Scaling Software Security: The advantages of DevSecOps and mastering the keys to success.
Louisa Vogelenzang
Head of Cybersecurity - Asia Pacific & Japan (APJ) at Dayforce
Last month, I spent an entire day immersed in the talks of some fantastic speakers at DevSecOps (part of CISO Melbourne brought together by the awesome Michelle Ribeiro and the team at Corinium).
As a speaker on the end of day wrap up panel with Carl Michael and Andrew Horton, my focus was to absorb the day and share the key insights.?
I really appreciated this opportunity to fully commit myself to a day of gaining some new insights from the world of DevSecOps and wanted to share these with my LinkedIn community, in case any of this is helpful to you.
This article will cover observations from the day on:
To learn more about the excellent speakers I listened to on the day, here is the agenda
The Challenges
During many of the talks during the day, we heard about the challenges faced when it comes to securing software.?These challenges broadly fell into 4 categories.
As well as scanning code, we need to take steps to secure the entire software development lifecycle, including the pipeline (we had a reminder of the Solar Winds attack and the impact of pipeline poisoning).
However, not all organisations are doing this well - backing up this point, research has found that 88% of orgs acknowledged more could be done to secure their modern applications across the entire software lifecycle.
2. The challenge with scaling software security
Consider this - according to Github estimates, there is currently 1 Cybersecurity professional to every 500 developers.
Research cited in a recent zdnet article found that 81% of orgs said insufficient software security skills and resources was proving a challenge for their organization.
3. Code and attack surfaces keep expanding (and vulnerabilities along with this)
The amount of software code continues to expand - the State of the Developer Nation Report states that there are?24.3 million software developers?around the world – that′s 20% more than in 2020. The report predicts that by 2030, there will be 45 million active software developers. It is estimated that software engineers may produce about 93 Billion Lines of Code a year.
We also know that our attack surface has increased with the move to cloud and the ongoing expansion of the Internet of Things (IOT), making it hard to keep up and close all the gaps in our software ‘attack surface’.
According to Rezillion most organisations have 100k software vulnerabilities in their backlog.
4.??????Security is seen as a blocker
There is still more work to do to build positive relationships between security and development teams - with Dynatrace research finding 49% of devs see security as blocker to innovation.
This could be to do with that fact that some organisations are still doing security too late in the software development lifecycle - ultimately making security more costly and time consuming to do and may also slow down delivery of new features.?
So what is DevSecOps?
Many of my security peers would be familiar with the concept of DevSecOps – indeed we heard at the conference that 56% of organisations are using DevOps or DevSecOps practices.
However, for those less familiar here is a quick recap:
DevOps is the practice of close collaboration between development and operations where everyone becomes accountable for outages, even if they don’t manage the infrastructure.
With DevSecOps, everyone becomes accountable for vulnerabilities, even if they didn’t write the software. Just like the business goal of DevOps is fewer outages, the business goal of DevSecOps is no data loss.
The Advantages of DevSecOps
Throughout the day, we heard from experts about the advantages of using DevSecOps as an approach to securing applications.?Broadly these advantages fell into 3 buckets:
2. Shared goals and responsibility
Dev, Security and Operational teams work together towards the same outcome.
3. Security is part of the team
The Keys to Success with DevSecOps
1.??The Right Culture
The importance of a good culture was a consistent thread throughout all of the talks.?As with other elements of security, it makes sense to focus most of our efforts on people, with process and tech/tools playing a supporting role.??
领英推荐
Tips for accelerating the journey
2.??Ruthless prioritisation and ongoing tuning
3.?Context is key
Context is the circumstances that form the setting for an event, statement, or idea, and in terms of which it can be fully understood (Oxford Dictionary definition).
With an overwhelming amount of data available, it is critical to build context around that data.?Some tips from the speakers included
I really like the analogy used in a recent Security Week article – data is the information presented regarding symptoms when a patient visits the emergency room, context is the patients past medical history and the medical team taking that into account when prescribing and prioritising treatments.?
Taking this analogy and applying it to software security – data is the information presented on software vulnerabilities, context is the historical attack patterns, the system and network config & vulnerabilities of the ecosystem the software is part of, the compensating controls and the current threat intelligence on how and how often that vulnerability is being exploited, so that we can really ensure DevSecOps teams know where they should be focusing their efforts when it comes to security.
Next steps
Lastly, I wanted to leave you with some great tips and suggestions from the excellent speakers on DevSecOps and beyond, for my fellow security leaders:
1.??????If you are doing DevSecOps or DevOps today, consider benchmarking your maturity to understand where to go next.?Snyk offered a good option that was showcased on the day, with tangible actionable next steps based on your current maturity.
2.??????Adding security steps to development teams procedures was a hot tip from one of the presenters, in terms of ensuring a step gets done.?Along the same vein, a tip I would also add that I’ve heard since attending DevSecOps is to talk bugs not vulnerabilities.
3.??????With 45% of businesses seeing hybrid/multicloud as critical to their business strategy, ensure you Review IR for your cloud environments – sometimes gathering actionable data from the cloud environment (due to the shared responsibility model) can be a challenge.?Ensuring you break down barriers by up front engagement of stakeholder collaboration BEFORE an incident, helps to ensure a unified incident management process.
4.??????To the last point above on how context is important to ensure DevSecOps is successful, this is equally applicable in all aspects of cybersecurity – this will help with the ‘Why’, something we know is a key step we must start with, when it comes to cybersecurity actions, we need our business stakeholders to take.
Thank you for taking the time to read my article – I’d love to hear your ideas.?What are your keys to success when it comes to DevSecOps? Why aren't more organisations adopting DevSecOps?
Links to research referenced in this article:
Other helpful resources I came across in preparing for the conference:
Disclaimer: views expressed in this article are my own and do not necessarily represent the views of my current employer.??
What a fantastic summary, Louisa Vogelenzang! Thanks for sharing your key takeaways with everyone as your points are incredibly valuable. It was an absolute pleasure to have you on board, thanks for being part of the event and supporting us in getting more diversity and gender balance across our line-up of speakers. Your help is immeasurable! Looking forward to working with you again sometime soon ??