Agile Risk: DevOps to Security

Agile Risk: DevOps to Security

Traditional Risk Analysis are anachronistic. In fact, despite the aim of deepness and accuracy, these are late,  not money-able and un-structural; it results in 3 not addressed dimension of analysis:

  • No Time: whenever the analysis is over, the IT Infrastructure, it is about, has just changed. Usual App have to upgrade 1 time a month; some MobileApps just 1 week or some days
  • No Money: the evaluation is against a theorical degree (low-medium-high or 1-10) not related to effective business and real loss of money
  • No Architecture: the identified countermeasures are described and referred as designed specifically for the IT application under evaluation, not referring to a systematical approach (both technical or procedural) used by the company

Just a different approach is required. In the following, the porting of Agile Risk from Project Management to Security Management, sharing the DevOps paradigm.

Time passed, the old IT world, the traditional RA was developed, for is not more in use, there are 3 main changes:

  • Craft vs Factory: the IT is not more craftwork. Whenever the IT solution is addressing specific issues, it is made up by of pre-built components (often shared among apps). Security should be applied (by the use of proper countermeasures) to those, firstly; then to 'ad hoc' configurations/customizations
  • Attack Sense: no-one make something for nothing (time is money). Also Cyber Attacks are forced to this rule. It is the time of Cyber Crime, used as instrument for making money (not more occasional crackers). Security should start identifying the Intended Goals
  • DevOps: there is no more clear separation between building and mantaining of IT infrastructures. Development and Operations are deeply intertvined: a failure in the former affects the latter and vice versa. A proper vulns taxonomy is needed, helping in addressing effective countermeasures mapped to Dev, Ops or both. Security should introduce an approach like this
Gilberto Persico

UNIX & Networking Systems Engineer. Author of Fl0wer, the Network Intelligence solution for the most of us

9 年

Everything can be done, it is always an economy problem. And this is the real problem.

回复
Paolo OTTOLINO

Cybersecurity Sr. Expert | Adjunct Professor

9 年

My idea is to bring DevOps to Security Management (I agree with you DevOps Security could be already addressed by proper use of Docker)

回复
Eoin Fleming

VP IT at Stealthy Squirrel Designing, building, securing and managing IT at scale for mission critical applications

9 年

There are approaches like secure sprint to mitigate security risks in Devops type environments and separation can be achieved using docker or similar. It's a culture problem - if the team cares about security you will have it to some degree, if not you won't

回复
Paolo OTTOLINO

Cybersecurity Sr. Expert | Adjunct Professor

9 年

Yes, you can. Not only the same period but also in the same phrase (as I did). It is needed to bring together DevOps and Security for staying up to date.

回复
Gilberto Persico

UNIX & Networking Systems Engineer. Author of Fl0wer, the Network Intelligence solution for the most of us

9 年

Devops e security non si coniugano nella stessa frase :-D

要查看或添加评论,请登录

Paolo OTTOLINO的更多文章

  • Design Shutters - Part 1

    Design Shutters - Part 1

    Design Shutters – Part 1 The design of software application should entail cybersecurity considerations. Like the…

  • Using 8 Scrum (Ba-Gua) items to become more Agile

    Using 8 Scrum (Ba-Gua) items to become more Agile

    Essential Scrum is composed by 8 item rules (like Ba Gua). Agile Enterprise approaches as the 8 following rules: (Zhen)…

  • Euro area adjustment for Banking

    Euro area adjustment for Banking

    " Constitutions tend to show a strong socialist influence, reflecting the political strength that left wing parties…

  • The Need for Riding Disruptive Innovation

    The Need for Riding Disruptive Innovation

    New Technology market is fastly running, providing new devices and destroying previous ones. That is, the strict…

  • Getting More - Negotiation

    Getting More - Negotiation

    Getting More, non getting All. It is a methodology for negotiating from Stuart Diamond.

  • No more Tenders by Maximum Cost Saving

    No more Tenders by Maximum Cost Saving

    On Feb 26th, 2016 the new Directive 2014/24/EU about Tenders was issued (see https://www.ediltecnico.

  • FoIA in EU… and Italy?

    FoIA in EU… and Italy?

    The European project is founded on “Four Freedoms” detailed in the Treaty on the Functioning of the European Union, in…

  • NIS Directive from EU

    NIS Directive from EU

    The “Network and Information Security Directive” was firstly proposed on February 7th, 2013 (see…

  • APJ Abdul Kalam quotes

    APJ Abdul Kalam quotes

    Success Failure will never overtake a person whose determination to succed is strong enough Man needs difficulties in…

  • BIA for Dummies

    BIA for Dummies

    Business impact analysis (BIA) is a systematic process to evaluate or design the needed countermeasures to put in…

社区洞察

其他会员也浏览了