What is SecOps
Ali Bin Akhtar
RHCSA, RHCSOA, RHCODF RedHat Virtualization, RedHat OpenShift, DevOps/Cloud Infrastructure, Azure, AKS, VMware, Docker.
Although the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work continuously and effectively, security has not been a focal point in the transformation of cloud IT infrastructure.
SecOps is a procedure that seeks to address this by operationalizing and hardening security throughout the software lifecycle.
SecOps Team Roles
One of the major challenges that IT organizations face is establishing a clear set of objectives, roles, and responsibilities for SecOps. Security and operations should act as an integrated team that manages the ongoing protection of the organization's information assets while consistently meeting application performance objectives and service level requirements. Many IT organizations establish a dedicated security operations center where SecOps team members collaborate and work towards these objectives.
Some of the most important activities and capabilities of the security operations center include:
Network Monitoring - SecOps teams are typically responsible for closely monitoring activity throughout the enterprise IT infrastructure, including private, public and hybrid cloud environments. Network monitoring includes monitoring of security events and the operational status and performance of deployed applications.
Incident Response - When an unwanted or unexpected situation occurs, SecOps teams are responsible for implementing the incident response plan. Incidents may be reported by users but they are frequently discovered by network monitoring software tools before they affect end-users at all. When a security breach happens, an incident response team takes the appropriate steps to contain the damage and prevent the attacker from further accessing the network.
Root Cause Analysis - Forensics analysis of security events reflects the capability developed by SecOps to analyze and assess information to determine the root cause of a security breach, performance issue, or another unexpected event on the network. SecOps teams use specialized security software tools to conduct root cause analysis, determine the underlying causes of security issues, and rectify them before they can be exploited again.
Threat Intelligence - Threat intelligence is a security process with two basic steps: gaining knowledge and understanding of possible security threats to the organization and establishing methods to detect and respond to those threats. Threat intelligence can be conducted as a collaborative effort within the SecOps team, within the company as a whole, and even between separate business entities with a collective interest in securing their internal systems.
DevSecOps Implementation process.
I love to explain any process in the diagram, which is easy to understand without reading the article or text.
Semantic Data Model | Data Modeling | Business Intelligence | Analytics | Oracle PL/SQL Developer
4 年Very informative Info. Thanks for sharing ..