DevSecOps at Scale in Organization today and a lot to learn from the Ecosystem
Vishwas N.
Re-Inventing AI Acceleration for Enterprise | Training to be a Frugal Architect | Big Believer in "Product Ecosystem Fit" | Intrapreneur - Startup Swiss Army Knife(someone gave me this title)
If you're in charge of safeguarding your production i.e production environment and, by extension, your whole cloud environment, you should consider how many individuals have access to your SCM(s) -> Supply Chain Management System.
Organizations are embracing digital transformation and innovating at a bottleneck pace to stay competitive. They're doing this by embracing agility through DevOps, site reliability engineering, GitOps, and other techniques. Organizations are developing contemporary apps using new languages and frameworks and distributing them on a range of platforms and deployment choices.
To enhance velocity and permit ongoing improvement, all of these techniques require automation. Software developers must work quickly, checking in changes to their code every day, if not hourly, and then deploying it utilizing continuous delivery or continuous deployment pipelines. Fast shipping has become the new standard.
Whether I like it or not in the software security sector.
Despite this focus on speed and increased knowledge and interest in application security, application vulnerabilities remain the most serious cyber security threat. As a result, security cannot be overlooked.
Modern application testing necessitates several steps.
I? believe that including security testing in the software development life cycle (SDLC) aids in the early detection and mitigation of vulnerabilities. This is referred to as "building security in." Both automatic and manual tasks are included in these testing strategies. Threat modeling and architectural risk analysis are manual operations that focus on design, assets, attack surfaces, and in-depth functional investigations.
Static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and interactive application security testing are examples of automated activities (IAST).
The following are some of the advantages of a secure SDLC approach:
The problem is that the more often code is sent to production, the less time is available for traditional security procedures. Traditional security efforts, including automated technologies, can generate friction, slow down operations, and need lengthy human processes. And being sluggish isn't an option any longer.
The issue with the industry
To keep up, security teams are increasingly embracing DevOps principles, a process known as DevSecOps. This necessitates the addition of automation. DevOps requires automation, and DevSecOps requires much more. Adding another application security tool and automating it to expand security operations, on the other hand, would not be enough. It hasn't worked in the past, and it won't work now. Automating several tools in a pipeline and executing them whether or not they're needed is a long-standing industrial issue that poses several issues, including:
DevOps teams need speed, yet security operations that are automated are sluggish. Because application security testing technologies require time to perform, they slow down development pipelines when they are used in conjunction with them.
Security technologies that are automated are meant to discover all flaws, not just the most critical ones.
DevOps need ongoing communication, but fault detection isn't always consistent. Each security tool has its API, results in the delivery method, and method for breaking the build. Due to the inherent variances in each tool automated in the pipeline, security teams find it difficult to interact.
领英推荐
Scale is necessary for DevOps, but security tools and activities need manual involvement.
A threat modeling update, human code review, and penetration testing are just a few of the manual tasks that must be completed regularly. It's more difficult for DevOps teams to scale when they don't know when to do these manual security tasks, what actions are required, or whether they're required at all.
False positives are common in automated security technologies, making resolution and repair more complex.
The answer is
While retaining development velocity, intelligent orchestration allows teams to integrate application security analysis into DevOps pipelines. It employs a cloud-based CI/CD pipeline that automates the execution of the appropriate security tests at the appropriate time, depending on SDLC events and set policies. It also offers risk-based vulnerability reporting to assist teams in focusing on the most critical concerns.
What is Intelligent Orchestration and how can it aid development teams?
To avoid being overwhelmed by study findings, developers are provided vulnerabilities/bugs prioritized by their organization's security rules (e.g., only critical vulnerabilities or only critical SQLi vulnerabilities). Based on real code changes, a dynamically computed overall risk score, and established security policies, Intelligent Orchestration may select when to execute a given scan and when not to.
Development teams can also define that SAST or SCA will run whenever a developer pushes a code update or merges code from a development branch to the main branch. Developers are then given all of the information they need to remedy any discovered bugs and merge the modified code into the main branch, including extensive explanations, actionable remediation suggestions, file changes, line numbers, and commit IDs.
DevOps engineers with hundreds of thousands of CI/CD operations can also benefit from intelligent orchestration. By delivering a purpose-built security analysis pipeline that interacts easily with the current toolchain, Intelligent Orchestration simplifies and decreases the risk of incorporating application security testing into DevOps processes.
It also reduces friction by separating analysis from other development flows, assuring pipeline velocity.
What role does intelligent orchestration play in security and compliance?
Security teams must be able to establish their organization's policy, governance, and compliance needs quickly and simply. Policies that dictate the depth and breadth of security activities, the detection of any abnormalities in regular development processes, and scan compliance criteria may be established for each business unit, product team, application, or the whole company in Intelligent Orchestration.
Security teams may also quickly set up security or quality gates based on user-defined criteria. Critical issues are then automatically forwarded to issue-tracking platforms such as Jira. This gives development teams constant input and visibility into security discoveries.
Users may also establish post-scan feedback so that selected development, security, and DevOps leads are alerted instantly of delayed or failed builds, as well as severe security vulnerabilities or failures. This aids in the remediation process.
Benefits of Intelligent Orchestration?
Intelligent Orchestration provides security at scale and speed.
You won't have to worry about application security slowing down your development pipelines or impeding your digital transformation and innovation with Intelligent Orchestration. Intelligent Orchestration runs only the right tools and triggers the correct manual actions at the right time—or not at all—instead of running all the automated activities in the pipeline (e.g., SAST, SCA, IAST, DAST) for every build and waiting for your teams to conduct the manual activities. It delivers the appropriate notifications—or none at all—depending on the situation. It notifies the right people—or none at all. With Intelligent Orchestration your team can build secure, high-quality software, faster.
Say your Developer Story through the Artifacts
Sr. Lead DevOps Consultant | 2X Azure Certified | Azure | Speaker | Trainer | Azure Developer Community Lead | Kubernetes | Azure DevOps | Docker | Jenkins | Github | Bitbucket | Python | AWS | GCP | Snowflake
2 年Very well said, it's not always about what tool are we going to use, it's also about how are we going to have that tool fir in our pipelines to get the most out of it and smart placement for security tools is a key aspect
Program & Portfolio Manager | Capability Manager l Ex-Customer Service Mgmt & Delivery Manager l Ex- Sr. Project Manager| Certified Scrum Master? | ITIL? 2011 Foundation Certified in IT Service Management
2 年Wonderful! I would recommend this read to everyone