What is DevSecOps..?

What is DevSecOps..?

What is DevSecOps?

The term “DevSecOps” places information security into the original operating model of “DevOps”.

DevOps itself refers to the collaborative operating team of software developers and IT operations staff.

DevOps is common practice the world over. The trouble, though, is that it was built for agility, speed and reliability – not security. And we don’t have to look too far to see the plethora of security breaches all around us.

The advent of DevSecOps looks to address this weakness. By adopting this new operating model to identify issues in the build cycle, you can lower attack risk and improve the strength of your entire enterprise.

DevSecOps requires an attitude shift first, followed by the supporting tools and frameworks to sustain it. The attitude shift often starts with management, but it can implemented at any level to begin with.

The steps to DevSecOps are to first address the governance layers, then the documented processes – and finally, the people.

STEP 1: GOVERNANCE

Adopt a security model (ISO27001/2 or NIST 800/53r) and begin defining your overarching controls. Develop and design your information security policies, incident response plans, business continuity plans and coding standards. These policies and plans are living documents that need to be signed, approved and adopted at board level annually. In turn, the board needs to hold the executive to account on the adoption and implementation of these standards. The individuals tasked with implementation should be the CEO, CIO and CISO or the CFO, CIO and CISO.

STEP 2: PROCESSES

The successful implementation DevSecOps requires changes. These are best communicated through documented processes implemented manually and then integrated into an automated workflow. The newly formulated processes also need to link to your external vendors’ software (or system) development life cycle (SDLC) documentation.

STEP 3: PEOPLE

Ensure everyone receives information security training across the whole business. One of the biggest attack surfaces is the number of applications in an organisation.

STEP 4: TOOLS – MANAGE APPLICATION RISK WITH PROCENSUS

To assess application security intelligently, start with governance, people and process – then automate the repetitive tasks. Procensus is a production risk management platform that provides you with ongoing assessments for effective, proactive and risk-reducing results.

Procensus

要查看或添加评论,请登录

Lee Bristow的更多文章

  • What is Phinity?

    What is Phinity?

    Organically grown, Phinity was developed and innovated from the very first problem, of how do people scale risk and…

  • Who Cares About Third Party Risk Management?

    Who Cares About Third Party Risk Management?

    Your board of directors, the group risk officer, and those responsible for information privacy governance. And anyone…

  • ISACA MAX BLECHER INNOVATION AWARD WINNER

    ISACA MAX BLECHER INNOVATION AWARD WINNER

    ISACA Max Blecher Innovation Award Winner: Triplicity Patrick Ryan won the Innovation Award at the annual ISACA event…

    1 条评论
  • Third Party Risk Management Silver Lining is Industry Self-Regulation

    Third Party Risk Management Silver Lining is Industry Self-Regulation

    In today’s business environment it’s impossible to find a company that doesn’t contract with a third-party vendor to…

    1 条评论

社区洞察

其他会员也浏览了