The document outlines the integration of security into the DevOps process, emphasizing the need for a new secure software development lifecycle (SDLC) approach. Key steps include planning for security, engaging developers, automating processes, and using traditional security tools wisely. It concludes that security should not be compromised as DevOps continues to evolve rapidly.
Step 1: Planfor Security
• Identify unsecured APIs and frameworks
• Map security sensitive code portions. E.g. password
changes mechanism, user authentication
mechanism.
• Anticipate regulatory problems, plan for it.
Step 2: Engagethe Developers. And Be Engaged
• Connect developers to security
– Going to OWASP? Bring a developer with you!
• Is your house on fire? Share the details with your
developers.
• Have an open door approach
• Set up an online collaboration platform E.g. Jive,
Confluence etc.
Step 3: Armthe Developer
• Secure frameworks:
– Use a secure framework such as Spring Security, JAAS, Apache
Shiro, Symfony2
– ESAPI is a very useful OWASP security framework
• SCA tools that can provide security feedback on pre-commit stage.
– Rapid response
– Small chunks
Step 3: Automatethe Process
• Integrate within your build (Jenkins, Bamboo,
TeamCity, etc.)
– SAST
– DAST
• Fail the build if security does not pass the bar.
Security within ContinuousDeployment
Tests
Develop
Code
Commit
Source
Control
Build
Trigger
Deploy
to Test
Env
SCA
Test
Publish to
Automatic Report release
security
repository
&
test
Notify
Deploy
to
Production
Summary
• DevOps ishappening. Right Now.
– During the time of this talk, Amazon has released
75 features and bug fixes.
• Security should not be compromised
• Don’t be overwhelmed. Start small
29.
The 3 Takeaways
1.Plan from the ground
2. Engage with your developers
3. Integrate security into automatic build
process.