GRC for DevOps
Ed Amoroso summarizes his discussion with Rohit Sethi of Security Compass on embedding GRC into the DevOps SDLC. #CyberSecurity

GRC for DevOps

With recent rapid growth in enterprise security compliance demands, automated data collection and workflow tools have emerged to ease the administrative burden of dealing with auditors. The term for this type of computing support is Governance, Compliance, and Audit or GRC, and CISOs leading security teams of varying size and scope rely on such capability every day. It’s become standard in enterprise security.

A tenet of successful GRC deployment is that data must be collected, and corresponding actions taken, in the embedded context of business units. This implies that compliance should be examined and enforced from within the day-to-day workloads of an organization, rather than adjacent to, or outside, such activity. Embedding GRC into the business ensures accuracy of data collection and relevance of associated mitigation.

A common blind spot in GRC deployment, however, involves the software development lifecycle (SDLC) – which, of course, implies DevOps. Since DevOps was invented to deal with customers who (justifiably) cannot wait months or years from concept to delivery, it is reasonable to expect that the typical DevOps program will not have security focus as a primary concern. The result is a lot of scrum-born vulnerable code.

To understand this problem more clearly, I logged some time this week with Rohit Sethi, COO of Security Compass, a Canadian cyber security firm that provides products and services based on its SD Elements platform. Rohit explained how the Security Compass solution deals with the security and compliance gap in the typical DevOps SDLC – and it struck me as fresh and creative. Here is what I learned:

First off, Rohit said that Gartner is now marketing an acronym called ASRTM, which decodes to Application Security Risk Threat Management. While I dislike the acronym, I agree with the idea it represents, namely that security risk and threat management activities should pervade software application development. My advice is that in place of the stilted Gartner term, let’s call this what it is: GRC for DevOps.

The concept is that GRC collection, compliance, training, and management hooks are embedded in the most popular SDLC frameworks such as JIRA, Microsoft TFS, and IBM Rational. “The overall methodology supporting the Security Compass approach,” Rohit explained, "involves starting with identification of the SDLC processes and artifacts, and ending with meaningful action to improve the software.”

The identification of artifacts is done on the Security Compass platform through an interactive questionnaire that creates a model of the tools, languages, and other relevant decisions made by the SDLC developers and managers. The resulting design serves as a basis for subsequent security controls assessment of the DevOps process using applicable frameworks such as GDPR and NIST.

As outlined above, this framework assessment is performed directly in the context of the commercial SDLC framework chosen by the DevOps team. “Such embedded application into the most common development platforms allows for bug tracking, vulnerability management, and other security activities to be integrated directly into the DevOps activities,” Sethi explained.

Security Compass supports software validation and testing, which are perhaps the most familiar activities performed in modern SDLC environments to reduce security risk, by importing data, results, and input from common software security and quality tools for scanning, review, and audit. This includes popular offerings from companies such as WhiteHat, Checkmarx, Veracode, and HP (Webinspect and Fortify).

I guess it is somewhat of an open question whether most software developers will immediately want to embrace the inclusion of GRC hooks in their SDLC. My guess, however, is that once they understand the relatively minor impact that GRC will have on their day-to-day DevOps tasks, they will not only support the approach, but will appreciate the time it saves for painful and tedious compliance work.

If you are part of a modern software development team creating products in a DevOps environment, then perhaps you should set up some time with Security Compass to learn more about how they might save you considerable effort in your SDLC compliance work. I think it will be time well spent.

(And if you happen to run into someone from Gartner, perhaps you might express your displeasure at their annoying acronyms: They clutter our field.)




Nish Bhalla

Speculator and Spectator

7 年

Hi Ed, I love how you describe SD Elements as Operationalizing Security in the Dev Ops world. Thanks for taking the time to write this up.

DJ Schleen

Transforming Tech Landscapes: Where Engineering, Security, Innovation, and Thought Leadership Converge

7 年

This is the essence of pure DevSecOps... progressive organizations need to understand the security requirements of the applications they deliver. Automated correlation of evidence is a must have...

Rohit Sethi

Chief Executive Officer at Security Compass

7 年

Hi Ed, thanks for the wonderful write-up. For anyone reading this who wants to learn more, feel free to ping me and we will have somebody reach out

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    11 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了