Manual DevSecOPS
Manual DevSecOPS
ut
ib
tr
is
D
or
ate
lic
up
DEVSECOPS FOUNDATION
D
SM
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
Tell Us a Little About Yourself
tr
is
D
• Please let us know who you
or
are:
• Name, organization and role
te
• Cybersecurity experience
a
• DevOps experience
• Why you are attending this
l ic
course
up
2
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Foundation Course Goals
ib
tr
is
D
• Learn about DevSecOps
or
• Understand its core
vocabulary, principles,
te
practices and automation Pass the DevSecOps Foundation Exam
a
• 40 multiple choice questions
• Hear and share real life ic • 60 minutes
scenarios
l
up
• 65% is passing
• Have fun! • Accredited by DevOps Institute
D
3
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
About Bloom’s Taxonomy
tr
is
Bloom’s Taxonomy is used to categorize6.learning objectives and, from
Evaluation
D
there, assess learning achievements.
5. Synthesis
or
4. Analysis
a te
3. Application
ic
2. Comprehension
l
DevSecOps
up
Foundation
1. Knowledge
D
ot
4
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
About DevOps Institute
tr
is
D
or
te
DevOps Institute is dedicated to advancing the human elements
of DevOps success. As a global member association, DevOps
a
Institute is the go-to hub connecting IT practitioners, industry
ic
thought leaders, talent acquisition, business executives and
l
education partners to help pave the way to support digital
up
transformation and the New IT.
DevOps Institute helps advance careers and professional
D
5
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
DevSecOps Foundation Course Content
tr
is
D
Day 1 Day 2
or
Hello! Course & Class Welcome Warming Up Game
te
Module 2 Defining the Cyberthreat Landscape Module 6 Best Practices to Get Started
a
Module 3 Building a Responsive DevSecOps
Model
l ic Module 7 DevOps Pipelines and Continuous
Compliance
up
Module 4 Integrating DevSecOps Stakeholders Module 8 Learning Using Outcomes
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 1 ic
REALIZING DEVSECOPS OUTCOMES
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 1: Realizing DevSecOps Outcomes
ib
tr
is
D
• Origins of DevOps Component Module 1 Content
or
• Evolution of DevSecOps Video DevSecOps: What is It? Why is It
Taking Over Security?
Other Frameworks
te
•
Case Story Aetna
CALMS
a
• Discussion Does security slow us down?
• The Three Ways
lic Exercise Understanding and influencing
an organization
up
D
ot
N
8
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
The Origins and Evolution of DevOps
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Dawn of DevOps
ib
tr
is
D
or
’10+ Deploys a Day at FlickR’
#devopsdays
te
“Agile system
Patrick infrastructure”
a
Debois John
l ic Allspaw
up
Paul
Hammond
D
Andrew
Clay Shafer
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Manifestos
ib
Goal: Safely distributed security
decisions at speed and scale
tr
“I believe the DevOps
is
movement is a new fertile soil
D
from which the build-security-
in concept can be reborn,
or
renamed, and remade.”
Larry Maccherone
te
VALUES
a
Build security in more than bolt it on “Through Security as Code, we have
Rely on empowered development teams more
than security specialists
l ic and will learn that there is simply a
better way for security practitioners, like
up
Implement features securely more than security us, to operate and contribute value with
features less friction. We know we must adapt our
ways quickly and foster innovation to
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Research
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps in the DevOps Handbook
ib
tr
Chapter 22: Information Security as Everyone’s Job, Every Day
is
Chapter 23: Protecting the Deployment Pipeline, and
D
Integrating into Change Management and Other Security and
Compliance Controls
or
• Integrate security into development iteration
te
demonstrations
• Integrate security into defect tracking and post-
a
mortems
l ic
• Integrate preventative security controls into shared
source code repositories and shared services
• Integrate security into the deployment pipeline
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
DISCUSSION
a te
Does security slow us down? l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: Aetna
ib
tr
”You can’t build a house without a solid foundation. If you look at
is
DevOps and your build and deployment pipelines, your toolsets, "DevOps is an
unprecedented
D
your automation and your culture, they are all part of you
building a foundation. Choosing and applying your security opportunity for
or
programme to any existing SDLC should just be like busting out a security. DevOps
few holes in your walls and your roof and installing some skylights breaks the chain
of waterfalls."
te
and windows."
a
l ic Benefits
up
DJ Schleen,
Security Architect
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
CALMS l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CALMS & DEVSECOPS
ib
tr
CULTURE All technology teams have accountability for security; security is
is
everybody’s job. All understand the end-to-end system and
collaborate regularly to create trust.
D
AUTOMATION Automation helps assure security by strategic use of codifying the
or
orchestration and automation of tasks and processes that have
security vulnerabilities when done manually and where automation
can enhance security practices.
te
LEAN Security are not a constraint in the value stream and teams aren’t
a
waiting for security activities to happen – flow is optimized. Work is
visible through shared backlogs.
ic
MEASUREMENT Cost of breach is understood, business and attack metrics are
l
up
shared and a value stream centric approach is followed to
optimize cycle time and ensure no delays caused by security.
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
Module 1: Exploring DevOps
ut
ib
tr
is
D
or
a te
l ic
up
https://youtu.be/o7-IuYS0iSE
over security?’ with Shannon Lietz (19:18)
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
THE THREE WAYS l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Three Ways
ib
tr
is
D
or
FLOW FEEDBACK CONTINUOUS
te
EXPERIMENTATION &
a
LEARNING
Ensure that security is not a
constraint in the flow of work –
ic
Ensure fast feedback by
automating security testing,
l Ensure the security people
and software engineers are
up
shift security testing as far left including security early in the cross-skilling. Allocate time for
as possible and automate. process including them in them to sit and work together
Use pre-blessed security product demos and creating to learn from each other.
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
Other Frameworks l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Scrum in a Nutshell
ib
tr
is
Scrum = 3 Roles + 3 Artifacts + 5 Events
D
Release Development Product Scrum
Team Owner Master
Planning
or
Meeting Sprint Daily Scrum
(Optional) Planning (15 minutes)
Meeting
te
(4-8 hours) 24
Sprint Review
a
hours
(2-4 hours)
ic Sprint
Scrum is based
2-4 Retrospective on timeboxed
Sprint
l
Product
weeks (1.5-3 hours) iterations.
up
Backlog Backlog
SPRINT Increment
D
No changes allowed!
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Agile at Scale
ib
tr
is
D
or
SAFe
a te
l ic
up
D
LeSS
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
IT Service Management
ib
tr
is
“Security Officer’s role
D
shifts from specifying
or
requirements and
monitoring performance,
te
to enabling practitioners
a
to address security
l ic concerns.”
up
AXELOS®, ITIL® High Velocity IT
Manual ®
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Lean and Value Stream Thinking
ib
tr
is
• Lean aims to remove waste and In DevSecOps we use lean and value
elevate the customer stream thinking to ensure that security is
D
not causing waste or delays in the cycle
• It makes work visible time – that it’s not a constraint and is not
or
• Value stream thinking starts with interrupting flow.
the idea and tracks it until its
te
value is realized
a
• The key metric is cycle time ic
• Value Stream Mapping is a lean
l
up
tool that helps identify constraints
• Value Stream Management tools
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
EXERCISE
te
Understanding and influencing an
a
organization l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Safety Culture
ib
tr
“A culture where employees can tell the
is
boss bad news.” Dr. Sidney Dekker
D
or
• The collection of beliefs, perceptions and values that
employees share in relation to risks within an
organization
te
• Part of organizational culture
• The premise that incidents are a result of a
a
breakdown in an organization’s policies and
l ic
procedures that were established to deal with safety,
and that the breakdown flows from inadequate
up
attention being paid to safety issues
• Safety culture can be promoted by leadership
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
SRE and Resilience Engineering
ib
Site Reliability Engineering Resilience Engineering
tr
is
• “What happens when a software • The intrinsic ability of a system to
engineer is tasked with what used to adjust its functioning prior to, during,
D
be called operations.” Ben Treynor, or following changes and
Google disturbances, so that it can sustain
or
• Goals are to create ultra-scalable required operations under both
and highly reliable software systems expected and unexpected conditions
te
• 50% of their time doing "ops" related • Resilience engineering looks at how
a
work such as issues, on-call, and the organization functions as a whole
manual intervention
• 50% of their time on development
l ic • The best defense is a good offense
• Take an aggressive, blameless and
up
tasks such as new features, scaling or systemic view post incident
automation • Consider both human and technical
• SRE and DevOps share the same elements
D
learning fast
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Outcomes
ib
tr
• Better value sooner faster safer happier
is
• Build security in
D
• The Three Ways: Flow, Feedback,
Continuous Experimentation and
or
Learning
• Agile: Transparency, inspection,
te
adaptation
a
• Lean: waste removal, flow optimization,
customer focus
l ic
• ITSM: Operations are predictable
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module One Quiz
ib
tr
is
1 When did the State of Agile Report start collecting data a) 2001
on agile at scale framework adoption? b) 2005
D
c) 2010
d) 2015
or
2 Which ITIL4 ® manual is concerned with DevOps? a) ITIL 4 Specialist Create, Deliver and Support
b) ITIL 4 Specialist Drive Stakeholder Value
c) ITIL 4 Specialist High-velocity IT
d) ITIL 4 Strategist Direct, Plan and Improve
te
3 What level of productivity gain did Aetna make through a) 1-5%
a
the adoption of DevSecOps practices? b) 5-10%
c) 20-50%
4
ic
How many times less are grumpy developers informed of
l d)
a)
80-90%
1.3x
up
application security issues by rumor? b) 1.8x
c) 3.3x
d) 3.8x
D
d) John Allspaw
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module One Quiz
ib
tr
is
1 When did the State of Agile Report start collecting data a) 2001
on agile at scale framework adoption? b) 2005
D
c) 2010
d) 2015
or
2 Which ITIL4 ® manual is concerned with DevOps? a) ITIL 4 Specialist Create, Deliver and Support
b) ITIL 4 Specialist Drive Stakeholder Value
c) ITIL 4 Specialist High-velocity IT
d) ITIL 4 Strategist Direct, Plan and Improve
te
3 What level of productivity gain did Aetna make through a) 1-5%
a
the adoption of DevSecOps practices? b) 5-10%
c) 20-50%
4
ic
How many times less are grumpy developers informed of
l d)
a)
80-90%
1.3x
up
application security issues by rumor? b) 1.8x
c) 3.3x
d) 3.8x
D
d) John Allspaw
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 2 ic
DEFINING THE CYBERTHREAT LANDSCAPE
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 2: Defining the Cyberthreat
ib
Landscape (CTL)
tr
is
D
• Storytime and Outcomes Component Module 2 Content
or
• What is the Cyber Threat Video The Industrial Cyberthreat
Landscape? Landscape
te
• What is the threat? Case Story Maersk
a
• What do we protect from? Discussion What does Secure mean?
• What do we protect, and why?
lic Exercise EoP Card Game
up
33
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
l ic
up
https://youtu.be/uTEL8Ff1Zvk
in Review’ with Robert M Lee (09:16)
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Outcomes
ib
tr
“If you know the enemy and know yourself, you need not
is
fear the result of a hundred battles. If you know yourself but
D
not the enemy, for every victory gained you will also suffer
a defeat. If you know neither the enemy nor yourself, you
or
will succumb in every battle.”
te
• Goal: Understand threat to evaluate risk
a
• Goal: Support DevSecOps risk/threat conversations
aspects
l ic
• Goal: Understand human, process and technical security
up
TTPs
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Blanc Brothers
ib
tr
• First telegraph was optical
is
• Semaphore
D
• Based on flag signaling
• First reported hack
or
• 1834 – Francois and Joseph Blanc,
• Injected symbol to reflect whether stock was up or down
te
• Copied via binoculars, human messenger ahead of post
a
schedule
ic
• Similar to SQL Injection
l
• Goal: Support DevSecOps risk/threat conversations
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
WannaCry and Marcus Hutchins
ib
tr
is
• A ransomware attack in May 2017
D
• A cryptoworm demanded Bitcoin payments
• Worldwide propagated by EternalBlue
or
• Exploited older Microsoft Windows OS
• 200,000 computers impacted across 150 countries
te
• Unpatched computers affected
a
• Hacker turned White Hat, Marcus Hutchins
ic
discovered ‘kill-switch’
l
up
• Goal: Support DevSecOps updates
• Ensuring patches are maintained
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
DISCUSSION
a
What do you mean when you say "secure"?
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Cybersecurity Forecasts
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What is the CTL ? 56%
ib
45% of breaches compromised
use hacking personal data
tr
is
70% caused by 22% used
• Threat – Any person or thing external actors social attacks
judged likely to cause
D
72% were large
damage/danger to your DevOps businesses
or
practices 43%
feature 28% small
• Cyber (NDAA- FY2015), web apps businesses
te
“Independent network of 59% from
Organized
information technology criminal groups
a
infrastructure and includes the 30% from
internet, telecommunications ic internal actors
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Risks and Vulnerabilities
ib
• Threat = Risk * Vulnerability
tr
is
• What is your Risk?
D
• What are your Vulnerabilities?
or
• How do you consider potential threat
impacts?
te
• Probability
a
• Intent
• Capability
l ic
up
• Can't I just buy insurance?
• Mondelez vs. Zurich American for $100M
D
NotPetya Damages
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Threat Models
ib
tr
Optimize network security by identifying objectives and
is
vulnerabilities, before defining countermeasures
STRIDE DREAD OCTAVE
D
• Spoofing • Damage • Operationally Critical
or
• Tampering • Reproductability Threat
• Repudiation • Exploitability • Asset
Information Disclosure
te
• • Affected Users • Vulnerability Evaluation
• ––(
• Denial of Service • Discoverability
a
• Elevation of Privilege l ic
Built by Microsoft, no longer Built by Microsoft Assesses organizational risk.
up
strategy
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
STRIDE Threat Model
ib
tr
Threat Property Threat Definition
is
Violated
D
S Spoofing identity Authentication Pretending to be something or someone other than
or
yourself
T Tampering with Integrity Modifying something on disk, network, memory or
te
data elsewhere
a
R Repudiation Non-
repudiation
Claiming that you didn’t do something or were not
ic
responsible; can be honest or false
I Information Confidentiality Providing information to someone not authorized to
l
up
disclosure access it
D Denial of service Availability Exhausting resources needed to provide service
D
privilege authorized to do
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
MITRE ATT&CK®
ib
tr
• Tactical Threat Models
is
• Attack Tree
D
• ATT&CK – Adversarial Tactics,
or
Techniques, and Common
Knowledge
Initial access
te
•
• Execution
Persistence
a
•
• Privilege
•
•
Escalation
Defense evasion
l ic
up
• Credential Access
• Discovery
• Lateral Movement
D
• Collection
• Command and Control
ot
• Ex-filtration
• Impact
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
EXERCISE
a
Elevation of Privilege Threat Modeling Game
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Who Do We Protect From?
ib
tr
EU Agency for Cybersecurity
is
Rank Threat
OWASP Top Ten 1 Malware
D
• What could happen? 2 Web Based Attacks
or
4 Phishing
• Corporate threat reports (DBIR)
5 Denial of Service
• Localized intelligence
te
6 Spam
7 Botnets
a
• What are the biggest holes? 8 Data Breaches
•
l ic
Published common flaws (OWASP)
9
10
Insider Threat
Physical
• Vulnerability studies (CVE) Manipulation/Damage/Loss/Theft
up
11 Information Leakage
• Bug Bounty 12 Identity Theft
• Scans
D
13 Cryptojacking
• Cyber Threat Intelligence Providers 14 Ransomware
ot
15 Cyber Espionage
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Threat Actors
ib
tr
is
D
or
a te
Intruders/Attackers ic Defenders Actions
•State (China, Russia, USA) •State (China, Russia, USA) • Espionage (Steal it)
l
up
•Non-state (Syrian •Corporate (Managed • Sabotage (Break it)
Electronic Army Security Provider (MSSP) • Subversion (Change it)
•Criminal (Mafia, •Non-state (Citizen)
D
Sandworm)
•Hacktivist (Anonymous)
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Threat Agents
ib
tr
is
D
or
te
Bronze Soldier (2007) Stuxnet (2010) Qassam Cyber Fighters
a
(2012)
l ic
Russian Patriots attack First Cyber Warfare Operation Ababil
up
development
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: Maersk
ib
” Maersk has always been a forward-looking business, but we have a heightened
tr
focus today in part because of a global cyberattack in 2017 that infected our
is
network across ports and offices in dozens of countries. As part of the recovery, "Given the ever-
we rebuilt our core IT capability, including reconstructing server and network evolving cyber
D
infrastructure, moving more than 60,000 devices to a new common standard, landscape, we’re
deploying a new standardized global operating system, restoring our entire building an even more
or
application stack, and restarting the world’s most automated terminal, all in a secure and reliable
matter of weeks. We now have one of the most standardized environments of any infrastructure that can
company in the industry - a foundation that’s letting us deliver change at the support Maersk’s
te
pace of digital business." future growth."
a
l ic Benefits
up
Adam Banks
CIO/CTO
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Supply Chain Hygiene
ib
tr
is
D
or
te
Attacks Supply Chain Managing Supply Risk
a
•Avast - Oct 2019 • System of organizations, • Organization
•CC- Cleaner May 2018
ic
people, activities, information, and
l • Mission/Business Process
• Information Systems
•Telecom Counterfeit resources involved in supplying a
up
•Industrial Espionage product or service to a consumer
•Malicious Code • Supply Chain Vulnerabilities
D
Compromise
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What Do We Protect?
ib
tr
• Measuring items for D I E
is
protection?
D
Distributed Immutable Ephemeral
• Do you have metrics? DDOS resistant Changes easier to Drives value of assets
or
• Selecting for security detect and reverse closer to zero
• Risks to CIA The best solution Unauthorized changes Makes attacker
te
• Confidentiality against a distributed stand out and can be persistence hard and
attack is a distributed reverted to known reduces concern for
• Integrity
a
service good assets at risk
• Availability ic
• Systems as DIE
l
up
• Distributed
• Immutable Availability Integrity Confidentiality
D
• Ephemeral
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Protection Metrics
ib
tr
1. Where are my ‘crown jewels’?
is
• What creates business value?
• Proprietary technical code
D
• Secure practices
• Elite employees?
or
2. How do I identify exposure?
3. Understand/Assign core metrics
te
• Deployment frequency
a
• Failed deployments
Code committed
•
• Lead time
l ic
• Mean Time to Change (MTTC)
up
• Error Rate
• Mean Time to Detect (MTTD)
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Good Questions for Security
ib
tr
• What are my vulnerabilities? Common Vulnerability and Exposure (CVE)
is
• What are the risks of these?
D
• How do I fix it?
• How long will that take?
or
• How can you help me fix it?
How do we make sure the same
te
•
problem isn’t anywhere else?
a
• Why should I care?
• Why should we tell?
l ic
up
• Where can we record this?
• Can we automate this?
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Continuous Compliance
ib
tr
• Governance, Risk, and Compliance “I believe that Continuous
• Class of tools
is
Delivery is an essential
• Practice Area component of ANY regulated
D
• Legal approach. That is, I believe that it
• Global Data Protection Regulation is not possible to implement a
or
(GDPR) genuinely compliant, regulated
• SOX – Sarbanes Oxley system in the absence of
te
• PCI-DSS – Card certifications Continuous Delivery!”
• HIPAA – Medical privacy Dave Farley
a
• Regulatory
• National Institute of Standards and
Technology – Government
l ic
up
• Risk Management Framework (NIST)
• ISO 27001
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Two Quiz
ib
tr
1 Which one of these is not a Threat Model? a) DREAD
b) STRIDE
is
c) LEAP
d) ATT&CK
D
2 Which attack involves a group of Russian hackers trying a) Bronze Soldier
to stop the removal of WWII statue in Estonia? b) Stuxnet
or
c) CCleaner
d) Fancy Bear
3 Which of these is not a standard cyberattack action? a) Subversion
te
b) Subtraction
c) Espionage
d) Sabotage
a
4 Which of these is #1 on the OWASP top ten vulnerability a) Cross-Site Scripting
list?
l ic b) Injection
c) Sensitive Data Exposure
up
d) Broken Access Control
5 Which of these is not part of the CIA triad for information a) Confidentiality
security? b) Integrity
D
c) Authenticity
d) Availability
ot
N
55
©DevOps Institute unless otherwise stated Module 2: Defining the Cyberthreat Landscape
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Two Quiz
ib
tr
1 Which one of these is not a Threat Model? a) DREAD
b) STRIDE
is
c) LEAP
d) ATT&CK
D
2 Which attack involves a group of Russian hackers trying a) Bronze Soldier
to stop the removal of WWII statue in Estonia? b) Stuxnet
or
c) CCleaner
d) Fancy Bear
3 Which of these is not a standard cyberattack action? a) Subversion
te
b) Subtraction
c) Espionage
d) Sabotage
a
4 Which of these is #1 on the OWASP top ten vulnerability a) Cross-Site Scripting
list?
l ic b) Injection
c) Sensitive Data Exposure
up
d) Broken Access Control
5 Which of these is not part of the CIA triad for information a) Confidentiality
security? b) Integrity
D
c) Authenticity
d) Availability
ot
N
56
©DevOps Institute unless otherwise stated Module 2: Defining the Cyberthreat Landscape
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 3 ic
BUILDING A RESPONSIVE DEVSECOPS
l
up
MODEL
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 3: Building a Responsive DevSecOps
ib
Model
tr
is
D
• Model with components Component Module 3 Content
or
• Technical, business and human Video What is DevSecOps
toll outcomes Explained by Dave Farley
te
• What’s being measured? Case Story NCR
a
Integration, current state and Discussion What do you want from
delta
lic security?
• Gating and thresholding
up
Exercise Validate a responsive
• Incremental improvements DevSecOps model
D
ot
N
58
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Responsive How?
ib
• Your model for working needs to:
tr
• Be adaptable when things change:
is
regulations, threats, finances
D
• Be the basic for continuous
conversation between security and
or
engineering teams
• Be easy and quick to change
te
• Have its own change processes
documented
a
l ic "DevSecOps essentially breaks down the
enterprise security silo by cultivating a
up
symbiotic relationship between security
and other business units and increases
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Responsive to What?
ib
tr
• Every service or application will have The model will need to measure the
is
multiple standards applied and fitness of these components:
D
measured
or
• Risk management must be done with LAYERS OF PIPELINE GOVERNANCE STANDARDS
continuous verification which is not Regulatory (i.e. PCI)
te
driven by meetings
Criticality or Service Tier (i.e. Platinum)
a
• To achieve this, measure individual tasks Quality (i.e. Code)
in the CI/CD pipelines
l ic Stage (i.e. Development)
• Follow DevSecOps practices:
up
Target / Environment / Platform
• Implement security as code
D
• Leverage automation
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
DISCUSSION
a te
What Do You Want from Security? l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What Should the Output Look Like?
ib
tr
• The fitness measure needs to OUTPUT
is
provide a KPI per standard per KPIs – Compliance % per service
D
value stream
Auditability
• The output and values need to be
or
directly linked to the ability to audit
the process i.e. ITSM and Change
te
Key Performance Indicator (KPI) Definition
Management integration (design
a
data flows) ic A Key Performance Indicator is a measurable
• Map technology and processes to value that demonstrates how effectively a
l
company is achieving key business objectives.
up
core security operations Organizations use KPIs at multiple levels to
• Automatically log findings to issue evaluate their success at reaching targets.
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Example KPIs
ib
tr
Value Stream Standard KPI
is
Standardization – Pipeline Creating an exemplar per Conformance % of
D
Archetype standard adopted (I.e pipeline to an exemplar
code quality) standard
or
Risk Management Measure and Quantify % High
each risk per standard % Medium
te
adopted per pipeline % Low
a
Auditability Tasks and evidence PCI compliance %
ic
collection per regulatory
standard in a pipeline
l
up
security standard
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: NCR
ib
”NCR’s software development teams have started using cloud native
tr
technologies such as microservices and containers to build and ship applications
faster than ever, while migrating to public cloud services to reduce infrastructure
is
costs. These changes created security and compliance challenges that could not "App sec has to be
be addressed with yesterday’s security tools. Customers trust NCR to secure their integrated into the
D
highly sensitive financial data, so it was cardinal for the company to implement a right place, and you
solution that both ensures the security of applications and data, as well as satisfies need to get support
or
strict compliance requirements. Achieving both goals required that NCR’s from both directions
Application Security and Site Reliability Engineering practices to gain greater - from the bottom
visibility and control over their security posture, without compromising on the
te
and the top."
velocity and scale of this new approach.”
a
l ic Benefits
up
• Scan container images in the CI/CD pipeline and in registries for known
vulnerabilities, embedded secrets, and unsecured configurations
D
• Prevent images with high severity vulnerabilities, root user privileges. Or hard-coded
secrets from running anywhere in the environment
ot
Shlomo Bielak • Ensure that running containers don’t drift from their originating images
CISO – App Security
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Risk and Quality Are Measured
ib
tr
• Measure integration Fitness Components
is
and output as inputs Measure – Integration Measure - Output
D
to achieve continuous
Pipeline Standards – Identify Tech Debt Unique Per Stage
verification
or
Over time – Maturity & Standards
• Having the ability to Improve
Gate or Threshold or Track
te
manage the risk and
Continuous Improvement of Standards
the output of that
a
Evaluate - Release to Release Delta Values – Not starting value
measure are two
l ic
separate KPIs Better Worse
up
create a backlog
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Old and New Operating Models
ib
tr
• Adopting engineering
is
principles helps move from a
D
traditional security model
dictating standards to aligning
or
with value streams and
integrating with CI/CD
te
pipelines
• The effect will be to reverse the
a
truth that security slows
development down
l ic
Method Auditability Adaptability Engagement
up
• The outcome will be a model Traditional Operate Iterative Dictate
to continuously measure/set Governance Integrated Dynamic Collaborate
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Business Continuity Plan (BCP) Example
ib
tr
is
What does an example model measure and track
D
and how does it operate?
or
Criticality or Service Tier (i.e. Platinum) – SLA – SLO - SLI
Automation Pipeline
te
Integrated
Workflow Workflow Production
a
Create Attach
Task Task Task Task
Policy ic
Policy
Test
Policy
Check
Policy CI/CD
Tag/ Tag/ Tag/ Tag/ Tag/ Tag/ Tag/ Tag/
l
Value Value Value Value Value Value Value Value
up
Driven
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
l ic
up
D
‘Whathttps://youtu.be/uTEL8Ff1Zvk
is DevSecOps?’ with Dave Farley (19:11)
ot
N
©DevOpsInstitute
Instituteunless
unlessotherwise
otherwisestated
stated Module 3: Building a Responsive DevSecOps Model 68
©DevOps
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Change Management Redesigned
ib
tr
• New operating models require integrated change management and ticket
is
tracking
• Constantly check security states
D
• SAST can verify continuous integration practices
or
• Updating ticket with outputs
• Pipeline approval stages track promoted code status and changes
te
• Remove physical approval stages when conformance is at 100%
a
• Change management adapts based on Key Performance Indicators (KPIs)
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
KPIs Defined and Visualized
ib
tr
• The KPIs are driven per
is
value stream or pipeline
or application
D
• The values represent the
or
adoption of the
standards
te
• The ability to threshold
a
and gate per SDLC
stage
l ic
• Keep in mind that the
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
GSA’s DevSecOps Maturity Model
ib
GOAL: Safer Software Sooner
tr
DevSecOps: A cultural
is
and engineering
practice that breaks
D
down barriers and
opens collaboration
or
between development,
security, and operations
organizations using
te
automation to focus on
rapid, frequent delivery
a
of secure infrastructure
and software to
l ic production. It
encompasses intake to
up
release of software and
manages those flows
predictably,
D
intervention/effort.
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
eDiscovery and Digital Forensics
ib
tr
is
How would your organization perform these tasks if need be?
D
Electronic discovery (sometimes
or
Digital forensics, sometimes
known as e-discovery, ediscovery, called computer forensics, is the
eDiscovery, or e-Discovery) is application of scientific investigatory
te
the electronic aspect of identifying, techniques to digital crimes and
collecting and producing attacks. It is a crucial aspect of law and
a
electronically stored business in the internet age. It’s he
information (ESI) in response to a
request for production in a lawsuit or
l ic identification, preservation, examination,
and analysis of digital evidence, using
up
investigation. ESI includes, but is not scientifically accepted and validated
limited to, emails, documents, process, and the ultimate presentation of
presentations, databases, voicemail, that evidence in a court of law to answer
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Resilience Through Responsiveness
ib
tr
• This is not a perfect world and the ability
is
to build resilience through exception
D
handling is key
• The ability to whitelist for a time period
or
• If a whitelisting was applied, an ITSM
te
ticket should be auto generated to
track the risk and exception
a
• Automation pipelines with integrated ic
securities need to allow for unexpected
l
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Incremental Improvements
ib
tr
• Visualizing each Business Unit (BU)
is
or departments progress of Security Progress Per BU
D
adopting and measuring risk
helps drive cultural change and
or
support
• This example is using Tableau and
te
BigQuery to ingest and parse API
a
calls to all the security tooling to
show adherences to the
l ic
governance standards overtime
up
change management
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Outcomes
ib
tr
is
D
or
Technical Business Human
a te
• Faster • Faster audit • Improvement
deployments
l ic
preparation and/or self-
• More code • Company-wide development
up
value
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Steps to Take to Build a Model
ib
tr
1 Move away from meetings: Require measurements of standards and values to be
defined and documented. This can also be in the form of a pipeline-as-code
is
example.
D
2 Alert in Dev, protect in Prod. Every stage of the SDLC has different tolerances defined
to support shift-left. Development and production are not the same.
or
3 Provide artifacts for integration and adoption of measurement technologies
4 Do not gate: Data always starts poorly once measurements begin. Target deltas to
te
track required improvement increments per time period
a
5 Define and create exception handling processes that are tracked. Conformance of
are forced.
l ic
the majority. Responsiveness to the minority. This prevents untracked exceptions that
up
6 Tag and map values per application to visualize KPIs per governance engineering
standard. Aggregate per BU as well for higher level visualizations. The KPI that
matters is the conformance delta. Not the starting value.
D
7 Keep updating your standards and expected values. Update the pipeline-as-code to
ot
support the advancement of an exemplar. No one should hit 100%. Advance the
standard, shift all down to advance again.
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Gartner’s View on DevSecOps
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps According to OWASP
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
EXERCISE
a
Validate a Responsive DevSecOps Model l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Three Quiz
ib
tr
is
1 Which is a characteristic of a traditional operating a) Integrated
model? b) Dictate
D
c) Dynamic
d) Collaborate
or
2 What is GSA’s DevSecOps goal? a) Safer Software Sooner
b) Better Value Sooner Safer Happier
c) CALMS
d) Rugged DevOps
te
3 According to NCR, from what direction does DevSecOps a) The top
a
adoption need support? b) The bottom
c) The left
4 What is a KPI?
l ic d) Both top and bottom
a) Key Practice Indicator
up
b) King Principle Interaction
c) Key Performance Indicator
d) King Principle Indicator
D
d) CSI
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Three Quiz
ib
tr
is
1 Which is a characteristic of a traditional operating a) Integrated
model? b) Dictate
D
c) Dynamic
d) Collaborate
or
2 What is GSA’s DevSecOps goal? a) Safer Software Sooner
b) Better Value Sooner Safer Happier
c) CALMS
d) Rugged DevOps
te
3 According to NCR, from what direction does DevSecOps a) The top
a
adoption need support? b) The bottom
c) The left
4 What is a KPI?
l ic d) Both top and bottom
a) Key Practice Indicator
up
b) King Principle Interaction
c) Key Performance Indicator
d) King Principle Indicator
D
d) CSI
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 4 ic
INTEGRATING DEVSECOPS STAKEHOLDERS
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 4: Integrating DevSecOps Stakeholders
ib
tr
is
D
• The DevSecOps State of Mind Component Module 4 Content
or
• What “good” culture looks like Video Lean and Agile Adoption
with Laloux’s Culture Model
The DevSecOps Stakeholders
te
•
Case Story US Department of Defense
What’s at stake for who?
a
•
Discussion How can you influence your
• People, process, technology and
governance
lic organization?
Exercise Modeling stakeholder
up
conversations - 'difficult
questions'
D
ot
N
83
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The DevSecOps State of Mind
ib
tr
is
“I worked for Intuit for 18 months DevSecOps' main objective is to "ensure data security"
doing DevSecOps, and I’ve
D
versus Krav Maga's objective to "go home safe”. Both
drawn many parallels between it approaches are adapted defense systems and have
and Krav Maga. This post
or
several principles in common:
provides a comparative view of
DevSecOps vs. Krav Maga. “
te
Fabian Lim
a
LEGAL - BONUS!
SITUATION
l ic CHAOS
AWARENESS
up
DRILLS
RUGGEDNESS
POSITIONING
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What “Good Culture” Looks Like
ib
tr
Good DevSecOps practice:
is
D
• Starts with buy-in of the DevSecOps philosophy by
senior leaders within the organization
or
• This leads to:
• Change in the organizational culture
• New collaborative processes
te
• Tools to automate the process
a
• And to apply consistent governance
• A project must advance in all four areas to be
successful
l ic
up
• Safety culture and resilience engineering are key
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Trust Algorithm
ib
“About three weeks after I started at
Comcast, I realized that any behavior
tr
transformation that we wanted to
is
achieve within the development
organization would be impossible with
D
the current lack of trust between devs
and security. I mentioned this to one of
or
my bosses and he responded, “I
understand that’s a problem but it’s
te
not as if trust is a formula.” My response
was, “Well… maybe it is…” I then got
a
up from my chair and wrote the trust
l ic formula from Charlie Green at
TrustedAdvisor on the wall. We then
up
had a great conversation about how
to optimize the terms in that formula for
our context.” Larry Maccherone
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What “Good” Culture Looks Like
ib
tr
Erikson’s Stages of Psychosocial
is
Development
Westrum’s Organizational Typology
D
or
This is where
we want to be…
a te
l ic
up
D
Org culture is often “A generative culture will make the best use of its
still just here… assets, a pathological one will not.”
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Laloux’s Advice Process
ib
tr
Be Lean:
is
• Minimize overhead and waste
• Automate as much as possible
D
Freedom & Self-Managed
Responsibility • Emphasize measurable results and
effectiveness
or
• No more “rules for the sake of rules”
• Focus on the customer
te
• Leverage Laloux’s ‘Advice Process’
a
LALOUX’S ADVICE PROCESS
l ic “Any person making a decision must seek
up
advice from everyone meaningfully
affected by the decision and people with
expertise in the matter. The objective of the
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
Module 1: Exploring DevOps
ut
ib
tr
is
D
or
a te
l ic
up
‘Leanhttps://youtu.be/o7-IuYS0iSE
and Agile Adoption with the Laloux
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Understanding Cultural Differences
ib
tr
is
Culturally and behaviorally, Security and DevOps are worlds apart; in terms of subject matter
expertise, security architects and software engineers don’t speak the same language.
D
or
DevOps Security
Agile Waterfall
te
Horizontal Vertical
a
• •
Fast-paced Rigid
•
• Operates in quick sprint cycle
l ic •
• Step by step approach
• Team-based culture • Requires multiple lines of approval
up
• Trust and support others • Priority: safety and security
• Priority: react as quickly as possible to • Delayed verification
D
business needs
Effective DevSecOps practices can help change how businesses function.
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Three Ways to Close the Culture Gap
ib
tr
1 2 3
is
Code in and reward the right Develop soft skills Value security as highly as
D
behaviours speed for digital
transformation
or
• To change behaviour, change • To develop softer skills will be • DevSecOps repositions security
habits essential higher up in the value chain
Introduce patterns accross the • Organizations could also • Reinforce this across the
te
•
environment so over time, consider looking for specific organization
people become used to personality types who may not • Ensure DevSecOps is included in
a
working in a certain way have the perfect technical skills investment cases for
• Over time, their mindset also
adapts and culture begins to
ic
for DevSecOps, but could be
upskilled
l transformation
up
shift • Not everyone currently Working
in DevOps and security teams
will be suited to a DevSecOps
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Cooperation > Internal Competition
ib
tr
Problems with turf wars:
is
• Inefficiency and waste
D
• People lose sight of business
or
objectives
• Decreased collaboration and
te
cooperation
a
“…arguments over turf are good
l ic
indicators that the facility has too many
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Types of Stakeholders
ib
tr
is
Type of Stakeholders Categorize Stakeholders
D
RACI Method
or
R Responsible Works on and delivers the
initiative
Internal External
A Accountable Has authority over the initiative
te
and approves results
C Consulted Has insight and suggestions
a
Teams Functions Groups Customers Users Suppliers about the initiative
l ic Third parties.
! Informed Needs to know about the
outcomes of the initiative
up
Use the
Supply goods
Buy the services
and services
goods or on a daily
services basis
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CISOs and CIOs
ib
tr
is
CEO
D
or
CIO
te
Head of Head of
a
CISO
Dev Ops
l ic
In the 2014 PwC Global State of Information
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The DevSecOps Stakeholders
ib
tr
Dev Ops Leadership
is
All people involved in All people involved in All executives, directors and C-Suite. All
developing software delivering and directors need to have a basic
D
products and services managing software understanding and awareness of cyber
including but not products and services security based on jargon-free principles. To
or
exclusive to: including but not help with this, we could express governance
exclusive to: as a user story from the director’s perspective
te
Architects, Information security Directors want assurance, in concise, understandable
Business representatives, professionals language, that they:
a
Customers, Systems engineers
Product owners, System administrators Have adequate management of cyber risks and
Project managers,
Quality assurance (QA)
ic
IT operations engineer,
Release engineers
l •
•
threats
Have been made aware of significant attacks and
Testers, Database administrators near misses, and advised of actions to prevent re-
up
Analysts (DBAs) occurrence
Suppliers Network engineers • Have been made aware of security arrangements for
Support professionals our significant third parties including any significant
D
SREs attacks
Security professionals • Have used the investment in cyber security effectively
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Collaboration Between Stakeholders
ib
Compliance & Team
tr
Dear Auditor
Audit Overlap Communication
is
D
or
a te
l ic
Working with Audit, Easier:
up
• Map changes to approved users and • Integrate auditors into the advice
change record process
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What’s at Stake for Who?
ib
tr
is
D
Shared Metrics for Multiple Stakeholders Shared Metrics for Each Stakeholder
or
a te
l ic
up
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Governance: DevSecOps Pillars
ib
tr
is
ORGANIZATION PROCESS TECHNOLOGY GOVERNANCE
D
or
• Culture shift & Buy-in • Collaborative design • Tool adoption • Built-in governance
• Communication & • Test – driven • Automation and control
Collaboration development orchestration • Uniform policy
te
• Security/QA Throughout • Common and • Cloud and enforcement
• Learn from automatable tasks containerization • Data-driven validation
a
success/failure • Continuous adaptation • Infraestructure as code • Enhanced visibility
• Feedback and user
driven change •
ic
and improvement
Continuous ATO
l • Security as code • Inherited certifications
and authorization
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Next Generation Governance
ib
tr
Strategic
Management
is
1. Run IT with Mission Discipline
D
2. Invest in Automation
5 FUNDAMENTAL
Tactical 3. Embrace Adaptability
or
PRINCIPLES
Management OF NGG
4. Promote Transparency
te
5. Inherent Accountability
a
Operational
Management
l ic
up
ENABLING ELEMENTS
Equality and Indusiveness
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: US Department of Defense
ib
“People have different priorities, but when you don't bake security in,
tr
the number one issue is that it's very difficult to keep up with the pace of
is
the changing requirements. If you have security as an afterthought, it
just becomes this massive bottleneck. Being able to have it baked in “DevSecOps is the
D
from the start is critical as otherwise it's tough to catch up. If you scan industry best
your code multiple times a day and you're looking at the quality of the practice for rapid,
or
code continuously you can fix small changes slowly but surely every day. secure software
Incremental change is the critical piece. If you do it multiple times a development.”
te
day, it's much easier to fix than waiting a year and trying to tackle a
huge mound of what is effectively technical debt."
a
l ic Benefits
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Governance Flow and Control
ib
tr
is
• Good control requires good corporate governance from the top
(directors and executive management)
D
• Top management should ensure that the organization is well structured
or
and managed with strong policies and a strong ethos
• Governance forms the foundation on which other controls and risk
te
mitigations can be built
a
• Ultimately, those who hold governance accountability will be held
ic
responsible for all failures regardless of where they occur
• They set the culture and tone for the organization to operate
l
up
1. Set the 2. Tell them what is 3. Let them get on 4. Monitor and
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Governance Engineering Methodology
ib
tr
is
Convergence of Security Teams
D
or
TRI-CENTRIC APPROACH
te
SECURITY DEVELOPMENT OPERATIONS
a
lic
APPLICATION CYBER INFORMATION INTERNAL RELEASE APP
up
INFRAESTRUCTURE
SECURITY SECURITY SECURITY AUDIT ENGINEERING OPS
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
People, Process, Technology and Governance
ib
tr
is
D
MANAGE & OPERATE
or
TRADITIONAL IDENTITY TASK PER
SECURITY APPLY VERIFY MEASURE
te
SCOPE APPLICATION
a
GOVERNANCE IDENTITY
l ic
PIPELINE GOVERNANCE STANDARD (ALL)
up
ENGINEERING SCOPE CONTINUOUS IMPROVEMENT
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
EXERCISE
a te
Modeling stakeholder conversations – ic
difficult questions
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Four Quiz
ib
tr
1 Who wrote ‘Reinventing Organizations’? a) Frederic Laloux
is
b) Erik Erickson
c) Larry Maccherone
D
d) Ron Westrrum
2 Where did The Trust Algorithm originate? a) The Department of Defense
or
b) Charlie Green
c) The DevOps Handbook
d) Comcast
te
3 According to Laloux’s advice process, under Seek advice from an expert
what condition can any person make any Seek advice from people who will be impacted
decision? Consider the cost
a
Both A and B
4 What is the most multi-functional type of
individual?
l ic
a) T-Shaped
b) Pi-Shaped
up
c) Comb-Shaped
d) E-Shaped
5 Which is the most evolved typology of a) Teal
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Four Quiz
ib
tr
1 Who wrote ‘Reinventing Organizations’? a) Frederic Laloux
is
b) Erik Erickson
c) Larry Maccherone
D
d) Ron Westrrum
2 Where did The Trust Algorithm originate? a) The Department of Defense
or
b) Charlie Green
c) The DevOps Handbook
d) Comcast
te
3 According to Laloux’s advice process, under a) Seek advice from an expert
what condition can any person make any b) Seek advice from people who will be impacted
decision? c) Consider the cost
a
d) Both A and B
4 What is the most multi-functional type of
individual?
l ic
a) T-Shaped
b) Pi-Shaped
c) Comb-Shaped
up
d) E-Shaped
5 Which is the most evolved typology of a) Teal
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 5 ic
ESTABLISHING DEVSECOPS PRACTICES
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 5: Establishing DevSecOps Practices
ib
tr
is
• Start where you are Component Module 5 Content
D
• Integrating people, Video The Rise of DevSecOps
or
process, technology and
governance Case Story Comcast
Discussion What are your worst
te
• Continuous Security for
DevSecOps practices?
a
• Onboarding process for ic Exercise Wicked Questions
stakeholders
l
up
• Practices and outcomes
• Data driven decision making and
D
response
ot
N
108
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Start Where You Are
ib
tr
• Before changing, realize where you are today
is
• How do you find out where your process is?
D
• Surveys and assessment
• Metrics – Repeatable, contextual data
or
• Sensing sessions
• Problem identification
te
• Know where you want to go
a
• Create a shared vision and objectives
• Use Value Stream Mapping techniques to align
l ic
process to pipeline
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
Integrating People, Process, Technology
ut
and Governance
ib
tr
What aligns with your values?
is
Sensing across all areas
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
RISCS: Developer-Centred Security Research
ib
tr
• Appreciate that security fundamentals are
is
hard to get right
• Acknowledge that developers are not
D
necessarily security experts
• Help stimulate conversations about cyber
or
security from an early stage
• Facilitate collaboration between security
te
experts and developers
• Reward and motivate developers - both
a
intrinsically and through the work ic
environment
l
• Select tools and techniques that developers
up
find usable
• Promote a blame-free culture that
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Continuous Security for DevSecOps
ib
tr
• Security is everywhere in
is
the corporate
workspace
D
• Every area has potential
or
security tools, which are
important for your
business
te
• Continuous Security is
a
the addressing
l ic of security concerns
and testing in
the Continuous Delivery
up
pipeline
D
In DevSecOps we use lean and value stream thinking to ensure that security is not causing
ot
waste or delays in the cycle time – that it’s not a constraint and is not interrupting flow.
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
Module 1: Exploring DevOps
ut
ib
tr
is
D
or
a te
l ic
up
Wassenaar (14:58)
https://youtu.be/o7-IuYS0iSE
ot
113
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Onboarding for Stakeholders
ib
tr
is
• Bring new people into process
D
• Where do I start new people?
Level of UNDERSTANDING
• Have a checklist
Critics Spectators Advocates
or
• Take time to orient
te
Dev Sec Ops
a
Identify
repos and
Compliance
standards,
Find SRE links,
what Alerts,
l ic Cynics Unengaged Enthusiasts
daily governance, where are
up
processes continuous logs
security
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
3 Myths of Separation of Duties (SoD) vs DevOps
ib
tr
Clue: The systems are/do the separation
is
D
1. DevOps + CI/CD Means Pushing Straight to Production
– Code should always be tested/checked in the CI/CD pipeline
or
– There’s really no such thing as “straight to production”
– Dev and Ops is still 2 teams in most organizations
te
2. SoD Is Effective At Stopping Fraud and Errors
– Errors occur, regardless – but how well do you detect & recover?
a
– The Second Way: fail fast, recover fast, learn faster!
ic
– DevOps often means more testing but stops fraud and errors
l
3. SoD and DevOps Are Incompatible
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
EXERCISE
te
Roleplay: Wicked Questions – Why do
a
security teams think Dev and Ops should
l ic
care about their perspective?
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
Orchestrating Security in the Flow
tr
is
• Sample Orchestration
D
• Do you have the minimums?
or
DevSecOps
a te
CI/CD
l ic Compliance Repair and
Dev Security Ops Security
up
Security Ops Repeat
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Practices and Outcomes
ib
tr
is
D
Flow Feedback Continuous Learning
or
• Security Driven Development • Shift security left • Continual experimentation
• Positive scenario • Shorten feedback loops • Indicator of compromise
te
• Negative scenario • Shared on-call tasks • SIEM (Security
• Data science Information and Event
a
• Product/feature teams Management)
collaborate with security • Share threat intel
• Security Acceptance criteria
ic
• Identify needed security
l • Indicator of Concern
feedback • Repetition of practices
up
• Establish policy
• Current Scan status • Security Scaling
• Legacy codes
• Pipeline acceptance • Verification of
D
• New implementations
• Fixed/Unfixed CVE continuous compliance
• Improve collaboration
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
DISCUSSION
a te
What are your worst practices? l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Shift Security Left for Outcomes
ib
tr
Testing is integral to DevSecOps Practices
is
D
• Automated Testing
Unit
or
•
• Functional
• Regression
integration
te
•
• System
Others as required
a
•
• Test, Verify, Automate
• Move internal audit earlier
• Codify automated policies and
l ic
up
compliance
• Real-time reporting
• Logging
D
• Central repository
• Alerts – Who alerts whom?
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Securing Your CI/CD Pipeline
ib
• Implementing “Just Enough”
tr
•Security by stage
security
is
• Scan for code success
• Balance between real and
D
perceived exposure • Measure for integrated vulnerability
• Establish countermeasures based on • Assess integration
or
risk • Secure production data
• Artifacts for Continuous Compliance
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps, Cloud and Containers
ib
tr
is
D
Cloud Security: Container Security:
or
• Always user’s responsibility • RBAC
• Manage user credentials • Securing orchestration platforms
• Limit storage accessibility to needed • Certificates
te
• Monitor API access logs • Service meshes and SDN
a
• Coordinate configurations • Host security - nodes that the containers
• Establish Disaster Recover plans
• Forensics/Incident Response emphasize
l ic are running on
• APIs
up
live response, based on incident • Base image vulnerability scanning
planning, automated data • Attack surface reduction using
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Security Champions
ib
tr
is
• In large organizations, it’s impossible to
put security specialists on every team:
D
• Choose champions to extend coverage
or
• Improve communication channels to
experts
te
• Interact regularly between
a
teams/experts
l ic • Scaling safety and security
up
• Coordinate champions
• Always:
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: Comcast
ib
tr
“From a DevSecOps perspective, the way security teams have been engaging
with development teams has not been fundamentally conducive to trust. They are
is
polite in a corporate, political sense, acknowledging each other’s work, then they
ignore what the opposite party is asking for from them. Behind each other's backs, “There are no best
D
the developers are essentially saying about the security folks, "Those security
people, they just don't get what we do, they don't understand. They're just trying to practices. Only
or
force mandates on us, and this too shall pass just like every other movement that's good practices in
been tried to be imposed upon us externally. We can just ride it out, and we will just context.”
ride it out." And then the security folks are saying, "Those developers, they're just
te
putting poor quality code out there that's going to get us hacked. They're lazy and
they don't care."
a
l ic Benefits
up
Larry Maccherone,
DevSecOps
N
Transformation Director
Module 5: Establishing DevSecOps Practices 124
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Focus on Outcomes
ib
Metrics
tr
ID some metrics
is
numbers
D
Telemetry Personnel
or
•Uptime/downtime
•CVE status If you care about it, What do people need?
• Happiness
•Vulnerability assessment track it! • Job satisfaction
te
•Risk standards
• Growth
•Individuals with access
a
ic Debt
Occurs when fixes are
l
implemented in the short
up
• Technical Debt
• Process Debt
ot
• Human Debt
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Data Driven Decision Making
ib
tr
Types of Data
is
Quantitative (Numbers) Qualitative (Narrative) Hybrid (Mixing Qual/Quan)
D
1, 2, 3 … "Define, Relative Importance” Two or more sample types
or
Data Standards Validation of Data
te
• Setting code driven, peer- • Bug bashes/vulnerability bashes
a
reviewed standards • Process Bash
• Extreme Programming
• Pair Programming
l ic •
•
War games
Tabletop exercises
• Peer Review Bug bounties - 3rd Party
up
•
• Code quality standards • Red Team/Blue Team/Purple
• Repos Team
D
• Quality assurance
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Red, Blue and Purple Teams
ib
tr
• Red Team
is
• Always win – high motivation
D
• Attacks from outside to verify security
or
• Blue Team
• Always lose – low motivation
te
• Work from inside to discover and close
vulnerabilities
a
ic • Purple Team
• New Thinking
l
up
• Combine Red and Blue functions to
establish compiled solutions
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Do Security Professionals Care About DevOps?
ib
tr
is
D
• Policy as code
• Stakeholders • Integrated frameworks
or
• Practitioners • Automated checks
• Observers • Refactoring debt
a te
l ic
• Threat hunters – everyone can report threats
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Five Quiz
ib
tr
1 Which of the following is not a Separation of Duties (SoD) a) DevOps + CI/CD means pushing straight to production
is
myth? b)All DevSecOps practices should begin with establishing a
clear SoD
c) SoD Is effective at stopping fraud and errors
D
d) SoD and DevOps are incompatible
2 All of the following are examples of validating data a) Red/Blue/Purple teams
or
except: b) Tabletop exercises
c) Code quality standards
d) Bug bounty
te
3 What is the best reason to put security champions on a) Have an internal spy
your teams? b) Improve communication
a
c) Enforce standards on recalcitrant developers
4
ic
Shifting security left best exemplifies this aspect of
l d) Hire more people into the security team
a) The First Way
DevOps practices b) The Second Way
up
c) The Third Way
d) Improvement Kata
5 Establishing security policies is best accomplished during a) Continuous Security
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Five Quiz
ib
tr
1 Which of the following is not a Separation of Duties (SoD) a) DevOps + CI/CD means pushing straight to production
is
myth? b)All DevSecOps practices should begin with establishing
a clear SoD
D
c) SoD Is effective at stopping fraud and errors
d) SoD and DevOps are incompatible
2 All of the following are examples of validating data a) Red/Blue/Purple teams
or
except: b) Tabletop exercises
c) Code quality standards
d) Bug bounty
te
3 What is the best reason to put security champions on a) Have an internal spy
your teams? b) Improve communication
a
c) Enforce standards on recalcitrant developers
4
ic
Shifting security left best exemplifies this aspect of
l d) Hire more people into the security team
a) The First Way
DevOps practices b) The Second Way
up
c) The Third Way
d) Improvement Kata
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 6 ic
BEST PRACTICES TO GET STARTED
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 6: Best Practices to Get Started
ib
tr
is
• Identifying target state
D
• Value stream-thinking Component Module 6 Content
or
Video Building Security into an
• Flow Agile Cloud Transformation
te
Project
• Feedback
a
Case Story Sentara Healthcare
• Learning ic Discussion Value Stream Mapping
Experiences
l
up
Exercise Reference Architecture
Analysis
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
Identifying Target State
tr
is
• Start with Value Stream Mapping
D
• Visually collaborate to establish
or
where security activities currently
happen
te
• Identify where there are constraints
a
• Collaborate to design a target state ic
map to address security requirements
l
up
earlier
• Identify communication and
D
automation improvements
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
DISCUSSION
a te
Value Stream Mapping Experiences l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 7: DevOps Pipelines and Continuous Compliance
ib
tr
is
D
or
a te
l ic
up
https://youtu.be/o7-IuYS0iSE
Transformation Project’ by Chris Rutter (24:57)
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
BEST PRACTICES FOR FLOW l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
Artifact Management
tr
is
• Value key pairing is as important as any
D
other task in the organisation – mapping the
or
right resources to the right owners
• Automate the maintenance of the CMDB
te
(Configuration Management Database) via
a
your CI/CD pipeline
• Define artifact onboarding or offboarding
l ic
process
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
Risk Management
tr
is
• Understand the threat landscape for the
D
organisation and applications
or
• Perform threat modeling
• Automate the threat modeling as a
te
code (TaaC)
a
• Document the threat model process
• Risk acceptance from the relevant stake
l ic
holders
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Identity and Access Management (IAM)
ib
tr
is
• Regularly audit policies
D
• Identification of high-risk users
• Audit privileged accounts , grant least privilege
or
to all users
• Enable Multi-factor Authentication (MFA)
te
• Track app-to-app credentials
• Automate security checks on secrets
a
management ic
• Store and manage secrets, tokens, control
l
access only in Vault, not other files
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Secrets Management
ib
tr
is
• Nobody knows the secrets
• Authorized people have the keys
D
• Secrets are dynamic: they are never
or
constant
• Make the secret a variable that is a pulled
te
artifact (avoid secrets sprawl)
a
• Have secrets rotate on a cadence
• Least privilege for secrets store access
l ic
• Do not hard code
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Encryption
ib
tr
is
• Know your targets
• Transit, data, points of interaction
D
• Ensure encryption standards are kept up to
or
date – your infrastructure needs to support
this – be wary of technical debt
te
• Use data classification to define the
intellectual property or data of the asset to
a
be encrypted ic
• Understand the risk and apply accordingly
l
up
securely
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
EXERCISE
a te
Reference Architecture Analysis l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Web Applications
ib
tr
is
Keep a check on the
Continuous Security for Threat model the
D
source code
Apps applications
vulnerabilities
or
te
Automate the code
Don’t miss on Good documentation
commit security check
addressing the third- can address half of the
a
and application
party dependencies concerns.
testing.
l ic
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
BEST PRACTICES FOR FEEDBACK l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Governance, Risk and Compliance
ib
tr
is
• Implementation of configuration changes and
D
policy rules
or
• Automate Compliance to run as code (CaC)
te
• Versioning is important to maintain code
a
• Setting up the process on when to fail the build in
l ic
the pipeline
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Monitoring and Logging
ib
tr
is
• On-boarding critical log sources
(applications, servers, network devices,
D
etc.)
or
• Enable required logs (e.g application
logs, platform logs, security logs etc.)
te
• Building use cases to capture critical
a
activities
• Continuous monitoring of the production ic Spikes in utilization
environment for exploitation of
l
up
incidents
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Emergency Response
ib
tr
is
• Documented plan for handling the critical Incident Response
D
incidents • Be prepared to call in
or
• Agreed RACI (Responsible, Accountable, outside help
Consulted and Informed) Matrix • Know your limits and have
a contingency plan
te
• Identify the right stakeholders • Leverage automation
• Documented escalation matrix
a
opportunities
• High severity incident creation with the
ic • Tune your skills to include
the cloud
bridge (call) details
l
• Triggers on log data and
up
• Knowing the Disaster Recovery (DR) plan threat intelligence
• High Availability (HA) setup for critical
D
assets
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Cyberthreat Intelligence Program
ib
tr
is
• Identify sources that define
and explain the evolving
D
threat landscape
or
• Document how the
te
sources will be used
• Assign roles and
a
responsibilities for
l ic
collecting, assessing, and
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
a te
BEST PRACTICES FOR LEARNING l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Valuing Best Practices
ib
tr
Principle Practice
is
D
Team-external/Org-internal Process for assuring that team-external/org-internal vulnerabilities get resolved
vulnerability process in the SLA
or
High-severity clean Resolving the initial set of in pipeline scanning findings to zero
te
Secure coding training Checkmarx Codebashing (2-3 hours) required for all team members who
a
regularly write production code
Only merge secure code ic
Pull-request branch protection status check on scan results to stay at zero
l
up
Threat modeling 4-8 hour workshop with security architect facilitating an evaluation of your
product design
D
Production-ready security Periodically submitting your application(s) to internal white-box pen testing++
assessment assessment
ot
Secrets Management Assuring that passwords, certificates, API keys etc. are securely stored and not
in source code repositories
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: Sentara Healthcare
ib
tr
”The important thing is always why. We are trying to improve our
is
ability to engage consumers and deliver more digital solutions.
This requires us to do things we haven’t done before and we’re ”Anything that falls
D
into our DevSecOps
using different tools and infrastructure. DevSecOps started out for
model - my team
us as a philosophy; ‘How we should do things”, and became a
or
now has complete
methodology; “How we do things.” It’s been a great learning visibility as every
process for us, learning how to work together, from the team that change happens.”
te
develop the code to the strategic leaders of the organization.”
a
l ic Benefits
up
Dan Bowden
CISO
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Continuous Learning Practices
ib
tr
is
• Module 8 focuses on
D
Continuous Learning and
or
Experimentation practices
• Identifying external options for
te
security training
• Implementing training as policy
a
• Delivering experiential learning ic
options
l
up
• Cross-Skilling
• Making use of the DevSecOps
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Six Quiz
ib
tr
is
1 Who wrote the book ‘Value Stream Mapping’? a) Karen Martin and Mike Osterling
b) Mike Orzen and Thomas Paider
D
c) Gene Kim and Jez Humble
d) Mike Rother and John Shook
or
2 What is CaC in the context of DevSecOps? a) Common access Card
b) Code as Competition
c) Cybersecurity as Code
d) Compliance as Code
te
3 What’s important according to Sentara Healthcare in a) What
a
their DevSecOps implementation? b) How
c) Why
4
ic
When considering encryption, what should you know?
l d) Where
a) Your threats
up
b) Your targets
c) Your purpose
d) Your secrets
D
d) Leadership
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Six Quiz
ib
tr
is
1 Who wrote the book ‘Value Stream Mapping’? a) Karen Martin and Mike Osterling
b) Mike Orzen and Thomas Paider
D
c) Gene Kim and Jez Humble
d) Mike Rother and John Shook
or
2 What is CaC in the context of DevSecOps? a) Common access Card
b) Code as Competition
c) Cybersecurity as Code
d) Compliance as Code
te
3 What’s important according to Sentara Healthcare in a) What
a
their DevSecOps implementation? b) How
c) Why
4
ic
When considering encryption, what should you know?
l d) Where
a) Your threats
up
b) Your targets
c) Your purpose
d) Your secrets
D
d) Leadership
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 7 ic
DEVOPS PIPELINES AND CONTINUOUS
l
up
COMPLIANCE
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 7: DevOps Pipelines and Continuous
ib
Compliance
tr
is
D
• The goal of a DevOps pipeline Component Module 7 Content
or
• Why continuous compliance is Video Overview of DevSecOps
important Case Story World Bank Group
te
• Archetypes and reference Discussion What are the goals of a
a
architectures DevOps pipeline?
• Coordinating DevOps Pipeline
l ic Exercise Explore SAST, DAST, IAST,
construction
up
SCA, CSA
• DevSecOps tool categories,
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Goals of a Pipeline
ib
tr
is
D
or
Quality in Rapid Time to
Early Failing Fast
te
check Market
Feedback
Automated
a
Detect bugs Deploy software
Is this build testing and
potentially ic
early before
production
l quality check
fast and
continuous
releasable?
up
tooling
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
DISCUSSION
a
What are the goals of a DevOps pipeline? l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Goals of a Pipeline
ib
tr
Continuous Integration Continuous Delivery Continuous Deployment
is
Continuous Integration is a Continuous Delivery is the ability to Continuous Deployment means
software development practice get changes of all types— that every change goes through
D
where members of a team including new features, the pipeline and automatically
integrate their work frequently, configuration changes, bug fixes gets put into production, resulting
or
usually each person integrates at and experiments—into production, in many production deployments
least daily - leading to multiple or into the hands of every day. Continuous Delivery just
integrations per day. Each users, safely and quickly in means that you are able to do
te
integration is verified by an a sustainable way. frequent deployments but may
automated build (including test) to Our goal is to make deployments— choose not to do it, usually due to
a
detect integration errors as quickly whether of a large-scale businesses preferring a slower rate
as possible. Many teams find that
this approach leads to significantly
ic
distributed system, a complex
production environment, an
l of deployment. In order to do
Continuous Deployment you must
reduced integration problems and embedded system, or an app— be doing Continuous Delivery.
up
allows a team to develop cohesive predictable, routine affairs that
software more rapidly. can be performed on demand.
D
-Martin
Martin Fowler
Fowler Jez Humble Martin Fowler
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Perils of a Pipeline
ib
tr
is
D
or
te
Beware of a
Operation of a Unattended Vulnerable
a
pipeline depends ‘Pipeline Bloat’
on the efficacy of
l ic Pipelines Pipelines
the pipeline
up
Too many tools could Who is accountable Hardcoded
Accuracy of results
be of too little value for what? credentials,
from the tooling in
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Planning a DevOps Pipeline
ib
tr
is
D
or
a te
The Pipeline Architecture
l ic The Outcome of the Pipeline
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The Pipeline Itself
ib
tr
is
D
or
a te
Notification Health ic Architecture
Emails Status
l
Virtual Machines
up
Dashboards Available Agents
Containerized
ChatOps
Capacit y M onit oring
D
PaaS Model
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 7: DevOps Pipelines and Continuous Compliance
ib
tr
is
D
or
a te
l ic
up
‘Overview of DevSecOps’
D
https://youtu.be/o7-IuYS0iSE
by Nicolas Chaillan (6:24)
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Planning a DevOps Pipeline – The Outcome
ib
tr
is
What needs to be built?
D
• The technology and the framework stack for the software
• Dependency management
or
Non-Functional Requirements
te
• Performance
• Compliance
a
• Security
Approved Tooling
l ic
up
Build Time
ot
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
An Example of a DevOps Pipeline
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Pipeline Tasks with Minimalistic Security Checks
ib
tr
is
D
Lint checks are the
or
automated checking of
your source code for
te
programmatic and stylistic
a
l ic errors.
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Ensuring Software Security through Build Pipeline
ib
tr
is
Where tools work well:
D
or
• Finding known vulnerabilities (published CVEs) "Known bad"
• Finding common software weaknesses (CWEs)
• Automating repetitive security tasks (checking misconfigurations)
te
• Fuzz testing and long running security tasks
a
Where tools need improvement:
l ic
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Automated Security Checks and Tooling
ib
tr
is
D
or
Static (SAST) Dynamic (DAST) Hybrid (IAST/ RASP) Software Composition
Analysis SCA
te
Analyze either the Analyze running Agent installed on the Analyzing what the software is
a
source code or the application server combining both composed of in terms of
compiled binaries, also
SCA and CSA
l ic Dynamic and Static dependent frameworks and
libraries. Cheapest method.
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
EXERCISE
Compare and contrast various categories of
a
l ic
up
security tooling
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
SAST / DAST / IAST / RASP - Examples
ib
tr
Category Free or Open Source Commercial
is
SonarQube Coverity
D
VisualCodeGrepper Checkmarx
FindSecurityBugs FortifySource
or
Bandit Veracode
SAST Security Code Scan FindSecBugs
te
Nikto AppScan
a
OWASP ZAP Acunetix
Arachni
l ic Netsparker
Sqlmap Fortify
up
DAST WhiteHat
D
HDIV Security
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: World Bank Group
ib
”Our journey started as a Development project, then morphed
tr
into an Ops project. As the years have accumulated it’s become
is
almost a program. We started by addressing the most significant ” Moving to the
cloud raised the
D
risk decisions that we have to support in an automated manner.
Then we looked at speed versus scalability versus quality. The business'
or
goal is to support a service that can be done in minutes and expectations on
support an asynchronous mode. We phased the implementation the technology
of our automation. " group."
a te
l ic Benefits
up
Srinivasa Kasturi,
Information Security
Officer
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Tooling Evaluation Criteria
ib
tr
is
• Integration with SDLC • Release frequency
Integrations with Build systems
D
•
• Signature update frequency
• Integrations with Bug Tracking systems
Integrations with IDEs • Learning/Customization/Tuning time
or
•
• Fuzzing/Regression testing • Developer usability
• APIs
te
• Support systems
• For custom automation and tuning
a
• For retrieving specific vulnerability • Detection accuracy
categories
• For retrieving specific risks
l ic • On-premise or SaaS
• Language, framework, technology
up
• Scanning Time
• Incremental scans for velocity support
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Continuous Compliance
ib
tr
• Continuous Compliance aims at maintaining
compliancy of IT systems on an ongoing basis
is
when systems are ever evolving and changing
D
• Compliance teams need to engage with Dev
and Ops early on during systems design and
or
development, shifting left
• Compliance as Code helps in automating
te
compliance requirements as code to foster
collaboration, repeatability, and continuous
a
compliance. Example: InSpec from Chef
• Continuous Compliance could be achieved
using Compliance as Code, Security Policies,
l ic
up
Benchmarks, Auditing, and Monitoring
• Managing exceptions from compliance
D
Continuous Compliance
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
Continuous Compliance
ut
ib
An Example from Azure Security Center
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Security Information and Event Management
ib
tr
SIEM assists in:
is
“Security information and
• Quantifying threat agents Event Management (SIEM) is
D
a subsection within the field
• Quantifying likelihood of a security of computer security, where
or
event software products and
• Offering threat intelligence services combine Security
te
Information Management
• Proving critical security analytics data (SIM) and Security Event
a
for apps, databases and networks Management (SEM). They
• Feeding information to Risk
l ic provide real-time analysis of
Management security alerts generated by
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
SIEM
ib
Security Information and Event
tr
Management
is
Dashboarding capabilities:
D
Data Sources:
• LDAP • # Events created
or
• DNS • # Alerts raised
• Firewall • # Cases under
te
• Events investigation
• Database logs • # Blocked incidents
a
• Application logs
• Web Application Firewall
• IAST / RASP
l ic
up
• Syslog
• REST APIs
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
A DevSecOps Pipeline Reference
ib
tr
is
D
or
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Seven Quiz
ib
tr
is
1 Common software weaknesses are captured by which a) CVE
list? b) CWE
D
c) CVSS
d) CIS
or
2 Which of these tools helps with automating compliance a) Chef
as code? b) InSpec
c) OWASP ZAP
d) AWS Inspector
te
3 The tool Arachni falls under which category? a) DAST
a
b) SAST
c) SCA
4
ic
Application security scans can be optimized through?
l d) IAST
a) Customizing scanning rules to application’s context
up
b) Scanning only the delta (changes from last build)
c) Increasing CPU and memory for parallelization
d) All the above
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Seven Quiz
ib
tr
is
1 Common software weaknesses are captured by which a) CVE
list? b) CWE
D
c) CVSS
d) CIS
or
2 Which of these tools helps with automating compliance a) Chef
as code? b) InSpec
c) OWASP ZAP
d) AWS Inspector
te
3 The tool Arachni falls under which category? a) DAST
a
b) SAST
c) SCA
4
ic
Application security scans can be optimized through?
l d) IAST
a) Customizing scanning rules to application’s context
up
b) Scanning only the delta (changes from last build)
c) Increasing CPU and memory for parallelization
d) All the above
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
te
a
Module 8 ic
LEARNING USING OUTCOMES
l
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 8: Learning Using Outcomes
ib
tr
is
Security Training Options
D
•
• Training as Policy Component Module 8 Content
or
Video Failure and The Third Way
• Experiential Learning
Case Story Ericson
te
• Cross-Skilling
Discussion 3 Ways to Free Learning
a
• The DevSecOps Collective Body
of Knowledge
lic Exercise Retrospective
• Next Steps
ot
N
181
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module 7: DevOps Pipelines and Continuous Compliance
ib
tr
is
D
or
a te
l ic
up
https://youtu.be/o7-IuYS0iSE
with Aaron Blythe (5:26)
ot
182
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
DISCUSSION
a te
Your Three Ways to Free Learning l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Learning Communities
ib
tr
is
• The Third Way: Continuous
Learning
D
• What should you value?
or
• Certification
te
• Degree
a
• Experiences ic
• Volunteer (OWASP, DevOps Days)
l
up
• Personal – (Git projects)
• Virtual groups: DevOps Institute
D
Community
• Previous jobs
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Security Training
ib
tr
• Where do I get training?
is
• Short Courses/Boot Camp
D
• University
• Non-Boot Camp schools
or
When
• Where should we get training? Implementing
te
training, bring a
SCARF:
a
Status
l ic Certainty
Autonomy
Relatedness
up
Fairness
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Training as Policy
ib
tr
is
• Lunch and Learn
D
• Organizational Requirements
or
• Mentoring
• Professional Ed requirements
te
• Individual Goals
• Employee Plans
a
• Mentoring
• Structured training
l ic
up
• Classes
• Dojo
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevSecOps Dojos
ib
tr
• Dojo: a room or hall in which judo and
is
other martial arts are practised
D
• Means “Place of the way” in
Japanese
or
• In DevOps, it’s an immersive learning
environment
te
• Dojo experiences are typically
referred to as ”challenges”
a
• Two main goals: ic
1. Deliver current work
l
up
2. Learn how to acquire and develop
long-standing skills
• Join the Dojo Consortium to learn
D
more
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Security Chaos Engineering
ib
tr
is
D
or
ate
lic
up
Aaron Rinehart, CTO
Verica and an originator
of Chaos Engineering
D
ot
N
188
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Reviewing Experiences
ib
tr
is
• Experiences stick for a while
D
• Lock experience in with the review process
or
• Implementing the Review process
te
• Document stories
a
• Share stories ic
• Sponsor Champions
l
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Retrospective Learning
ib
tr
• Starting the Retrospective- Goals
is
Obtain honest feedback
D
•
• Find the holes in delivery
or
• Find strong points
• Create new work to fix holes
te
• Don’t lose strengths
a
• Can be better to improve
l ic
strengths than fix weaknesses
up
• Process Debt
• Human Debt
D
• Technical Debt
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Innovative Learning
ib
tr
is
• Allocate time for
D
innovation and learning
or
• As part of the Sprint
• Hackathons
te
• Simulations
a
• Book Club
l ic
up
• Toastmasters
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Gamification
ib
tr
• Gamification can be used to raise CWN uses Cyber
is
awareness in secure development Wraith tool to
• Code Hunt evaluate
D
• Build It, Break It, Fix It professional skills
or
• Code Defenders
• Dr. Manuel Maarek et al, RISCS
te
research project, ‘Impact of
Gamification on Developer-Centred
a
Security’ created an online platform
experiment:
l ic
• Extension of GitHub
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Education and Awareness Plans
ib
tr
is
For Developers For Testers For Security For Leadership
D
Writing secure Automated Vulnerability Pipeline metrics
or
code testing analysis
Understanding
te
Programming Application Why security DevSecOps
a
languages Security testing is necessary
techniques ic Metric analysis
Tool training Dev processes
l
up
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Cross-Skilling
ib
tr
The DevOps Institute
is
Certification program
D
• No formal prerequisites
Take the course you need
or
•
• Pass the exam
te
• No renewal requirements or
fees
a
lic
up
D
ot
N
194
©DevOps Institute unless otherwise stated Module 8: Learning Using Outcomes
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
DevOps Institute SKILup Days
ib
tr
is
D
• Monthly SKILup Days
Selected topics
or
•
• Vendor availability
te
• Community chat
Speaker presence
a
•
• View live or on-demand ic
• Slack channel
l
up
• SKILup Chapters
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
The DevSecOps Collective Body of Knowledge
ib
tr
is
• Books
D
• Conferences
or
• Webpages
te
• Organization
a
• Community
l ic
up
• GitHub
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
CASE STORY: Ericsson
ib
”Applying complex systems thinking, growing the agile mindset
tr
through storytelling, and visualizing the interplay; these are some
is
of the things that drove the agile transformation at Ericsson. “The learning here is,
that it starts with the
D
Having a leadership team that fully embraced agility, an
leaders and you need
independent group of agile coaches, and doing frequent well-educated and
or
retrospectives in the leadership team ensured that the skillful coaches to make
transformation stayed on track." the transformation
successful.”
a te
l ic Benefits
• Run organizational system leadership retrospectives. In the
up
beginning, more than 50% of leadership meetings addressed
system retrospection
D
Manager Special
Projects
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Your DevSecOps Career
ib
tr
In 2019 there was a reported
is
global cybersecurity staffing
D
shortage of 3 million and
or
growing.
a te
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
What comes next?
ib
tr
is
D
• Think this is the end?
or
te
• Continuous Learning means forever
a
l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
EXERCISE
a te
Retrospective l ic
up
D
ot
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Eight Quiz
ib
tr
is
1 What is The Third Way of DevOps? a) Continuous Flow and Feedback
b) Continuous Feedback and Improvement
D
c) Continuous Experimentation and Learning
d) Continuous Security and Compliance
or
2 Which is not required for a good retrospective? a) Obtain honest feedback
b) Find the holes in delivery
c) Find strong points
d) Assign blame for mistakes
te
3 This term represents an immersive learning environment a) Kanban
a
and is taken from a martial arts term? b) Kaizen
c) Dojo
4
ic
What does the ‘S’ in David Rock’s SCARF acronym
l d)
a)
Kata
Stress
up
represent? b) Status
c) Simplicity
d) Sophistication
D
d) 30-50%
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Module Eight Quiz
ib
tr
is
1 What is The Third Way of DevOps? a) Continuous Flow and Feedback
b) Continuous Feedback and Improvement
D
c) Continuous Experimentation and Learning
d) Continuous Security and Compliance
or
2 Which is not required for a good retrospective? a) Obtain honest feedback
b) Find the holes in delivery
c) Find strong points
d) Assign blame for mistakes
te
3 This term represents an immersive learning environment a) Kanban
a
and is taken from a martial arts term? b) Kaizen
c) Dojo
4
ic
What does the ‘S’ in David Rock’s SCARF acronym
l d)
a)
Kata
Stress
up
represent? b) Status
c) Simplicity
d) Sophistication
D
d) 30-50%
N
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
Summary
is
D
• DevSecOps practices…
or
• Deliver better value
outcomes sooner, safer,
te
happier
a
• Lead to continuous
compliance
lic
• Measure and mitigate
up
203
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
ib
tr
is
D
or
"DevSecOps essentially breaks down
the enterprise security silo by
cultivating a symbiotic relationship
te
between security and other business
units and increases product quality
a
and delivery velocity by adding
security specific techniques and
toolsets to DevOps practices.”
ic
l
up
DJ Schleen
D
ot
N
204
©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM
e
ut
Special Thanks to Contributors
ib
DevOps Institute would like to acknowledge and thank
tr
the subject matter experts and thought leaders who
is
contributed their valuable input, knowledge and
expertise to the development of this course and
D
certification.
or
• Lavanya Arul - DevOps and Agile Consultant and Trainer; DevOps
Institute Ambassador
• Helen Beal - DevOps Institute Chief Ambassador; Ways of Working
te
Coach
a
• Shlomo Bielak - Chief Technology Officer, Benchmark Corp;
DevOps Institute Ambassador
l ic
• Felipe Duenas - Consultant, agile + flow; DevOps Institute
Ambassador
up
• Marudhamaran Gunasekaran - Security Consultant;
DevOps Institute Ambassador
• Mark Peters - Cybersecurity & Intel Expert; Agile Leader; Author &
D
©DevOps Institute unless otherwise stated ©DevOps Institute unless otherwise stated
o
D
Licensed For Use Only By: NagaPavan Kurapati pavan92002@gmail.com Mar 16 2021 12:22PM