up, as they attack harder than ever, including making use of Kubernetes’ API to deploy attack containers into clusters.
Up against this level of sophistication, “The only way of doing it is to try and automate as much as possible,” he said. “With cloud native tooling, we can actually approach doing stuff in a different way.”
Until recently, Ward reflected, the security checks remained very manual, with people actually walking around data centers checking servers. Now cloud native tooling enables everything to be automated. Manual processes are just too slow, especially considering the current scale that has teams managing thousands of ephemeral containers and serverless, deploying to 5,000 virtual machines, several times a day. Instead, you can implement security within existing processes via APIs.
It’s also about increasing developer psychological safety, instead of encouraging an “If I don’t mention it, it’s someone else’s problem” mindset among team members. Security should be part of the whole team’s backlog.
Of course, as always, you have to measure the things that matter. For security, that means a risk reduction dashboard, showing the number of critical vulnerabilities dropping. For DevOps teams, it’s showing how security is increasing the pace of delivery, while decreasing the time they’re actually dedicating to security.
A Parallel Pipeline for DevOps Speed and Learning
Mohammed Imran, CEO of Practical DevSecOps certification program, says DevSecOps is about applying the CALMS DevOps Model to security: culture, automation, lean, management and sharing.
But security isn’t very good at the first two, he said. And if security doesn’t embrace communication and automation, they will just slow down the pipeline.
For the security trainer Janca, CEO and founder of We Hack Purple, DevSecOps is about bringing the information security department into the three axioms of DevOps, as discussed in both “The Phoenix Project” and “The DevOps Handbook”:
- Maximizing efficiency for speed
- Fast feedback
- Continuous learning
To achieve this, security team members have to automate quick scans into the pipeline, like scanning for secrets or running a continuous SCA to evaluate open source security and license compliance. Then they have to run necessarily tedious tests like static application security testing (SAST), in what Janca calls a parallel pipeline outside of production.
“I think the mission of DevSecOps is to say: I love the code you’re writing, and I think you’re rock stars, and I think we need to put security into this.”
— Amanda Nock, DevSecOps engineer, NU Borders
Security team members have to be choosy with what goes into the pipeline, so as not to overburden the systems. For example, they can run a limited-scope version of their dynamic application security testing tool (DAST) continuously for the most important vulnerabilities, which vary by team. They can also record a test in HTTP Archive format, which will then only test those things specified, like checking if an application contains XSS or injection vulnerabilities. This can cut testing time by 70%, Janca said, while dramatically improving accuracy.
“I can target things like no one is using security headers, or people have a problem of cross-site scripting — which, by the way, most teams do. You can have your scanners just scan for that in a release pipeline because you know that it’s a problem and you want to stamp it out,” she said. Then, run a full DAST without scope and fuzzing in that parallel pipeline.
“If you’re going to put something in the pipeline, I believe it needs to give you fast, accurate feedback,” Janca said, which includes getting feedback to the right people through a data-driven approach. All scanning tools should create reports that feed into the same folder, so that a vulnerability management tool — such as DefectDojo, ThreadFix or ZeroNorth — can ingest and create metrics and trends over time.
Then a security champion can review and validate the results to remove false positives before adding the issues to a bug tracker. This step is necessary because, according to Janca, some SAST tools garner up to 90% false positives — and yet, if you adjust to “report only if sure,” you miss 80% of true faults.
Make sure to include development teams in understanding security flaws, so they can help prevent them in the future. “It makes them feel engaged and involved and actually give a crap so they do go and fix those bugs,” Janca said. “It helps make them care and helps show them that we are having a problem.”
To get developers engaged in security, Janca prefers the carrot over the stick. Before the Covid-19 pandemic, that took cookies, pizza and donuts. Now it takes coveted stickers, security books, and even “security champion” virtual backgrounds. And, always, extra help and advice.
What Does a DevSecOps Engineer Do, Anyway?
At the last three startups Amanda Nock worked for, “somebody Zuckerberged it,” which she defines as a couple developers building an application and releasing it, without really considering the consequences to security or anything else. This includes her current role as senior DevSecOps engineer at NU Borders, a trade and borders data analytics company that grew from five to 50 to 500 users. (At which point, the company realized it needed to consider systems and security, so it hired her.)
For each role, she was hired to head DevOps and then adopted the Sec part because no one else was doing it. “I was elbows up in AWS, and I see all those EC2 instances, and I can run Amazon Inspector,” she said. “We host our applications in Amazon Cloud, so it kicks it off every week, scheduled.”
Nock looks at her role as a DevSecOps engineer as “seeing a need and adopting it,” pushing security culture change and going where needed. For NU Borders, she got her Certified Information Security Manager certification to be able to talk as the information security manager to governments and to “say our DevOps and our security is a holistic team. Nothing is built without bringing security to the forefront.”
She can easily run an automated scan to find vulnerabilities and make smaller updates, but when there are bigger security issues they need to rearchitect for, she needs to create an issue ticket — “I know it’s not a feature, but this is something we need to do and to prioritize.”
After a year as the team’s DevSecOps point of reference, she reflected that it “really has to be involved in a person-to-person level, especially at companies this small.” (NU Borders employs about 50 people.)
“You are almost doing a PR job for security. Instead of thinking there’s this big faceless department around security, it should be ‘I should run this by Amanda.’”
When embedded within dev teams and Scrum processes, security becomes a cultural force, Nock said. Most recently, she’s worked closely with developers in creating initial architectural diagrams. “I was doing infrastructure in the AWS cloud, and they were doing diagrams for how data will flow.”
Cybersecurity specialists are hard to find, and the field is evolving so rapidly that a lot of learning happens on the job. Many people doing this work don’t hold computer science degrees.
DevSecOps doesn’t come down to formal titles or departments, Nock argued. It’s reminding people about something they might not think about much, and getting developers into hacking, including with the HackTheBox playground.
“Especially at these smaller startup companies, the technical stuff is hard work, of course, but the real challenge is making those culture changes to have a culture of DevOps and a culture of security,” she said. “We need to make this all automated, repeatable, secure.”
DevSecOps: Learning on the Job
Cybersecurity specialists are hard to find, and the field is evolving so rapidly that a lot of learning happens on the job. Many people doing this work — including Ward, Nock and Taurean McDade — don’t hold computer science degrees.
When McDade joined IHS Markit’s cloud security team a year ago, right when the information provider was merging with S&P Global, he was among five junior entry-level engineers working alongside three with much more experience.
“My boss wanted to create a team with individuals wanting to do great in the cloud but, unlike a lot of people in the industry, he wanted to bet on people who didn’t have the experience,” including no degree requirement nor work experience at a unicorn, McDade said. (His degrees are in marketing.)
It was an exciting baptism by fire, moving sprint to sprint, automating pen tests, running cloud security audits, shoring up the ample data sets, authenticating, networking, red-teaming, implementing SOCKS protocols, and assisting the organization’s cloud migration and AWS permissions, while pair programming and documenting everything together.
“To be a security person, you have to know what you’re securing,” McDade said. He warned that onboarding is needed, especially when moving data science teams — and widespread customer data — to the cloud for the first time.
IHS Markit is the sort of company with ongoing acquisitions, which he said “comes with acquiring the fluff. My task was to remove the stale DNS inquiries,” which involved talking to teams, learning if they were still using websites and explaining the security reasons it should be kept or not.
In order for DevSecOps to be a success, there has to be a cross-organizational buy-in that security matters and it’s everyone’s responsibility. As McDade said, “No one can be an expert because security keeps changing.”
Want to learn more about DevSecOps? Download InApps’s free ebook:
InApps is a wholly owned subsidiary of Insight Partners, an investor in the following companies mentioned in this article: Unit.
List of Keywords users find our article on Google:
practical devsecops |
pipeline inspector jobs |
ihs markit jobs |
pizza delivery ec2 |
junior manual qa engineer |
prisma graphql |
amazon inspector |
aws inspector |
continuous automated red teaming |
devsecops jobs |
ux design course phoenix |
linkedin profile writers palo alto |
devsecops learning path |
aws diagrams |
defectdojo |
prisma aws |
rocky linux container scan |
devops entry level jobs |
faceless socks |
rugged computing design border surveillance |
devsecops engineer jobs |
threadfix |
prisma serverless |
do embedded computers automate security |
fire and security engineer jobs |
devsecops collaboration and messaging |
integrative nutrition services near palo alto |
palo alto dns security |
prisma on aws |
embedded computing design border surveillance |
ihs markit api |
prisma cloud compliance reports |
luos embedded |
prisma cloud |
prisma cloud release notes |
fire watch security palo alto |
amazon security stickers |
custom computer specialists jobs |
prisma cloud documentation |
lean management wikipedia |
pizza company vinh |
prisma cloud pricing |
prisma cloud compliance |
prisma cloud api |
threadfix documentation |
nock senior |
what does a devops engineer actually do |
data science stickers |
devops handbuch |
zeronorth |
prisma compliance |
create aws diagrams online |
secure devops pipeline |
devsecops |
dast wikipedia |
sast wikipedia |
ward security jobs |
data center security manager amazon |
humble computer security software |
devsecops messaging |
threatfix |
palo alto networks dns security |
prisma cloud aws |
qc stickers |
carrot recruitment |
fire security engineer jobs |
palo alto networks jobs |
deploy prisma to aws |
graphql phoenix |
aws cloud diagrams |
junior setting out engineer jobs |
entry level devops jobs |
prisma cloud palo alto networks |
ihs markit wikipedia |
create aws diagrams |
prisma palo alto |
devsecops framework |
devsecops encourages creativity and experimentation. true false |
hackthebox phoenix writeup |
phoenix hackthebox |
unicorn stickers amazon |
baptism of fire amazon |
linkedin profile writer palo alto |
psychological safety wikipedia |
hackthebox icon |
the great hack wikipedia |
stampit design |
“co:dify group” -“poker” -“fußball” |
muhammad imran linkedin |
hackthebox phoenix |
phoenix food service ux/ui |
speed stacks amazon |
unified hackthebox |
key requirements of gdpr from s&p organizations |
biggest change ever brings native fuzzing |
front end web development course phoenix |
palo alto networks earnings call |
app hackthebox |
baptism program template |
hackthebox unified |
github nock |
prisma scans |
pegas pizza |
amanda ward linkedin |
hacking definition wikipedia |
palo alto networks marketing |
nu data science |
hackthebox secret |
nock pen case |
palo alto networks release notes |
prisma cloud serverless |
saas pr recruitment |
nock jobs |
pragmatic marketing framework 2019 |
graphql inspector |
hire dns protocol developer |
integrative nutrition services near los altos |
qc inspector jobs near me |
palo alto firewall documentation |
prisma jobs |
biggest change ever go native fuzzing |
is mitchell pearce still engaged |
palo alto user activity report |
prisma saas |
graphql-inspector |
paloalto dns security |
product marketing manager amazon |
stacks palo alto |
nu creative talent |
palo alto networks prisma cloud |
qa qc inspector jobs |
team rockstars it |
which activity is a customer responsibility in the aws cloud according to the aws shared responsibility model? |
collaborative solutions culture |
prisma vulnerability management |
team building wikipedia |
wiki baptism |
do you go to the cloud district often |
an inspector calls ebook |
engineers without borders jobs |
phoenix graphql |
prisma covid testing |
it works wikipedia |
hired ops download |
purple secure systems |
aws diagrams online |
palo alto firewall engineer job description |
tanya bui |
devops and security teams culture |
humble donuts menu |
kubernetes up and running ebook |
palo alto networks courses |
50k entry level jobs |
palo alto networks certification |
nock graphql |
introspection graphql |
palo alto networks documentation |
security trainer jobs |
hire phoenix framework developer |
phoenix project amazon |
baptism template |
certified eu gdpr foundation |
prisma security |
unit 42 palo alto networks |
how much do junior developers make |
integrative physician assessments near palo alto |
investor carrot website templates |
prisma cloud certification |
security your rugged devops and |
open source devsecops tools |
outsourcing boss |
Source: InApps.net
Let’s create the next big thing together!
Coming together is a beginning. Keeping together is progress. Working together is success.